What type of computer virus is divided into 3 categories as follows:1. the virus by contact method Trojan horses a Trojan horse (Trojan Horse) is a program that has been written, it is likely that the editor is a simple program, in General, to trick users to make more calls coming in, but when I was called up, and then it will start to break, as it is now. Certain Trojan horse new is written entirely. By writing a program with a model name, and the description seems realistic to trick people to run to death. The purpose of the author may be a Trojan horse, as well as wrote a virus is to compromise the information contained in, or may be intended to head the secret removal of the computer system. A Trojan horse may be considered not a virus, because it is a program that has been written and there is no single to stick in another program to copy itself, but is unaware of the user's identity spread Trojan horse software in it, and is considered to be one of the types of programs that are highly dangerous because it is hard to verify, and may be easily created using just the program files, you can type baet Trojan horse. Polymorphic Viruses viruses punts poly graphics is the name that is used to invoke a virus that has the ability to alter themselves when they create copies of themselves, which may occur up to several hundred images, the result is that these viruses make it difficult to be detected by virus scanning methods only. New viruses this talented nowadays there are increasing. Sathin, viruses, Stealth Viruses is the name called a virus that has the ability to mimic the detection, such as a file, the virus infected the fek to what program categories, and will make the size of the larger program. If the virus is the sathin virus will not be able to determine the actual size of the increase, either because the virus will go to control the dot. When you use the DIR command or any program to determine the size of the dot program, it will display the same size. Everything, as if nothing happened. 2. virus according to the behavior. File viruses, File Viruses are viruses that put himself in a data file, in most cases, the data files are Executite .EXE .COM .DLL files, etc. The work of a virus is going to stick around. At the end of the data file, but it will have to write a command to run the virus. Always when there is a. Open the data file that is infected with a virus, your computer will be commanded to make a local area. The virus then the virus will embed itself in memory to. Stick to the other file. บูตเซกเตอร์ไวรัส Boot Sector Viruses หรือ Boot Infector Viruses คือไวรัสที่เก็บตัวเองอยู่ในบูตเซกเตอร์ ของดิสก์ การทำงานก็คือ เมื่อเราเปิดเครื่อง เครื่อง จะเข้าไปอ่านบูตเซกเตอร์ โดยในบูตเซกเตอร์จะมีโปรแกรมเล็ก ๆ ไว้ใช้ในการเรียกระบบ ปฎิบัติการขึ้นมาทำงานอีกทีหนึ่ง ถ้าหากว่าบูตเซกเตอร์ ได้ติดไวรัส โปรแกรมที่เป็นไวรัสจะเข้าไปแทนที่โปรแกรมดังกล่าว ทุก ๆ ครั้งที่บูตเครื่องขึ้นมาโดย โปรแกรมไวรัสก็จะโหลดเข้าไปในเครื่อง และจะเข้าไปฝังตัวอยู่ใน หน่วยความจำเพื่อเตรียมพร้อมที่ จะทำงานตามที่ได้ถูกโปรแกรมมา แล้วตัวไวรัสจึงค่อยไป เรียกดอสให้ขึ้นมาทำงานต่อไป ทำให้เหมือนไม่มีอะไรเกิดขึ้น ไวรัสประเภทนี้ มักจะติดกับแฟ้มข้อมูลด้วยเสมอ 3. virus infected file characteristics Macro viruses, Macro Viruses are viruses that have been seen as one of the largest and most current outbreak came in (April 2545 (2002)), whose work relies on your ability to use the language of Visual Basic with Microsoft Word in this particular type of virus-infected file is a Word document that is embedded in the file extension .doc to .dot virus works to copy itself onto other files is causing annoyance to work, for example, may cause a slow down. Make the type of printer or cause to stop working without cause. The program Intector Program File Viruses Viruses or virus is a virus that is adjacent to another file that has the extension as COM or EXE and some viruses can stuck in programs that have a file name extension and the program Overlay type sys Programs as well. An overlay is typically a file that has a file name extension that begins with a viral way OV used to be to stick to the program there are two ways to insert themselves into the program, it is after it has been infected. The size of the program will be bigger or are subject to a copy of itself. Go over the best of existing programs. Therefore, the size of the program will not change and difficult to repair, such as reversing the original. The work of a virus. Typically when an infected program is run. Part of it is working before and is considered this opportunity to embed into memory immediately, then let the program continue to work. When a virus embedded in memory. After this, if there are other programs to call up continue. The virus will copy itself into. In these programs now are spreading further.
การแปล กรุณารอสักครู่..
