Get Instahack License - A Massive instagram Bruteforce tool. Contact Us Buy Now!

Computer Virus

virus , copmuter hacks , hack , termux , msf , phishing
Almost everyone who uses computers and the Internet is familiar with the term Virus. Its abbreviation is Vital Information Resource Under Siege. Many viruses can be stopped before they get triggered if users properly maintain safety options. But there are many viruses which are unable to stop or becomes undetectable because of some technical reasons.




Table of Contents
1. What is Computer Virus?
2. Means of the Traversal of Virus
3. History of Computer Virus
4. Types of Computer Virus
5. Symptoms of a Computer Virus
6. Countermeasures Against Computer Virus

What is Computer Virus?

A computer virus is a program or a piece of code that is specifically designed to spread from computer systems to another computer and to interfere with computer operation without the knowledge of the victim. Hackers use these virus codes to corrupt or delete data from the victim's computer or use email to spread to other computers or networks. These viruses often get spread via email attachments or Instant Messaging (IM). Viruses can be disguised as images, audio, software, videos, or other attachments. The technique of making a disguise of these viruses and hiding them behind other files is called 'Binding'. As a hacker, you should know what binding is. Binding the Virus behind other daily usable files makes normal users unaware of the fact that they are unknowingly triggering the Virus and infecting themselves. Some viruses wreak their effects as their codes get executed. Other types of viruses stay dormant until they get a suitable digital environment for execution. There is also another deadly type of viruses that stay dormant during their whole life cycle and keeps sending the victim's information to its owner/creator. Even a simple virus can be dangerous as it will quickly capture the memory and bring the system to a halt. A virus that replicates itself to other computers without being attached to any files is called 'Worms'.

Means of the Traversal of Virus

  • Viruses travel through flash drives, CD drives, pen drives, Internet, etc.
  • Virus code gets replicate when copied by users.
  • Even documents (like Word, Excel, Notepad) do carry Viruses when these files get affected.

History of Computer Virus

In 1971, Bob Thomas of BNN technologies wrote a program, 'Creeper System' - which was a self-replicating program to test Jon von Neumann's theory, which was published as an article in 1949. Since 1987- when a virus infected ARPANET, a vast network used by the Department of Defense and many universities, many antivirus programs were developed, which periodically checks the computer system in search of viruses. Gradually the battle between viruses and antivirus came to a more prominent role, which we see nowadays.

Types of Computer Virus

  1. Boot Sector Viruses: are a special type of viruses that target the boot sector or master boot record (MBR) of the victim's hard drive or removable flash drives.
  2. Macro Viruses: infect those files that are created using some programs that contain some macros within .doc, .ppt, .mdb, etc. This Virus automatically detects the macros and templates within a file and infect them in the host's computer and hides the document or shared it through email. Examples of such types are: Melissa.A, relax, bablas, etc.
  3. Memory Resident Virus: fix them inside the host computer's memory and get activated every time the OS runs and infects those files that are opened for use. These viruses usually hide in RAM (Random Access Memory). Examples are meve, randex, etc.
  4. Browser Hijacker Virus: This Virus spread in various ways, such as via downloads. If it infects any browser in the host's computer, the browser redirects the user automatically to a particular website(s).
  5. Worms: are self-replicating viruses that don't attach themselves to other files and lead to adverse effects on the host's computer.
  6. Polymorphic Virus: These viruses encrypt themselves differently every time these viruses attack the host computer. Since they use different encryption algorithms and change their format every time they affect the victim, they became untraceable and difficult by antivirus to detect them using signatures or string searches. Examples are Marburg, satan bug, etc.
  7. FAT (File Allocation Table) Virus: Some viruses attack the FAT location of the disk part, which is used to store every information about the available disk.
  8. Multipartite Virus: spread and replicate in many different ways. Their actions depend on the OS installed and the presence of some particular type of files.
  9. Scripting Virus: Many webpages contain complex codes to create interactive UI content. Specific codes are often used to cause undesirable effects and originate from infected WebPages or browsers.
  10. Directory Virus: These viruses infect the host computer's directory and change the path of file location. They usually reside in the disk but affect the entire directory. An example is: dir-2 Virus
  11. Overwrite Virus: Deletes information of the file they infect and left that file useless. They replace the file content, but the file-size remains the same.
  12. Trojan: A trojan is a malignant breed of malicious code that is sent for a particular purpose. They come in disguise in the target computer and do the work that is allocated/programmed by its creator. We will discuss trojan in later chapters.

Many programming languages are used primarily to develop viruses. Among them, the easiest programming languages to learn are batch programming, C, Java, Python, etc.

Symptoms of a Computer Virus

  • Computer performance becomes slow.
  • Unexplainable loss of data.
  • Abnormalities will be there in computer behavior.
  • The computer will get crash in a frequent interval.

Countermeasures Against Computer Virus

  • Use the recommended antivirus and firewall protection.
  • Buy and use anti-spyware software.
  • Increase browser security setting to protect your PC from online threats and viruses.
  • Update your antivirus and firewalls.
  • Don't open attachments or emails from an unknown sender.

  • if you want to know more in depth So Read Next Chapter..

      Previous Chapter : Phishing Attack ❯                           Next Chapter : Rootkit 





Getting Info...

1 comment

  1. nice article i love it
Thanks For Connecting Us
Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
Site is Blocked
Sorry! This site is not available in your country.