Each particular variant of the virus can infect only one or two types of files. Most common virus that infects executables. Some viruses infect and files and boot disk area. A virus infecting your device drivers are extremely rare, usually viruses can infect and executables.
More recently, a proliferation of new types of viruses - viruses that have a file system on the disk. These viruses are usually referred to as DIR. Such viruses hiding her body in a certain part of the disk (usually - in the latest cluster disk) and mark it in the file allocation table (FAT) as the end of the file.
To prevent its detection, some viruses are applied fairly hitrye masking techniques. I tell you about the two of them: "invisible" and samomodifitsiruyuschihsya viruses.
"Invisible" viruses. Many resident viruses (and file, and boot) to prevent their discovery that the intercept of DOS (and thus applications) to the infected file and disk area and deliver them in the original (clean) form. Of course, this effect is observed only on the infected machine - to "clean" computer changes to files and boot disk areas can be easily detected.
SAMOMODIFITSIRUYUSCHIESYA viruses. Another method used by viruses to escape detection - changed its body. Many viruses keep most of its body in coded form to start using disassembler can not understand how they work. Samomodifitsiruyuschiesya viruses use the reception and often change the encoding parameters, but also alter its starting side, which serves to rest the commands raskodirovki virus. Thus, the body of this virus does not have a single permanent byte chain, which could identify the virus. This naturally makes it difficult to find such virus-detection programs.
Статьи по теме:
SWISH Max or Flash animation effectsMikrokontrolleryne SystemThe Office of visualizationTime to create protection History of Opera browserDownload MozillaEnabling Windows VistaThe physical medium for LANsThe history of personal computers With your husband talking about your computer?Systemic and local bus Printing without a printing press? It is possibleThe structure of the PC The company Janet Systems Llc Presented Soa-Platform The exhibition «E-Kazakhstan»Aptitude CompactPCI-products of rapid obsolescenceUAB «Business Technology» Conducted Integrated Automation Ltd. Insurance Company «Amkopolis»Access"Trojan horse"Icons in the design. Stages and stage of development of computer The advent of IBM PC ISA bus Concentrators Ethernet NetGearThe most demanded software!Make backup ropii professionally - Norton Ghost 14New Decision on the market SoaBacking up data. Should I pay?Team-quality design of computer The situation for the computerCare home PC 3Ds Max 2008 (Rip)COMPUTER CRIME PREVENTIONBlack Banner - History of discovery METHODS OF PROTECTION FROM COMPUTER VIRUSESFraud Cell Phones The new search softwareMemory management FreebsdThe development of databases on Msde 2000, working with Free Database MssqlFresh version of Mobile Forex 2.16: Quick Mobile TradingWindows Media PlayerLocal bus Run WindowsHackers, as the subjects of computer crimeTheft of computer dataLinux set in motion devices: Now in the marketHold printingThe destruction of computer dataNosy about the habits of your guy online? NETGEAR NetworkIntroduction to WindowsThe device Netping Cooler Board Received At Warehouse Company Zao «Light Kommunikeyshn»Why work for a computer is harmful to human healthNetwork Mistakes Windows registry repairWorking in Windows VistaOpportunities for Windows XP