Viruses: Malware [Episode 2]


On a previous article you have learned from basis about malware now in this episode you will learn more deeply about viruses worms and their types with respect to its construction. later on, on the third episode i will show you how to make your own simple and harm virus/worm. 


Once a virus is active, it loads into your computer’s memory and copies itself to applications or system files on disks you use.

Types of Viruses

The different types of viruses are as follows

1. Program Viruses


Mostly virus’s fall into this category, when this virus activate, they infect program files with extensions like (.BAT .EXE .COM etc).


2. Boot Sector viruses
Boot sector viruses infect storage media like hard drives or a floppy disk. A boot sector virus places its own commands into a Master Boot Record (MBR), this virus will run, before the operating system.


3. Multipartite viruses


Multipartite virus is not a new thing it just a combination of program or boot sector virus, these type of viruses attempt to attack both the boot sector and the executable, or program, files at the same time.


4. Resident Viruses


This is one of the most common virus and it’s directly attack in the RAM memory, from RAM memory it can interrupt the normal operation of the system.


5. Macro Viruses


Macro viruses infect a specific program or files that are created by using different applications and have a macro in it, these include word document, power point slide or corel draw etc.










Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top Suggestions To Minimize Cyber Attack Risks

The Cyber Protection and Cyber Attack definition play an important role in maintaining both global security and operational productivity due to the rapid proliferation...

Policing the Dark Web (TOR): How Authorities track People on Darknet

The darknet, especially the TOR network, can be hacked, or the information of the people using it can be extracted in the plain text....

Best VPNs for Android – and Why You Need One Now

Most people protect their laptops and computers from potential cyber-attacks but only consider the cybersecurity of their mobile devices when it’s too late. In recent...

The Levels of the Internet Surface Web, Deep Web, and Dark Web

The internet, invented by Vinton Cerf and Bob Cahn, has evolved since its creation in the 1960s. In 1990, the World Wide Web transformed...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.