Each particular variant of the virus can infect only one or two types of files. Most common virus that infects executables. Some viruses infect and files and boot disk area. A virus infecting your device drivers are extremely rare, usually viruses can infect and executables.
More recently, a proliferation of new types of viruses - viruses that have a file system on the disk. These viruses are usually referred to as DIR. Such viruses hiding her body in a certain part of the disk (usually - in the latest cluster disk) and mark it in the file allocation table (FAT) as the end of the file.
To prevent its detection, some viruses are applied fairly hitrye masking techniques. I tell you about the two of them: "invisible" and samomodifitsiruyuschihsya viruses.
"Invisible" viruses. Many resident viruses (and file, and boot) to prevent their discovery that the intercept of DOS (and thus applications) to the infected file and disk area and deliver them in the original (clean) form. Of course, this effect is observed only on the infected machine - to "clean" computer changes to files and boot disk areas can be easily detected.
SAMOMODIFITSIRUYUSCHIESYA viruses. Another method used by viruses to escape detection - changed its body. Many viruses keep most of its body in coded form to start using disassembler can not understand how they work. Samomodifitsiruyuschiesya viruses use the reception and often change the encoding parameters, but also alter its starting side, which serves to rest the commands raskodirovki virus. Thus, the body of this virus does not have a single permanent byte chain, which could identify the virus. This naturally makes it difficult to find such virus-detection programs.
Статьи по теме:
Linux set in motion devices: Now in the marketRobot Helps Salamandra Razgadyvat Riddles EvolutionDevelopment of Iron Industry Or Who Wanted Now Multi ProcessorsMy Dear Oslik Or Setting EmuleBlack Banner - 25y frame the Internet Netpromoter: New Opportunities Professional Web statisticsProtection of information. Passwords At Rar archivesVisual work for the computer and its consequences Inkjet Plotters (SP, INK-JET PLOTTER)The counterfeiting of computer informationErg-exercises to improve postureHackers can control a PC without the knowledge of their owners Ergonomic organization of the workplaceCrm, softwarePlanning in the operating system UNIXThree Training from well-known vendors: Especially for «antiviral Decisions»Changes in the mechanism logonTime to create protection Installing Systems Videonablyudeniya In OfficeTracing processes in UNIXMacromedia Dreamweaver against Microsoft placed on the first lane Changing the design desktopTYPES LKSGoogle on the Internet malicious softwareThe organization and classification of printers Office automationImplementation Crm Systems Quick Sales 2 The Company «Epos»Desperate to know if he lies or fake? Odbc Firebird or may be still Ole Db driver?Tame your registration with the Windows software cleaning registryReview of popular programs BackupBest Antivirus Spam and how to cope with it Team-quality design of computer Linear Magnetic Recording Dlt (Dlt-V/Sdlt/Dlt-S4) The truth of the activation of Windows VistaSoftware for businesses - to add efficiency to business Backing up the blog on Blogspot. Blogger Backup utilityComputer technology and GenealogyThe most demanded software!Spyware battle; Use of firewall protectionHistory of Opera browserReview of Windows VistaActive Desktop Windows XPMicroprocessors used in CompactPCI-systemsRequirements for computer technology The funds protect your computer and maximum securityType Danyh in C + + I Unlike JavaThe program to automate Beauty Shop - Business tool or waste of money?Crm system, introduction Crm SystemsHow to choose the CRM: Develop a short-list CRM systemsAutomatic Generation of meaningful text of a possible?The reverse side of the coin Spyware PRINCIPLE OF CONSTRUCTION OF COMPUTER NETWORKSProtect photos, images and video