Each particular variant of the virus can infect only one or two types of files. Most common virus that infects executables. Some viruses infect and files and boot disk area. A virus infecting your device drivers are extremely rare, usually viruses can infect and executables.
More recently, a proliferation of new types of viruses - viruses that have a file system on the disk. These viruses are usually referred to as DIR. Such viruses hiding her body in a certain part of the disk (usually - in the latest cluster disk) and mark it in the file allocation table (FAT) as the end of the file.
To prevent its detection, some viruses are applied fairly hitrye masking techniques. I tell you about the two of them: "invisible" and samomodifitsiruyuschihsya viruses.
"Invisible" viruses. Many resident viruses (and file, and boot) to prevent their discovery that the intercept of DOS (and thus applications) to the infected file and disk area and deliver them in the original (clean) form. Of course, this effect is observed only on the infected machine - to "clean" computer changes to files and boot disk areas can be easily detected.
SAMOMODIFITSIRUYUSCHIESYA viruses. Another method used by viruses to escape detection - changed its body. Many viruses keep most of its body in coded form to start using disassembler can not understand how they work. Samomodifitsiruyuschiesya viruses use the reception and often change the encoding parameters, but also alter its starting side, which serves to rest the commands raskodirovki virus. Thus, the body of this virus does not have a single permanent byte chain, which could identify the virus. This naturally makes it difficult to find such virus-detection programs.
Статьи по теме:
Review of popular programs BackupTeam-quality design of computer Free software for everyone!Classification of computers What file compression better?Spam and how to cope with it The structure of the PC Opportunities for Windows XPComputerLinux set in motion devices: Now in the marketConcentrators Fast Ethernet NetGearThe processes in the operating system UNIXYour teenager safely use the Internet? The situation for the computerFraud Cell Phones The development control information tools for PADSDeveloping databases, Inside ViewLoading the alternative modeHow Stress Editor In Word 2007Mobile Commerce, Mobile Commerce SystemATM technologyWhat is the codec and where they can be downloadedNosy about the habits of your guy online? More Software invites you to Docflow 2008!Time to create protection Changing the design desktopComputer virusBus EISA Restoring WindowsLinear Magnetic Recording Dlt (Dlt-V/Sdlt/Dlt-S4) Network Active Desktop Windows XPThe organization and classification of printers The device Netping Cooler Board Received At Warehouse Company Zao «Light Kommunikeyshn»Memory management FreebsdWith your husband talking about your computer?Tips and Tricks - Picasa willRun WindowsReduced-occupied Windows XP disk spaceDevelopment and dissemination of computer virusesThe most demanded software!Lock down the personal information on your computerBlack Banner - 25y frame the Internet Installing Systems Videonablyudeniya In OfficeSoftware for businesses - to add efficiency to business LASER (LED) Plotters Industrial and engineering processes More WinRAR 3.70 RU FinalRouters NetGearCOMPUTER CRIME PREVENTION What your child is doing online?Spyware battle; Use of firewall protectionIBM sends framework ACTF donated EclipseAccessMETHODS OF PROTECTION FROM COMPUTER VIRUSES