Home Guest book My cartoons My paintings Favourite Links About kerala About erumely Contact us |
Viruses come in
many shapes and sizes, such as: · File infectors · These viruses attach
themselves to regular programs, such as COM or EXE files under DOS. Thus,
they are invoked each time the infected program is run. · Cluster
infectors · They modify the file system so that they are run prior to
other programs. Note that, unlike file infectors, they do not actually
attach themselves to programs. · Macro viruses · Word processing documents
can serve as sources of transmission for viruses that take advantage of
the auto-execution macro capabilities in products such as Microsoft Word.
Simply by opening an infected document, the virus, written in a product's
macro language, can spread. · System infectors · Computer operating
systems typically set aside a portion of each disk for code to boot the
computer. Under DOS, this section is called a boot sector on floppies or a
master boot record (MBR) for hard disks. System infectors store themselves
in this area and hence are invoked whenever the disk is used to boot the
system. · A virus must be executed by someone, perhaps unwittingly, in
order to spread. Period. Some ways in which this occurs include: · Booting
from an infected floppy · System infectors are loaded each time an
infected disk is used to boot the system. This can happen even if a disk
is not equipped with the files needed to truly boot the computer, as is
the case with most floppies. With PCs, the initial infection typically
occurs when someone boots - or reboots - a computer with an infected
floppy accidentally left in drive A. It is always a good habit to check
and remove any floppies that might be in the drives before booting your
machine. · Running an infected program · As programs infected with a file
infector are run, the virus spreads. For this reason, you should regularly
scan for viruses any programs you retrieve from a BBS, the net, a
colleague, etc... There are even instances of commercial, shrink-wrapped
software that have been infected with viruses!
See also Why virus is so called ?
and Virus creation ! |
---|