Page 87 - Code & Click - 7
P. 87

Program Virus

            A Program Virus infects programs installed on a computer. Program files
            usually have extensions such as .exe, .com, .sys, .bat, .dll, .bin, and .pif.
            When the infected program is executed, the virus becomes active in the
            memory,  making  copies  of  itself  and  infecting  all  files  accessed  by  the
            infected program. Sunday, Cascade, Acid Rain, and Amoeba. A are some
            examples of program viruses.
                                                Macro Virus
                                                A  Macro  is  a  set  of  instructions  used  to  automate  tasks  that
                                                are performed more often, such as creating or deleting files, or
                                                modifying  the  contents  of  existing  files.  A  Macro  Virus  infects
                                                macros written for software such as Microsoft Word, Excel, and

                                                PowerPoint.  Melissa,  Relax,  Concept,  and  Nuclear  are  some
                                                examples of macro viruses.
            Multipartite Virus

            A Multipartite Virus infects a computer and spreads in multiple ways. It attacks both the boot sector
            and the program files. Ghostball, Tequila, and Invader are some examples of multipartite viruses.

            Polymorphic Virus
            A Polymorphic Virus is a virus designed to avoid detection by antivirus software.
            It changes its program code every time it replicates and infects a new file.
            Marburg, Tuareg, and Satan Bug are some examples of polymorphic viruses.

                                          Stealth Virus
                                          A Stealth Virus is capable of hiding itself inside data files. It is able to
                                          deliberately  avoid  detection  by  antivirus  software.  Frodo,  Joshi,  and
                                          Whale are some examples of stealth viruses.


            Worm

            A Worm is malware that stays inside the memory of computer and
            replicates itself automatically to other computers through computer
            networks  without  any  human  interaction.  Unlike  a  virus,  a  worm
            usually does not cause damage to programs or data in a computer
            but  consumes  too  much  system  memory  or  network  bandwidth,
            causing servers and individual computers to stop responding. Morris,
            Mydoom, and I LOVEYOU are some examples of computer worms.

                             Trojan Horse
                             A Trojan Horse is a program that hides its destructive intentions by disguising itself
                             as a game, useful application, or utility. It is usually distributed as email attachments
                             with tempting names and descriptions that prompt a user to open them. It can
                             delete files from a disk, send your personal information, such as passwords, or give
                             remote access to your computer to cyber-thieves and hackers. Beast, DarkComet ,and
                             Zeus are some examples of Trojan Horses.

                                                                                                                 85
   82   83   84   85   86   87   88   89   90   91   92