Главная | Соглашение | Публикация статей

VARIETY COMPUTER VIRUSES
Категория: English version

Each particular variant of the virus can infect only one or two types of files. Most common virus that infects executables. Some viruses infect and files and boot disk area. A virus infecting your device drivers are extremely rare, usually viruses can infect and executables.
More recently, a proliferation of new types of viruses - viruses that have a file system on the disk. These viruses are usually referred to as DIR. Such viruses hiding her body in a certain part of the disk (usually - in the latest cluster disk) and mark it in the file allocation table (FAT) as the end of the file.
To prevent its detection, some viruses are applied fairly hitrye masking techniques. I tell you about the two of them: "invisible" and samomodifitsiruyuschihsya viruses.

"Invisible" viruses. Many resident viruses (and file, and boot) to prevent their discovery that the intercept of DOS (and thus applications) to the infected file and disk area and deliver them in the original (clean) form. Of course, this effect is observed only on the infected machine - to "clean" computer changes to files and boot disk areas can be easily detected.

SAMOMODIFITSIRUYUSCHIESYA viruses. Another method used by viruses to escape detection - changed its body. Many viruses keep most of its body in coded form to start using disassembler can not understand how they work. Samomodifitsiruyuschiesya viruses use the reception and often change the encoding parameters, but also alter its starting side, which serves to rest the commands raskodirovki virus. Thus, the body of this virus does not have a single permanent byte chain, which could identify the virus. This naturally makes it difficult to find such virus-detection programs.

VARIETY COMPUTER VIRUSES

Статьи по теме:

Switches NetGear
Hackers, as the subjects of computer crime
Playing audio and video files
Learn the truth about your child doing surfing habits
Google on the Internet malicious software
WAYS OF COMPUTER CRIMES
Gigabit Ethernet Technology
Erg-exercises to improve posture
Increases user rights
Technical approaches to increase the security of the computer
Network
Windows Media Player
Tips software and programs connected branch
Classification LAN (LCS)
The company Janet Systems Llc Presented Soa-Platform Ijanet Framework Ultra The exhibition «Kitel 2008»
The situation for the computer
Changing the design desktop
Hold printing
Robot Helps Salamandra Razgadyvat Riddles Evolution
Concentrators Fast Ethernet NetGear
Free software for everyone!
Mistakes Windows registry repair
Windows Vista: When ends Diskspace
Spam and how to cope with it
Desperate to know if he lies or fake?
More Software to create an electronic catalog Szags
ABOUT personal characteristics COMPUTER CRIMINALS
How Stress Editor In Word 2007
Plotters BASED TERMOPEREDACHI
Document for Linux
Completed work on setting up a new product Alee Archive 3 for work with DBMS
The attack at Infinity Gb V2 2
Version Mobile Forex 2.15: A new approach to reliability and convenience
UAB «Business Technology» Conducted Integrated Automation Ltd. Insurance Company «Amkopolis»
Theft of computer data
Mikrokontrolleryne System
At the market goes cheap GSM / GPS signaling
The program 1S Accounting Enterprise 8
Fraud Cell Phones
The scheme of the free acceleration of Internet
How to make the right choice? 1C: Enterprise 7.7. or 8.0
Computer technology and Genealogy
Protect photos, images and video
ISA bus
Plotters DIRECT IMAGE
Spyware battle; Use of firewall protection
What is the standard CompactPCI?
Robot Tartalo knocking at your door
Introducing the expense of medical software - to allow for medical centers
Restoring Windows
With your husband talking about your computer?
The most demanded software!
Soa-platform Ijanet Free
What your child is doing online?
Three Training from well-known vendors: Especially for «antiviral Decisions»