Viruses: Malware [Episode 2]

On a previous article you have learned from basis about malware now in this episode you will learn more deeply about viruses worms and their types with respect to its construction. later on, on the third episode i will show you how to make your own simple and harm virus/worm. 

Once a virus is active, it loads into your computer’s memory and copies itself to applications or system files on disks you use.

Types of Viruses

The different types of viruses are as follows

1. Program Viruses

Mostly virus’s fall into this category, when this virus activate, they infect program files with extensions like (.BAT .EXE .COM etc).

2. Boot Sector viruses
Boot sector viruses infect storage media like hard drives or a floppy disk. A boot sector virus places its own commands into a Master Boot Record (MBR), this virus will run, before the operating system.

3. Multipartite viruses

Multipartite virus is not a new thing it just a combination of program or boot sector virus, these type of viruses attempt to attack both the boot sector and the executable, or program, files at the same time.

4. Resident Viruses

This is one of the most common virus and it’s directly attack in the RAM memory, from RAM memory it can interrupt the normal operation of the system.

5. Macro Viruses

Macro viruses infect a specific program or files that are created by using different applications and have a macro in it, these include word document, power point slide or corel draw etc.

Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...