Search Bar

Computer Viruses | Types of Virus | Hinglishadda



computer virus,  what is computer virus, hinglishadda, alert computer virus

Today I like to tell you about computer viruses, how it controls your system and corrupts and damage them as because today’s generation is mostly depend on computer and not aware about virus how harmful they actually are so now I’m  going to tell you about this topic in this article.

Computer Viruses

A virus is a document which is made through some coding which is made to corrupt sensitive documents of for computer. It can easily enter in your computer through corrupted files, pen drive, advertisements, etc. It is like malicious software which enters in your computer and inserts its own code and infects your sensitive documents. It enters in your computer and destroyed all the knowledge vulnerably, it main purpose is to seek all the information like political information, personal information and other important details which vulnerability exits to explore in an artificial life, cyber security and evolutionary algorithm. Firstly viruses’ theory is done by John von Neumann in 1949 who is a lecturer of “Theory and Organization of Complicated Automata” in “University of Illinois”. Von Neumann later published the “Theory of self-reproducing of Automata” in that he describe how computer programs is designed. His computer program is considered as the first computer virus and after that is he named as the theoretical “father” of computer virology.




Virus functionality and operation of work

Routine
For daily rotten it have to be a target to detect new files and disks which infects the files  and its routine have to be automatically get copied in your computer and search your routine locations. Three main parts of virus:

Virus/Infection vector
It is also known as infection mechanism which has a main purpose which is that it locates new files and disks on daily routine.

Triggers
It is a version which is very complicated and get activated anytime and executes the files with running virus in them which determines and event and condition for the virus to be activated or deliver which can be on a particular data, time and double click that opens a document files or capacity of disk exceeding some limit. It is also known as “logic bomb”.


Payload
It is the data program which actually malicious purpose of the virus. It can be easily noticeable as because it freeze your document and make them slow down and most of the time it very harmful activity or sometimes non-destructive, which is known as Virus hoax.

Phases
Virus phase is the lifecycle of virus which describes by using analog to biology. This life cycle has been divided in four parts:


Dormant phase
At this time virus in worse. It manages to access the program which target the user’s software and program but at this stage virus does not take any action. It eventually gets activated when it get triggered which states that which time will the virus executed like the existence of another file or program, capacity of disk exceeding some limit. But not every virus has this stage.

Propagation phase
Virus starts multiplying and responds itself and gets copied in another program. The copied program can’t be identical. Viruses are used changed so to not get detected by the IT Professional and anti-virus software. Each infected program has a clone of virus which itself has a propagation phase.

Triggering phase
It is use to perform the function for which he is made and perform it when he gets activated. It is caused by various system events and even includes the events how many times the virus is copied.



Execution phase
It is the actual work of virus where is payload actually released. It can be very effective and destructive in various types like destroying the disk, affecting the files and giving default messages on the screen like political messages or corrupted messages.


Infection targets and replication techniques
Computer viruses infect various system and host computers of various subsystems. Classifying viruses to analyze whether it resize in binary executable like .com files/ data files like PDF files or Microsoft Word file or the reboot sector of host’s hard drive.

Resident and non-resident viruses
Memory-resident or simply say resident virus is such a virus which gets install itself as when operating system gets executed and it remains till the RAM booted up and shut down. It overwrites the files or interrupts handling data. When the operating system tries to access the data of disk sector, the virus code obstruct the request and redirects the control to replication module, infects the target.

The non-resident virus when executed it scans the disk then infects them and get existed like it does not remain in the memory after its executing from the memory.

Macro viruses
Some commonly used software like MS Word allows micro program to embed in emails or documents to make program run automatically when opened. This virus is written in micro language and embeds in documents so that when it is opened in other computer or users opened it their computer gets infected.

Boot sector viruses
This virus is special made to target the Master Boot Record (MBR) or/and Boot sector of removable storage device like floppy disk, flash drive etc.

Email virus
This virus rather than accidentally it intentionally uses email system from spreading. Email virus are aware of email systems and accidentally send a email attachments. They mostly target Microsoft’s Outlook due to commonly used and generate gets copied of themselves as attachments.


Vulnerabilities and infection vectors

Software bugs
It is designed with security features from getting unauthorized use of system resources. Many viruses may manipulate and exploit security bugs which defects in application system to spread automatically and spread other computers. A software development strategy is to produce large bugs which generally produce potential exploitation entrances for virus.


Social engineering and weak security practices
To repeat itself a virus must be invented for execution and written in memory. Many viruses get attached themselves to the executable files that may be logically inferable. If the user tries to execute the file the virus gets executed itself. Systems that use file extensions for the determination of program. Extension name by default is hidden from the users which makes possible to make the file of different type which appreciate to the users.

Vulnerability of different operating system

Viruses mostly target the system where Microsoft window is running due to the large market share of Microsoft in desktop computer users. In networks limitation the software system destructiveness of virus and malware takes place. Operating system like Linux allow users to choose options like desktop environment, tools etc., which simply means malicious code only target those who systems who only affect to subset all users. Most windows are running a similar application which enables the virus to exploit the Microsoft windows system with same target of large number of host exploitation.
Generally Linux and Unix allow the users to make changes in operating system environment but windows users can’t do so due to the viruses that can easily control entire system on window host. This difference in continued because of the common use administrator accounts in contemporary version like in Windows XP.


A virus for Linux named Bliss was created and released in 1997 by the researchers. This virus only infects those programs which the users can easily access to modify. Mostly Unix  user do not log into administrator when it configure for installation due to this if the user run a program it is not harm its operating system.

Now you must got the thing about computer virus what actually it is and how it works and control your system and destroy it. So if you like my article must share it, like and comment on it and if you have any query you can ask me in the comments.

Post a Comment

0 Comments