April 25, 2020

Popular Types of Computer Viruses

Resident viruses: These are permanent viruses dwelling in RAM memory. In this case, they would be in a position to overcome, as well as interrupt, all operations that the system executes. Their effects include corrupting programs and files that are closed, opened, renamed or copied.

Overwrite viruses: These viruses delete information that is in the infected files. In this case, the infected files would be rendered totally or partially useless. Unfortunately, you would only clean the infected file by deleting it completely, therefore losing original content.

Direct action viruses: This virus replicates itself, then acts when executed. Subject to satisfaction of particular conditions, the virus infects files located in the folders or computer directory. It is also in directories specified in the AUTOEXEC.BAT PATH. In most cases, it is located in hard drive’s root directory and takes particular action when the computer boots.

File infectors: This virus infects executable files or programs. On running the programs, the virus would be activated, then be able to carry out its damaging effects. Most of the existing viruses are in this category.

Boot viruses: This virus infects the hard disk’s or floppy drive’s boot sector. This would make the computer unable to boot. These viruses can, however, be avoided by ensuring that the floppy disks and hard drive is well protected. Never start the computer using an unknown disk drive or floppy disk.

Directory viruses: This virus alters the paths indicating a file’s location. In this case, when the infected program is executed, you will be running the program unknowingly, since the virus has moved the original program and file to another location. This therefore makes it impossible to locate the moved files.

Macro virus: This virus affects files created using particular programs or applications containing macros. The mini-programs increase their ability to automate some operations, in which case they would be performed as single actions. The user would therefore be saved the trouble of executing them singularly.

E-Mail Virus: Worth listing even if most are Macro viruses. Generally these kinds of viruses infect computers through social interaction with someone who e-mails the end user. They may be asked to verify a billing statement or look at an invoice attachement. Upon opening the attachment the macro is fired off and runs and infected the computer. Most macro viruses are easily stopped by simply keeping software up to date on computers.

Ransomware: Ransomware is type of malicious software product that attempts to hold a computer for ransom. This might be locking files, hiding files, changing permissions on files or encrypting files.