A computer virus is a malware that aims to alter the normal functioning of the computer, without the permission or knowledge of the user. Viruses usually replaced by other infected executable code of this file. Viruses can destroy, intentionally, data stored on a computer, although other more harmless, can only be characterized as annoying.
Computer viruses have basically function propagate through software, do not replicate themselves because they have that power [citation needed] as the computer worm, are very harmful and some also contain a damaging payload (payload) with different objectives, from a joke to make significant damage to systems or computer networks block generating useless traffic.
The operation of a computer virus is conceptually simple. A program that is infected, in most cases, the user unknowingly runs. The virus code is resident (staying) in the RAM of the computer, even when the program containing it has finished running. The virus then takes control of the basic operating system services, infecting, posteriorly, executables that are called for execution. Finally, the virus code is added to the infected program and written to the disk, which replicated the process is complete.
DISADVANTAGES OF COMPUTER VIRUS
1. Use a lot of resources and makes the pc slow
2. It is slow to scan
3. It is suitable for computers with at least 512 Memory Ram
4. The connection options, search and protection are very small and limited, forcing many secondary having to endure unwanted program executions.
5. Analyzes few files (zip, ace, rar)
6. It is not free software
7. You may be lacking other options
8. Some problems detecting the tablets
9. Detects unless Kaspersk
2) Virus Created to affect first the COMMAND.COM file and from it spread to other vital areas of the system, such as the boot sector or the Master Boot Record system.-.
DISADVANTAGES OF COMPUTER VIRUS
1. Use a lot of resources and makes the pc slow

3. It is suitable for computers with at least 512 Memory Ram
4. The connection options, search and protection are very small and limited, forcing many secondary having to endure unwanted program executions.
5. Analyzes few files (zip, ace, rar)
6. It is not free software
7. You may be lacking other options
8. Some problems detecting the tablets
9. Detects unless Kaspersk
COMPOSITION OF COMPUTER VIRUS
Viruses can be divided into 4 main components technically:
Reproduction.- consists in the ability of the program to reproduce itself, it is the only prerequisite for a program to be considered VIRUS component.
Protection.- is the ability to defend themselves from antivirus programs, this is done using stealth techniques, encryption, or other similar mutation.
Trigger (sink) .- It is the necessary condition to be met for the program to fire or turn on the computer, this condition may be a date, an accountant, an hour, a key or a specific action.
Payload (Effect) .- This is the way a virus manifests once triggered; Currently the effects it may have a virus on your computer can be in many different forms, from a simple message on the screen or a melody has
sta loss of files or formatting the hard disk.
TYPES OF VIRUSES
We can mainly distinguish the following types of viruses:
1) Virus That area of arranque.- installed in the boot sector of the hard drive of the infected computer, so that each time the computer is started and runs the virus is loaded into memory.

3) fichero.- virus or parasites are more common at present, and infect executable programs, .exe, .bat o.com. When the infected program is executed by the user while loading the virus is loaded as well, being resident in memory, and since then can track activity on the computer looking for other running programs to which contaminate
4) Virus That multiparticiones.- are a hybrid between viruses and boot sector program.
5) Polymorphic Viruses or mutacionales.- Ranging changing its own code as it is played, so that the chains that form are not the same from one copy to another. They can autoencriptarse each modification, so they are harder to detect and remove.
DAMAGES OF VIRUSES
Define harm as an unwanted action, and classify them according to the amount of time required to repair such damage. There are six categories of damage done by the virus, according to gravity.
trivial injuries
One example is the way to work (most common) virus FORM: On the 18th of each month we press any key sounds the beep. Getting rid of viruses generally involves seconds or minutes.
MODERATE DAMAGE
When a virus formats the hard drive, mixing the components of the FAT (File Allocation Table, File Allocation Table) or overwrites the hard drive. In this case, we know immediately what is happening, and we can reinstall the operating system and use the last backup. This may take us an hour.
MAJOR DAMAGE
Some viruses, because of their slow rate of infection and high ability to pass unnoticed, can make or even restoring a backup back to the last state of the data. An example of this is the DARK AVENGER virus that infects files and accumulates the number of infections that realized. When this counter reaches 16, choose a random disk sector and he writes the phrase "Eddie lives ... somewhere in time" (Eddie lives ... somewhere in time).
SEVERE DAMAGE
Severe damage is made when a virus makes minimal, gradual and progressive changes. We do not know when the data is correct or has changed, with no obvious clues as in the case of DARK AVENGER (ie, can not find the phrase Eddie lives ...).
DAMAGE LIMITED
Some programs like cheeba, VACSINA.44.LOGIN and GP1 among others, obtain the administrator password prompt, and pass it to a third party. It is clear that these are not viruses but trojans. For Cheeba, create a new user with maximum privileges, setting the user name and password. The damage is then done by a third person, who would enter the system and q Changing what programs to stop working
t, runs or inadvertently accepts installation of the virus. In the second, the malware acts replicating across networks. In this case one speaks of worms.
In either case, the infected operating system begins to undergo a series of abnormal behavior or unexpected. These behaviors may give a clue to the problem and allow the recall.
Among the most frequent contamination by user interaction are the following:
Posts that automatically run programs (such as direct mail program that opens an attachment).
Social engineering, messages and run this program and win, or more commonly: Make 2 clicks and earn 2 free mobile ringtones ..
Input in disks of other infected users.
Installing software modified or dubious.
In the Windows system may be the case that the computer can be infected without any user intervention (Windows 2000, XP and Server 2003 versions) by viruses like Blaster, Sasser and its variants by simply being connected to the machine a network or the Internet. These viruses exploit a buffer overflow vulnerability and network ports to infiltrate and infect the computer, cause instability in the system, display error messages, forwarded to other machines via the local network or the Internet and to reboot, among other damage. In recent versions of Windows 2000, XP and Server 2003 has corrected this problem mostly
DAMAGE FROM COMPUTER VIRUS
DAMAGES OF VIRUSES
Define harm as an unwanted action, and classify them according to the amount of time required to repair such damage. There are six categories of damage done by the virus, according to gravity.

One example is the way to work (most common) virus FORM: On the 18th of each month we press any key sounds the beep. Getting rid of viruses generally involves seconds or minutes.
MODERATE DAMAGE
When a virus formats the hard drive, mixing the components of the FAT (File Allocation Table, File Allocation Table) or overwrites the hard drive. In this case, we know immediately what is happening, and we can reinstall the operating system and use the last backup. This may take us an hour.
MAJOR DAMAGE
Some viruses, because of their slow rate of infection and high ability to pass unnoticed, can make or even restoring a backup back to the last state of the data. An example of this is the DARK AVENGER virus that infects files and accumulates the number of infections that realized. When this counter reaches 16, choose a random disk sector and he writes the phrase "Eddie lives ... somewhere in time" (Eddie lives ... somewhere in time).
SEVERE DAMAGE
Severe damage is made when a virus makes minimal, gradual and progressive changes. We do not know when the data is correct or has changed, with no obvious clues as in the case of DARK AVENGER (ie, can not find the phrase Eddie lives ...).
DAMAGE LIMITED

METHODS OF PROPAGATION
There are two major classes of contagion. In the first, the user, at a given moment, runs or inadvertently accepts installation of the virus. In the second, the malware acts replicating across networks. In this case one speaks of worms.
In either case, the infected operating system begins to undergo a series of abnormal behavior or unexpected. These behaviors may give a clue to the problem and allow the recall.
Among the most frequent contamination by user interaction are the following:
Posts that automatically run programs (such as direct mail program that opens an attachment).
Social engineering, messages and run this program and win, or more commonly: Make 2 clicks and earn 2 free mobile ringtones ..
Input in disks of other infected users.
Installing software modified or dubious.
In the Windows system may be the case that the computer can be infected without any user intervention (Windows 2000, XP and Server 2003 versions) by viruses like Blaster, Sasser and its variants by simply being connected to the machine a network or the Internet. These viruses exploit a buffer overflow vulnerability and network ports to infiltrate and infect the computer, cause instability in the system, display error messages, forwarded to other machines via the local network or the Internet and to reboot, among other damage. In recent versions of Windows 2000, XP and Server 2003 has corrected this problem mostly
Excelente
ResponderEliminar