types of virus

Computer contagions are a specific type of malware that attaches itself to executable lines or documents and replicates when the infected train is executed. Each type of computer contagion may have different characteristics and goods. Then are some common types of computer contagions 1. ** train Infector Contagions ** These contagions attach themselves to executable lines, similar as. exe or. com lines. When the infected train is run, the contagion activates and may spread to other executable lines on the system. 2. ** Boot Sector Contagions ** These contagions target the charge sector of a computer’s hard drive or removable storehouse bias. When the infected system is boggled, the contagion is loaded into memory, allowing it to spread to other storehouse bias connected to the computer. 3. ** Macro Contagions ** Macro contagions infect documents that support macros, similar as those created in Microsoft Word or Excel. When an infected document is opened, the contagion executes its law and may spread to other documents. 4. ** Multipartite Contagions ** Multipartite contagions combine characteristics of train infectors and charge sector contagions. They can infect both executable lines and the charge sector, making them protean and grueling to remove. 5. ** Polymorphic Contagions ** Polymorphic contagions have the capability to change their law or appearance each time they infect a new train or system. This makes them more delicate to descry using traditional antivirus autographs. 6. ** Metamorphic Contagions ** analogous to polymorphic contagions, metamorphic contagions can alter their law entirely, making it more grueling for antivirus programs to identify and exclude them. 7. ** Resident Contagions ** Resident contagions bed themselves in a system’s memory and can infect lines as they’re opened, closed, or executed. They remain active in the system’s memory, making them harder to descry and remove. 8. **Non-Resident Contagions **Non-resident contagions don’t bed themselves in the system’s memory and operate by infecting lines only when they’re executed. They’re generally easier to descry than resident contagions. 9. ** meager Infector Contagions ** These contagions infect specific portions of a train rather than the entire train. This makes them more grueling to descry, as they may not significantly alter the train’s size. 10. ** Companion Contagions ** Companion contagions produce a new, vicious train with the same name as a licit train but a different train extension. When the stoner unintentionally executes the vicious train, the contagion activates. It’s important to note that these orders aren’t mutually exclusive, and some contagions may parade characteristics of multiple types. also, new types of computer contagions may crop as cyber pitfalls evolve. Regularly streamlining antivirus software, rehearsing safe computing habits, and staying informed about implicit pitfalls are pivotal for guarding against computer contagions.

About the Author

Leave a Reply

Your email address will not be published. Required fields are marked *

You may also like these