Comp Project
Comp Project
CLASS – X ‘A’
ROLL NO. – 34
SUBJECT – Computer
File Virus
This type of virus infects the system by appending itself to the end of
a file. It changes the start of a program so that the control jumps to its
code. After the execution of its code, the control returns back to the
main program. Its execution is not even noticed. It is also called a
Parasitic virus because it leaves no file intact but also leaves the host
functional.
Macro Virus
Unlike most viruses which are written in a low-level language(like C
or assembly language), these are written in a high-level language
like Visual Basic. These viruses are triggered when a program capable
of executing a macro is run. For example, the macro viruses can be
contained in spreadsheet files.
Source code Virus
It looks for source code and modifies it to include virus and to help
spread it.
Polymorphic Virus
A virus signature is a pattern that can identify a virus (a series of
bytes that make up virus code). So in order to avoid detection by
antivirus a polymorphic virus changes each time it is installed. The
functionality of the virus remains the same but its signature is
changed.
Encrypted Virus
In order to avoid detection by antivirus, this type of virus exists in
encrypted form. It carries a decryption algorithm along with it. So the
virus first decrypts and then executes.
Stealth Virus
It is a very tricky virus as it changes the code that can be used to
detect it. Hence, the detection of viruses becomes very difficult. For
example, it can change the read system call such that whenever the
user asks to read a code modified by a virus, the original form of code
is shown rather than infected code.
Tunneling Virus
This virus attempts to bypass detection by antivirus scanner by
installing itself in the interrupt handler chain. Interception programs,
which remain in the background of an operating system and catch
viruses, become disabled during the course of a tunneling virus.
Similar viruses install themselves in device drivers.
Multipartite Virus
This type of virus is able to infect multiple parts of a system including
the boot sector, memory, and files. This makes it difficult to detect
and contain.
Armored Virus
An armored virus is coded to make it difficult for antivirus to unravel
and understand. It uses a variety of techniques to do so like fooling
antivirus to believe that it lies somewhere else than its real location or
using compression to complicate its code.
Browser Hijacker
As the name suggests this virus is coded to target the user’s browser
and can alter the browser settings. It is also called the browser redirect
virus because it redirects your browser to other malicious sites that
can harm your computer system.
Some of the most famous and
destructive viruses
1. ILOVEYOU
The ILOVEYOU virus posed as a love confession. It would send
itself to users' mailing lists and overwrite files, making computers
unbootable.
2. Code Red
Code Red targeted Microsoft IIS users and even the White House
website was hit.
Once infected, the virus would replicate itself, taking up computer
resources. The virus would then open up the machine to a remote
access.
3. Melissa
This virus started in 1999 as an infected word document. This was
posted online, claiming to be a list of passwords to adult websites.
Once opened, it would mail itself to the user's email contacts. The
increased email traffic caused disruption to governments and
corporations alike.
4. Storm Trojan
In 2007, Storm Trojan infected thousands of computers. Users
activated it by opening emails with titles such as "230 dead as storm
batters Europe".Then, a program called wincom32 would install itself.
This passed information to other infected computers. These computers
would then spread the virus.
5. Sasser
Sasser affected millions of Windows XP and 2000 computers. It
found a way to manipulate an exploit in the Local Security Authority
Subsystem Services.Sasser slowed machines down and caused
crashes. It also made it hard to power down. Damages were estimated
in the billions of dollars as well as forcing airlines and governments to
shut down.
6. My Doom
One of the fastest spreading virus of all time, My Doom, infected one
in 12 emails at its peak.Users would open an attachment like "Mail
Transaction Failed". Its aim was to take down websites like Google
and Lycos. It managed to take out Google for almost a day!
7. Zeus
In 2009, Zeus targeted windows computers to use them to perform
criminal acts. It infected targets through phishing scams or
downloads.It compromised accounts from many leading banks and
corporations. It stole details of social media accounts, bank
accounts,and email addresses.Around $70 million was stolen and over
100 arrests made.
8. Conficker
Conficker is a worm that infected over 9 million computers around
the world.It would reset account lockout settings and block access to
antivirus sites and windows updates. It would then lock out user
accounts. Scareware was then used to scam money from users.
9. Stuxnet
Believed to be created by Israeli and American defense forces for
cyber warfare, Stuxnet was used to disrupt Iran's nuclear
program.Spread through infected USB drives, it ruined 1/5 of Iran's
nuclear centrifuges. If the infected computer used Siemens software.
What is Antivirus Software?
Phishing
In phishing attacks, you will receive mail from an apparent bank or
government representative stating that your account has been hacked
or compromised by a third party. The motive of the mail is to make
you click the given link where the attacker can fetch your data easily.
Sometimes, the stories in the mails might change based on the type of
phishing.
Tech giants, such as Google, Yahoo, and Microsoft, have been
working toward filtering such messages in your mail. While a
majority of such mails do get filtered and sent to spam, phishing
mails, sometimes, play around the algorithm and land in your
primary mail.
Malware
It is important to understand malware to understand antivirus.
Malware functions with the intention to loot your bank account, steal
your identity, and many more activities of malicious nature.A few
pieces of malware can delete your important files, make your system
crash, damage your server, and much more.
Spyware
Spyware usually enters into your device’s operating system, spies
your activities, and generates ads accordingly. Sometimes. spyware
generates unwanted ads as well.
But, what are the different types of antivirus software you should be
aware of to choose the best-suited antivirus software for you in 2021?
The following section of this blog, what is antivirus, will answer the
same. The following examples of antivirus software are as per the
ITProPortal’s 2021 report.
Popular Antivirus Software
It comes with PowerShell that scans your external devices for viruses
as well. You can purchase this antivirus software for US$39.99
annually.