Соглашение | Публикация статей

Красивые рольшторы - roll-service.by

VARIETY COMPUTER VIRUSES
Категория: English version

Each particular variant of the virus can infect only one or two types of files. Most common virus that infects executables. Some viruses infect and files and boot disk area. A virus infecting your device drivers are extremely rare, usually viruses can infect and executables.
More recently, a proliferation of new types of viruses - viruses that have a file system on the disk. These viruses are usually referred to as DIR. Such viruses hiding her body in a certain part of the disk (usually - in the latest cluster disk) and mark it in the file allocation table (FAT) as the end of the file.
To prevent its detection, some viruses are applied fairly hitrye masking techniques. I tell you about the two of them: "invisible" and samomodifitsiruyuschihsya viruses.

"Invisible" viruses. Many resident viruses (and file, and boot) to prevent their discovery that the intercept of DOS (and thus applications) to the infected file and disk area and deliver them in the original (clean) form. Of course, this effect is observed only on the infected machine - to "clean" computer changes to files and boot disk areas can be easily detected.

SAMOMODIFITSIRUYUSCHIESYA viruses. Another method used by viruses to escape detection - changed its body. Many viruses keep most of its body in coded form to start using disassembler can not understand how they work. Samomodifitsiruyuschiesya viruses use the reception and often change the encoding parameters, but also alter its starting side, which serves to rest the commands raskodirovki virus. Thus, the body of this virus does not have a single permanent byte chain, which could identify the virus. This naturally makes it difficult to find such virus-detection programs.


Статьи по теме:

Linux set in motion devices: Now in the market
Robot Helps Salamandra Razgadyvat Riddles Evolution
Development of Iron Industry Or Who Wanted Now Multi Processors
My Dear Oslik Or Setting Emule
Black Banner - 25y frame the Internet
Netpromoter: New Opportunities Professional Web statistics
Protection of information. Passwords At Rar archives
Visual work for the computer and its consequences
Inkjet Plotters (SP, INK-JET PLOTTER)
The counterfeiting of computer information
Erg-exercises to improve posture
Hackers can control a PC without the knowledge of their owners
Ergonomic organization of the workplace
Crm, software
Planning in the operating system UNIX
Three Training from well-known vendors: Especially for «antiviral Decisions»
Changes in the mechanism logon
Time to create protection
Installing Systems Videonablyudeniya In Office
Tracing processes in UNIX
Macromedia Dreamweaver against Microsoft placed on the first lane
Changing the design desktop
TYPES LKS
Google on the Internet malicious software
The organization and classification of printers
Office automation
Implementation Crm Systems Quick Sales 2 The Company «Epos»
Desperate to know if he lies or fake?
Odbc Firebird or may be still Ole Db driver?
Tame your registration with the Windows software cleaning registry
Review of popular programs Backup
Best Antivirus
Spam and how to cope with it
Team-quality design of computer
Linear Magnetic Recording Dlt (Dlt-V/Sdlt/Dlt-S4)
The truth of the activation of Windows Vista
Software for businesses - to add efficiency to business
Backing up the blog on Blogspot. Blogger Backup utility
Computer technology and Genealogy
The most demanded software!
Spyware battle; Use of firewall protection
History of Opera browser
Review of Windows Vista
Active Desktop Windows XP
Microprocessors used in CompactPCI-systems
Requirements for computer technology
The funds protect your computer and maximum security
Type Danyh in C + + I Unlike Java
The program to automate Beauty Shop - Business tool or waste of money?
Crm system, introduction Crm Systems
How to choose the CRM: Develop a short-list CRM systems
Automatic Generation of meaningful text of a possible?
The reverse side of the coin Spyware
PRINCIPLE OF CONSTRUCTION OF COMPUTER NETWORKS
Protect photos, images and video