- .
- calon.by


Each particular variant of the virus can infect only one or two types of files. Most common virus that infects executables. Some viruses infect and files and boot disk area. A virus infecting your device drivers are extremely rare, usually viruses can infect and executables.
More recently, a proliferation of new types of viruses - viruses that have a file system on the disk. These viruses are usually referred to as DIR. Such viruses hiding her body in a certain part of the disk (usually - in the latest cluster disk) and mark it in the file allocation table (FAT) as the end of the file.
To prevent its detection, some viruses are applied fairly hitrye masking techniques. I tell you about the two of them: "invisible" and samomodifitsiruyuschihsya viruses.

"Invisible" viruses. Many resident viruses (and file, and boot) to prevent their discovery that the intercept of DOS (and thus applications) to the infected file and disk area and deliver them in the original (clean) form. Of course, this effect is observed only on the infected machine - to "clean" computer changes to files and boot disk areas can be easily detected.

SAMOMODIFITSIRUYUSCHIESYA viruses. Another method used by viruses to escape detection - changed its body. Many viruses keep most of its body in coded form to start using disassembler can not understand how they work. Samomodifitsiruyuschiesya viruses use the reception and often change the encoding parameters, but also alter its starting side, which serves to rest the commands raskodirovki virus. Thus, the body of this virus does not have a single permanent byte chain, which could identify the virus. This naturally makes it difficult to find such virus-detection programs.


Restoring files myth or reality?
Client accounting, Accounting orders - the most popular Software
Black Banner - Myth or Reality?
Erg-exercises to prevent PVPN
Introducing the expense of medical software - to allow for medical centers
Windows Vista: When ends Diskspace
Technology Platform 1C: Enterprise 8 - Areas Development
More Software invites you to Docflow 2008!
Animation on your computer desk
The new search software
Fraud Cell Phones
Free software for everyone!
Productivity billing system
Soa-platform Ijanet Free
Completed work on setting up a new product Alee Archive 3 for work with DBMS
Tray Microsoft Windows XP
Development of Software Development Projects
Mikrokontrolleryne System
Industrial and engineering processes
Robot Helps Salamandra Razgadyvat Riddles Evolution
Concentrators Fast Ethernet NetGear
The possibility of CompactPCI have more than 8 slots
Best Antivirus
General characteristics of Cybercrime
What is the standard CompactPCI?
Aptitude CompactPCI-products of rapid obsolescence
Your teenager safely use the Internet?
The company Janet Systems Llc Presented Soa-Platform Ijanet Framework Ultra The exhibition Kitel 2008
Theft of computer data
Print Manager
The reverse side of the coin Spyware
Computer virus
Backing up data. Should I pay?
Planning in the operating system UNIX
Sugarcrm In Russia
SWISH Max or Flash animation effects
Installing Systems Videonablyudeniya In Office
Lock down the personal information on your computer
Electrostatic Plotters
Crm, software
Perfect System Digital Surveillance Uniteco Dvs
How Stress Editor In Word 2007
UAB Business Technology Conducted Integrated Automation Ltd. Insurance Company Amkopolis
All font - Using Type1 I Truetype
IBM sends framework ACTF donated Eclipse
The story of software Escrow
The process of software development, the Program for Business
Black Banner - 25y frame the Internet
Threats to Security Modern Networks
Implementation Crm Systems Quick Sales 2 The Company Epos
Fresh version of Mobile Forex 2.16: Quick Mobile Trading
Zao Light Kommunikeyshn confirm its status Microsot Gold Certified Partner In 2008