Carding
Professional
- Messages
- 2,871
- Reaction score
- 2,467
- Points
- 113
Computer viruses are a type of malicious programs that can be embedded in the code of other applications and reproduced by copying themselves. They are also capable of distributing their copies through various communication channels.
A computer virus is created in order to reduce the functionality of the hardware and software structures of computing devices: delete files, damage data, block the user's work. The impact of infections can be not only destructive but also annoying, as they slow down the operating system, lead to crashes and sudden reboots, and reduce free memory space. The authors of such viruses were often researchers or computer hooligans with no selfish intent.
Users often use the term "computer viruses" to refer to the variety of malicious programs, but this is not entirely true. Nowadays, computer viruses that infect files are very rare - unlike, for example, Trojans or backdoors.
Classification of computer viruses
Computer viruses can be systematized by the platforms they target and for which operating systems they are written (Microsoft Windows, Linux, etc.), as well as by the objects of infection (boot, file, script), by the technologies used, by the programming languages.
Viruses can also be classified according to their mode of action:
Object of influence
Any computer can be the target of damage, but most viruses target the Windows platform. New computer viruses capable of replicating and infecting executable files are rare today. The peak of their distribution came at the end of the 90s of the XX century. With the spread of computer networks and the Internet, file viruses began to rapidly lose their relevance, as simpler ways of spreading malicious programs appeared.
Source of threat
There are several main ways of infecting computer systems with file viruses.
1. Removable media. These can be pre-prepared floppy disks, optical disks, USB PayPals. Floppy disks are not relevant today, but mobile phones and smartphones, digital cameras, camcorders and players have joined the ranks of carriers of dangerous information.
2. Through local networks. Once on a file server, a virus spreads quickly to other computers.
Risk analysis
Any user's computer can become a victim of viruses. The damage done ranges from simply slowing down the system to complete failure of the machine and damage to files. Every year there are new types of viruses that can bypass the usual methods of protection. For example, in Russia, a fileless virus was seen interfering with ATMs. This is described in the article "Carders invented a new way to empty ATMs."
To protect computer systems, it is necessary to use antivirus programs and regularly update them, do not download or run programs from unreliable sources, scan removable media for viruses, ignore suspicious letters and messages. It is recommended that you back up important information.
A computer virus is created in order to reduce the functionality of the hardware and software structures of computing devices: delete files, damage data, block the user's work. The impact of infections can be not only destructive but also annoying, as they slow down the operating system, lead to crashes and sudden reboots, and reduce free memory space. The authors of such viruses were often researchers or computer hooligans with no selfish intent.
Users often use the term "computer viruses" to refer to the variety of malicious programs, but this is not entirely true. Nowadays, computer viruses that infect files are very rare - unlike, for example, Trojans or backdoors.
Classification of computer viruses
Computer viruses can be systematized by the platforms they target and for which operating systems they are written (Microsoft Windows, Linux, etc.), as well as by the objects of infection (boot, file, script), by the technologies used, by the programming languages.
Viruses can also be classified according to their mode of action:
- Rewriters. Such infections write themselves instead of the original program code without changing the file name. As a result, the infected application simply stops working and the malware is executed instead.
- Parasitic. These viruses inscribe their code anywhere in the executable file. The infected program works in whole or in part.
- Companion viruses. After self-copying, they rename or move the original file. As a result, the legitimate program works, but only after the virus code has been executed.
- Link viruses. Such malicious code changes the location of the software to its own. Thus, it forces the operating system to run it without any changes to the code of other applications.
- Destructive viruses. This can include malicious objects that simply damage the original code of the program or its components in order to disable them.
Object of influence
Any computer can be the target of damage, but most viruses target the Windows platform. New computer viruses capable of replicating and infecting executable files are rare today. The peak of their distribution came at the end of the 90s of the XX century. With the spread of computer networks and the Internet, file viruses began to rapidly lose their relevance, as simpler ways of spreading malicious programs appeared.
Source of threat
There are several main ways of infecting computer systems with file viruses.
1. Removable media. These can be pre-prepared floppy disks, optical disks, USB PayPals. Floppy disks are not relevant today, but mobile phones and smartphones, digital cameras, camcorders and players have joined the ranks of carriers of dangerous information.
2. Through local networks. Once on a file server, a virus spreads quickly to other computers.
Risk analysis
Any user's computer can become a victim of viruses. The damage done ranges from simply slowing down the system to complete failure of the machine and damage to files. Every year there are new types of viruses that can bypass the usual methods of protection. For example, in Russia, a fileless virus was seen interfering with ATMs. This is described in the article "Carders invented a new way to empty ATMs."
To protect computer systems, it is necessary to use antivirus programs and regularly update them, do not download or run programs from unreliable sources, scan removable media for viruses, ignore suspicious letters and messages. It is recommended that you back up important information.