What is computer virus
Категория реферата: Топики по английскому языку
Теги реферата: оформление доклада, рефераты баллы
Добавил(а) на сайт: Minin.
Предыдущая страница реферата | 1 2 3 | Следующая страница реферата
Boot Sector Infectors
Every logical drive, both hard disk and floppy, contains a boot sector.
This is true even of disks that are not bootable. This boot sector contains
specific information relating to the formatting of the disk, the data
stored there and also contains a small program called the boot program
(which loads the DOS system files). The boot program displays the familiar
"Non-system Disk or Disk Error" message if the DOS system files are not
present. It is also the program that gets infected by viruses. You get a
boot sector virus by leaving an infected diskette in a drive and rebooting
the machine. When the boot sector program is read and executed, the virus
goes into memory and infects your hard drive. Remember, because every disk
has a boot sector, it is possible (and common) to infect a machine from a
data disk. NOTE: Both floppy diskettes and hard drives contain boot
sectors.
Master Boot Record Infectors
The first physical sector of every hard disk (Side Ш, Track Ш, Sector
1) contains the disk's Master Boot Record and Partition Table. The Master
Boot Record has a small program within it called the Master Boot Program, which looks up the values in the partition table for the starting location
of the bootable partition, and then tells the system to go there and
execute any code it finds. Assuming your disk is set up properly, what it
finds in that location (Side 1, Track Ш, Sector 1) is a valid boot sector.
On floppy disks, these same viruses infect the boot sectors. You get a
Master Boot Record virus in exactly the same manner you get a boot sector
virus -- by leaving an infected diskette in a drive and rebooting the
machine. When the boot sector program is read and executed, the virus goes
into memory and infects the MBR of your hard drive. Again, because every
disk has a boot sector, it is possible (and common) to infect a machine
from a data disk. [3]
2.1.3 Multi-partite Viruses
Multi-partite viruses are a combination of the viruses listed above.
They will infect both files and MBRs or both files and boot sectors. These
types of viruses are currently rare, but the number of cases is growing
steadily.
2.1.4 Macro Viruses
Until recently, the macro languages included with most applications
were not powerful or robust enough to support writing an effective virus.
However, many of the more advanced applications that are being developed
today include built-in programming capabilities that rival some of the
larger development packages. This has recently been demonstrated by the
various strains of Microsoft Word viruses, including the so-called Word
Concept and Word Nuclear viruses. These viruses transport themselves
through Microsoft Word documents. When opened in Word, they perform various
actions, including spreading themselves into the user's installation of
Word, thus preparing to infect all future documents on the system.
An additional concern is that macro viruses can be cross-platform. The
Word Concept virus has the claim to fame of being the first prominent cross-
platform virus, because it can infect both Windows and Macintosh systems.
Because most application macro languages support passing execution to an external shell, such as COMMAND.COM or CMD.EXE, the power of the macro virus is not limited to the constraints of the macro language itself[4].
2.2 Used operation system.
Any computer or net virus can infect files of one or more operation systems: DOS, Windows, OS/2, Linux, MacOS and others. It is a base of this way of classification. For example virus BOZA working with Windows only is classified as Windows virus, virus BLISS – as Linux virus.
2.3 Work algorithms.
Viruses can be differed by used algorithms making them danger and hard for catching.
Firstly viruses can be divided on resident and nonresident.
Resident virus having come in operation memory of computer doesn’t infect memory. They are capable of copying when they are started only. We can call any macro virus resident. They present in memory during application infected by them works.
Second viruses are visible and invisible. To be invisible means that users and antivirus programs can’t notice changes of infected file done by virus. Invisible virus catches all requires of operation system to read file and to record in file and shows uninfected version of file. So we can see only ‘clear’ programs during virus works. One of first invisible file infectors was FRODO and boot infector – BRAIN.
Almost any virus uses methods of self-coding or polymorphism to escape antivirus programs. It means that they can change itself. Changing itself helps virus to be able work.[5]
3. Conclusion
In conclusion I would like to say few words about future of this classification. Nowadays computer technologies and all software develop very quickly. It helps new types of computer viruses to appear. Viruses are becoming more and more dangerous and ‘cleverer’. It means that viruses can be found more and more hard. But I think that this classification can be saved a long time thank for principles of work of computer. It means that this classification will be changed when computers work by principles that differ from principles of von Neiman. So this classification can be change by adding new subtypes of basic types if virus makers have created something new.
[pic]
Buryat State University
The paper: Types of computer viruses
Presented by Nefyodov Yuri
Scientific advisor: Sodboyeva L.D.
Рекомендуем скачать другие рефераты по теме: диплом государственного образца, мтс сообщения, сочинения по русскому языку.
Предыдущая страница реферата | 1 2 3 | Следующая страница реферата