- roll-service.by / tvoi-master.by


Each particular variant of the virus can infect only one or two types of files. Most common virus that infects executables. Some viruses infect and files and boot disk area. A virus infecting your device drivers are extremely rare, usually viruses can infect and executables.
More recently, a proliferation of new types of viruses - viruses that have a file system on the disk. These viruses are usually referred to as DIR. Such viruses hiding her body in a certain part of the disk (usually - in the latest cluster disk) and mark it in the file allocation table (FAT) as the end of the file.
To prevent its detection, some viruses are applied fairly hitrye masking techniques. I tell you about the two of them: "invisible" and samomodifitsiruyuschihsya viruses.

"Invisible" viruses. Many resident viruses (and file, and boot) to prevent their discovery that the intercept of DOS (and thus applications) to the infected file and disk area and deliver them in the original (clean) form. Of course, this effect is observed only on the infected machine - to "clean" computer changes to files and boot disk areas can be easily detected.

SAMOMODIFITSIRUYUSCHIESYA viruses. Another method used by viruses to escape detection - changed its body. Many viruses keep most of its body in coded form to start using disassembler can not understand how they work. Samomodifitsiruyuschiesya viruses use the reception and often change the encoding parameters, but also alter its starting side, which serves to rest the commands raskodirovki virus. Thus, the body of this virus does not have a single permanent byte chain, which could identify the virus. This naturally makes it difficult to find such virus-detection programs.


SWISH Max or Flash animation effects
Mikrokontrolleryne System
The Office of visualization
Time to create protection
History of Opera browser
Download Mozilla
Enabling Windows Vista
The physical medium for LANs
The history of personal computers
With your husband talking about your computer?
Systemic and local bus
Printing without a printing press? It is possible
The structure of the PC
The company Janet Systems Llc Presented Soa-Platform The exhibition E-Kazakhstan
Aptitude CompactPCI-products of rapid obsolescence
UAB Business Technology Conducted Integrated Automation Ltd. Insurance Company Amkopolis
"Trojan horse"
Icons in the design. Stages and stage of development of computer
The advent of IBM PC
ISA bus
Concentrators Ethernet NetGear
The most demanded software!
Make backup ropii professionally - Norton Ghost 14
New Decision on the market Soa
Backing up data. Should I pay?
Team-quality design of computer
The situation for the computer
Care home PC
3Ds Max 2008 (Rip)
Black Banner - History of discovery
Fraud Cell Phones
The new search software
Memory management Freebsd
The development of databases on Msde 2000, working with Free Database Mssql
Fresh version of Mobile Forex 2.16: Quick Mobile Trading
Windows Media Player
Local bus
Run Windows
Hackers, as the subjects of computer crime
Theft of computer data
Linux set in motion devices: Now in the market
Hold printing
The destruction of computer data
Nosy about the habits of your guy online?
Introduction to Windows
The device Netping Cooler Board Received At Warehouse Company Zao Light Kommunikeyshn
Why work for a computer is harmful to human health
Mistakes Windows registry repair
Working in Windows Vista
Opportunities for Windows XP