TYPES OF VIRUSES
|
There are many
categories of viruses, including parasitic or file viruses, bootstrap-sector,
multipartite, macro, and script viruses. Then there are so-called computer
worms, which have become particularly prevalent. A computer worm is a type of virus. However,
instead of infecting files or operating systems, a worm replicates from
computer to computer by spreading entire copies of itself.
Parasitic or file viruses infect executable files
or programs in the computer. These files are often identified by the extension
.exe in the name of the computer file. File viruses leave the contents of the
host program unchanged but attach to the host in such a way that the virus code
is run first. These viruses can be either direct-action or resident. A
direct-action virus selects one or more programs to infect each time it is
executed. A resident virus hides in
the computer's memory and infects a particular program when that program is
executed.
Bootstrap-sector viruses reside on the first
portion of the hard disk or floppy disk, known as the boot sector. These
viruses replace either the programs that store information about the disk's
contents or the programs that start the computer. Typically, these viruses
spread by means of the physical exchange of floppy disks.
Multipartite viruses combine the abilities
of the parasitic and the bootstrap-sector viruses, and so are able to infect
either files or boot sectors. These types of viruses can spread if a computer
user boots from an infected diskette or accesses infected files.
Other viruses infect
programs that contain powerful macro languages (programming
languages that let the user create new features and utilities). These viruses,
called macro viruses, are written in
macro languages and automatically execute when the legitimate program is
opened.
Script viruses are written in script
programming languages, such as VBScript (Visual Basic Script) and JavaScript.
These script languages can be seen as a special kind of macro language and are
even more powerful because most are closely related to the operating system
environment. The 'ILOVEYOU' virus,
which appeared in 2000 and infected an estimated 1 in 5 personal computers, is
a famous example of a script virus.
Strictly speaking, a
computer virus is always a program that attaches itself to some other program.
But computer virus has become a blanket term that also refers to computer
worms. A worm operates entirely on its own, without ever attaching itself to
another program. Typically, a worm
spreads over e-mail and through other ways that computers exchange information
over a network. In this way, a worm not only wreaks havoc on machines, but also
clogs network connections and slows network traffic, so that it takes an
excessively long time to load a Web page or send an e-mail.
VIRUS-LIKE COMPUTER
PROGRAMS
|
There are other harmful
computer programs that can be part of a virus but are not considered viruses
because they do not have the ability to replicate. These programs fall into
three categories: Trojan horses, logic bombs, and deliberately harmful or
malicious software programs that run within a Web browser, an application
program such as Internet Explorer and Netscape that displays Web sites.
A Trojan horse is a program that pretends to be something else. A
Trojan horse may appear to be something interesting and harmless, such as a
game, but when it runs it may have harmful effects. The term comes from the
classic Greek story of the Trojan horse found in Homer’s Iliad.
A logic bomb infects a computer’s memory, but unlike a virus, it does
not replicate itself. A logic bomb delivers its instructions when it is
triggered by a specific condition, such as when a particular date or time is
reached or when a combination of letters is typed on a keyboard. A logic bomb
has the ability to erase a hard drive or delete certain files.
Malicious software programs that run
within a Web browser often appear in Java applets and ActiveX controls. Although
these applets and controls improve the usefulness of Web sites, they also
increase a vandal’s ability to interfere with unprotected systems. Because
those controls and applets require that certain components be downloaded to a
user’s personal computer (PC), activating an applet or control might actually
download malicious code.
No comments:
Post a Comment