About different types of computer virus.


What is a Computer Virus ?
A potentially damaging computer
programme capable of reproducing
itself causing great harm to files or
other programs without permission or
knowledge of the user.

Virus – A program that when run, has the
ability to self-replicate by infecting other
programs and files on your computer.
These programs can have many effects
ranging from wiping your hard drive,
displaying a joke in a small box, or doing
nothing at all except to replicate itself.
These types of infections tend to be
localized to your computer and not have
the ability to spread to another computer
on their own. The word virus has
incorrectly become a general term that
encompasses trojans, worms, and viruses.
Types of viruses :-
The different types of viruses are as
1) Boot Sector Virus :- Boot sector
viruses infect either the master boot
record of the hard disk or the floppy
drive. The boot record program
responsible for the booting of operating
system is replaced by the virus. The virus
either copies the master boot program to
another part of the hard disk or
overwrites it. They infect a computer
when it boots up or when it accesses the
infected floppy disk in the floppy drive.
i.e. Once a system is infected with a boot-
sector virus, any non-write-protected disk
accessed by this system will become
Examples of boot- sector viruses are
Michelangelo and Stoned.
2) File or Program Viruses :- Some files/
programs, when executed, load the virus in
the memory and perform predefined functions
to infect the system. They infect program
files with extensions like .EXE, .COM, .BIN,
.DRV and .SYS .
Some common file viruses are Sunday,
3) Multipartite Viruses :- A multipartite virus
is a computer virus that infects multiple
different target platforms, and remains
recursively infective in each target. It
attempts to attack both the boot sector and
the executable, or programs, files at the
same time. When the virus attaches to the
boot sector, it will in turn affect the
system’s files, and when the virus attaches
to the files, it will in turn infect the boot
This type of virus can re-infect a system
over and over again if all parts of the virus
are not eradicated.
Ghostball was the first multipartite virus,
discovered by Fridrik Skulason in October
Other examples are Invader, Flip, etc.
4) Stealth Viruses :- These viruses are
stealthy in nature means it uses various
methods for hiding themselves to avoid
detection. They sometimes remove
themselves from the memory temporarily
to avoid detection by antivirus. They are
somewhat difficult to detect. When an
antivirus program tries to detect the virus,
the stealth virus feeds the antivirus
program a clean image of the file or boot
5) Polymorphic Viruses :- Polymorphic
viruses have the ability to mutate
implying that they change the viral code
known as the signature each time they
spread or infect. Thus an antivirus
program which is scanning for specific
virus codes unable to detect it’s presense.
6) Macro Viruses :- A macro virus is a
computer virus that “infects” a Microsoft
Word or similar application and causes a
sequence of actions to be performed
automatically when the application is
started or something else triggers it.
Macro viruses tend to be surprising but
relatively harmless.A macro virus is often
spread as an e-mail virus. Well-known
examples are Concept Virus and Melissa
If you use a computer, read the
newspaper, or watch the news, you will
know about computer viruses or other
malware. These are those malicious
programs that once they infect your
machine will start causing havoc on
your computer. What many people do
not know is that there are many
different types of infections that are
categorized in the general category of
Malware – Malware is programming or
files that are developed for the purpose of
doing harm. Thus, malware includes
computer viruses, worms, Trojan horses,
spyware, hijackers, and certain type of
This article will focus on those malware
that are considered viruses, trojans,
worms, and viruses, though this
information can be used to remove the
other types of malware as well. We will
not go into specific details about any one
particular infection, but rather provide a
broad overview of how these infections
can be removed. For the most part these
instructions should allow you to remove a
good deal of infections, but there are
some that need special steps to be
removed and these won’t be covered
under this tutorial.
Before we continue it is important to
understand the generic malware terms
that you will be reading about.
Backdoor – A program that allows a
remote user to execute commands and
tasks on your computer without your
permission. These types of programs are
typically used to launch attacks on other
computers, distribute copyrighted software
or media, or hack other computers.
Hijackers – A program that attempts to
hijack certain Internet functions like
redirecting your start page to the
hijacker’s own start page, redirecting
search queries to a undesired search
engine, or replace search results from
popular search engines with their own
Spyware – A program that monitors your
activity or information on your computer
and sends that information to a remote
computer without your Knowledge.
Adware – A program that generates popups
on your computer or displays
advertisements. It is important to note that
not all adware programs are necessarily
considered malware.
There are many legitimate programs that
are given for free that display ads in their
programs in order to generate revenue. As
long as this information is provided up
front then they are generally not
considered malware.
Dialler – A program that typically dials a
premium rate number that has per minute
charges over and above the typical call
charge. These calls are with the intent of
gaining access to pornographic material.
Trojan – A program that has been designed
to appear innocent but has been
intentionally designed to cause some
malicious activity or to provide a
backdoor to your system.
Worm – A program that when run, has the
ability to spread to other computers on its
own using either mass-mailing techniques
to email addresses found on your
computer or by using the Internet to infect
a remote computer using known security



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s