#sidebar #Feed1 ul li { background-color:#DEDEDF; border-bottom:1px solid #000; margin:0 0 0 0px; padding:5px; text-indent:0px; }
Thursday, March 01, 2007
.: computer virus :.
untuk mendownload norton virus definition klik link dibawah ini
  • download norton virus definition
  • What is a computer virus? A computer virus is a piece of malicious code that attaches to important areas within computers, such as executable files, and the boot areas of floppy disks and hard disks. A virus can destroy data after copying itself to other host files or disks. The virus spreads when its host file runs and the malicious code is unleashed. The virus can quickly spread into memory as the computer boots from an infected disk. Once in memory, the virus can infect other executable files or disk boot sectors. Typically, a virus remains dormant until some trigger event occurs, such as a system date. In addition to replication, a computer virus often performs some other function, usually intended to do damage or spread a message. Viruses are created by people who know how to use and manipulate code. However, you can take various counteractions once Norton AntiVirus detects an infection within your computer. How many viruses exist? There are more than 20,000 known viruses. Many of these viruses have been discovered and analyzed by anti-virus vendors like Symantec, but they have not been encountered in the work or home environment. Though much of what people have heard about viruses is hype, viruses are actually quite common and easily spread. If left unguarded, your network could lose data or become corrupt. How viruses spread Program viruses spread through just about any network, modem, or magnetic medium. Most boot viruses can only spread by way of floppy disks. Multipartite viruses are especially elusive because they can travel as a program virus, infect boot sectors, and be transmitted through floppy disks. The explosive growth of LAN, Internet, and global email connectivity has dramatically accelerated the rate at which viruses can spread. A localized virus outbreak can quickly spread to another part of a company or the world when infected files are sent through email. The primary threat of infection comes from files that are shared, and then opened and used. Virus types Viruses are classified by what they infect and how they attempt to evade detection. The basic virus types are defined by the area of the computer they infect: Boot viruses: Insert instructions into the boot sectors of floppy disks, or the boot sector or master boot record (partition sector) of a hard disk. Program viruses: Infect executable files such as .COM, .EXE, and .DLL files. Macro viruses: Infect document files such as Microsoft Word .DOC files by changing the way macros behave. Other types of destructive code include worms, Trojan horses, and logic bombs. These types of destructive code are different than viruses because they don't replicate. Boot viruses Boot viruses are some of the most successful viruses. They are simple to write, and they take control of the computer at a low level. What they infect Boot viruses insert instructions into the boot sectors of floppy disks, or the boot sector or master boot record (partition sector) of a hard disk. How they infect When the computer boots from an infected floppy disk, the virus infects the hard disk and loads its code into memory. The floppy disk does not have to be bootable for the virus to spread. The virus remains memory resident and infects any floppy disks that are accessed. Typically, the trigger for a boot virus is the system date or time. For example, the Michelangelo virus is a boot virus that deletes the hard disk of its host on March 6 (Michelangelo's birthday). Damage A floppy disk or hard disk with an infected boot sector won't infect any files unless the virus is also multipartite. A true boot virus can't spread to a server or over the network. Program viruses What they infect Program file viruses attach to executable files such as .COM, .EXE, and .DLL files by inserting instructions into the execution sequence. When the infected file runs, the inserted instructions execute the virus code. After the code finishes executing, the file continues with its normal execution sequence. This happens so quickly that you're not aware that the virus executed. How they infect There are three subclassifications of program file viruses: Memory resident: Stay in memory as terminate-stay-resident (TSR) programs and typically infect all executed files. Direct action: Execute, infect other files, and unload. Companion: Associates itself with an executable file without modifying it. For example, the virus might create a companion file, WORD.COM, to the WORD.EXE file. When the Word program opens, the infected WORD.COM file executes, performs the virus activities, and then executes the WORD.EXE file. Damage The damage caused by program file viruses varies from irritating, such as displaying screen messages, to data destroying. Macro viruses What they infect Unlike other viruses, macro viruses do not infect program files; they infect documents. Common targets for many macro viruses are word processors such as Microsoft Word and Lotus AmiPro, and spreadsheets like Microsoft Excel. How they infect Word uses macros to perform actions such as formatting text and opening or closing a document. Macro viruses can modify macros defined by the Word application to perform malicious actions such as overwriting or redefining default definitions in Word. Damage The damage caused by macro viruses can range from inserting unwanted text into documents to significantly reducing the functionality of a computer. For example, Format.C will format your hard disk. Common targets Macro viruses that infect Word commonly target the macros associated with the NORMAL.DOT template. This template is global, so all your Word files can be infected. dibuat oleh yalin disadur dari file about virus, Symantec Corp. untuk mendownload norton virus definition klik link dibawah ini
  • download norton virus definition
  • Music blogs Top Blogs
     
    posted by aRe u HaCkEr's at 6:23 AM |


    0 Comments: