Главная | Соглашение | Публикация статей

VARIETY COMPUTER VIRUSES
Категория: English version

Each particular variant of the virus can infect only one or two types of files. Most common virus that infects executables. Some viruses infect and files and boot disk area. A virus infecting your device drivers are extremely rare, usually viruses can infect and executables.
More recently, a proliferation of new types of viruses - viruses that have a file system on the disk. These viruses are usually referred to as DIR. Such viruses hiding her body in a certain part of the disk (usually - in the latest cluster disk) and mark it in the file allocation table (FAT) as the end of the file.
To prevent its detection, some viruses are applied fairly hitrye masking techniques. I tell you about the two of them: "invisible" and samomodifitsiruyuschihsya viruses.

"Invisible" viruses. Many resident viruses (and file, and boot) to prevent their discovery that the intercept of DOS (and thus applications) to the infected file and disk area and deliver them in the original (clean) form. Of course, this effect is observed only on the infected machine - to "clean" computer changes to files and boot disk areas can be easily detected.

SAMOMODIFITSIRUYUSCHIESYA viruses. Another method used by viruses to escape detection - changed its body. Many viruses keep most of its body in coded form to start using disassembler can not understand how they work. Samomodifitsiruyuschiesya viruses use the reception and often change the encoding parameters, but also alter its starting side, which serves to rest the commands raskodirovki virus. Thus, the body of this virus does not have a single permanent byte chain, which could identify the virus. This naturally makes it difficult to find such virus-detection programs.

VARIETY COMPUTER VIRUSES

Статьи по теме:

Access
Document for Linux
Introducing the expense of medical software - to allow for medical centers
Three Training from well-known vendors: Especially for «antiviral Decisions»
The development of databases on Msde 2000, working with Free Database Mssql
Your teenager safely use the Internet?
The process of software development, the Program for Business
Microsoft Great Plains to customers in Russia: how to find a consultant and the most frequent questions
Active Desktop Windows XP
Requirements for computer technology
Theft of computer data
Enabling Windows Vista
WAYS OF COMPUTER CRIMES
Corporate Information System (Crm, Erp, mobile commerce)
Robot Helps Salamandra Razgadyvat Riddles Evolution
Gigabit Ethernet Technology
Pen plotters (PP, PEN PLOTTER)
Fresh version of Mobile Forex 2.16: Quick Mobile Trading
ISA bus
HISTORY OF BUILDERS
Enabling Windows XP
Aptitude CompactPCI-products of rapid obsolescence
More Software invites you to Docflow 2008!
Nosy about the habits of your guy online?
Version Mobile Forex 2.15: A new approach to reliability and convenience
Concentrators Ethernet NetGear
Changes in the mechanism logon
Backing up data. Should I pay?
Visual work for the computer and its consequences
The total points in the organization LAN
ABOUT personal characteristics COMPUTER CRIMINALS
The most demanded software!
Checking Software Licensing
LASER (LED) Plotters
Computer data as an object of criminal assault
1C Program Office Trade 8
The scheme of the free acceleration of Internet
My Dear Oslik Or Setting Emule
Classification of computers
The story of software Escrow
Black Banner - History of discovery
How to Choose a Printer?
Tracing processes in UNIX
At the market goes cheap GSM / GPS signaling
Increases user rights
Black Banner - or the threat of new technologies?
Reduced-occupied Windows XP disk space
Linux set in motion devices: Now in the market
Erg-exercises to improve posture
Review of Windows Vista
TYPES LKS
UAB «Business Technology» Conducted Integrated Automation Ltd. Insurance Company «Amkopolis»
Fire systems company Satel now can be controlled by phone or Ethernet
Integration modules PADS in the enterprise software environment
Data protection. Luxury or means of survival?