Virus Can Crash Window. Virus Can Remove Window Files Due To This The Computer System Slow Down. Virus Can Stole The Valuable Data of Your Computer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Gilbert Ramirez

BSCS II

Cs 111

Give Examples of computer Virus in compuater at least 5

1. Meaning
2. Function
3. Disadvantages
4. Created

1.WORM VIRUS

-Meaning

Computer worm is a standalone malware computer program that replicates itself in order to spread
to other computers. It often uses a computer network to spread itself, relying on security failures on
the target computer to access it. It will use this machine as a host to scan and infect other
computers.

-Function

Worms can modify and delete files, and they can even inject additional malicious software onto a
computer. Sometimes a computer worm’s purpose is only to make copies of itself over and over —
depleting system resources, such as hard drive space or bandwidth, by overloading a shared
network.

-Disadvantages
 Virus can crash window.
 Virus can remove window files due to this the computer system slow down.
 virus can stole the valuable data of your computer.

-Created

On November 2, 1988, a computer science student at Cornell University named Robert Morris
released the first worm onto the Internet from the Massachusetts Institute of Technology. (As a
guest on the campus, he hoped to remain anonymous.)

2. TROJAN VIRUS

-Meaning

In computing, a Trojan horse is any malware which misleads users of its true intent. The term is
derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of
Troy.

-Function
How Trojans can impact you. A backdoor Trojan gives malicious users remote control over the
infected computer. They enable the author to do anything they wish on the infected computer –
including sending, receiving, launching and deleting files, displaying data and rebooting the
computer.

-Disadvantages

A virus or a Trojan may delete critical system elements, thus disabling the OS, overload the network
with a DDoS attack, or otherwise negatively affect the system’s operability. Fatal problems are often
caused by a bug in the virus’ code or principle of operation.

-Created

Called ANIMAL, the first Trojan (although there is some debate as to whether this was a Trojan, or
simply another virus) was developed by computer programmer John Walker in 1975, according to
Fourmilab.

3. BOOT SECTOR VIRUS

-Meaning

Boot sector virus is a type of virus that infects the boot sector of floppy disks or the Master Boot
Record (MBR) of hard disks (some infect the boot sector of the hard disk instead of the MBR). ...
While boot sector viruses infect at a BIOS level, they use DOS commands to spread to other floppy
disks.

-Function

The boot sector contains all the files required to start the operating system (OS) and other bootable
programs. The viruses run at boot up, allowing them to execute malicious code during start-up time
– before many security layers are executed, including antivirus software. There are two types of boot
sector viruses.

-Disadvantages

A boot sector virus can cause a variety of boot or data retrieval problems. In some cases, data
disappear from entire partitions. In other cases, the computer suddenly becomes unstable. Often
the infected computer fails to start up or to find the hard drive.

-Created

Who created the first boot sector virus? Richard Skrenta created the first boot sector virus, called
Elk Cloner, in 1981.

4.WEB SCRIPTING VIRUS


-Meaning

Web Scripting Virus is malware that has the capacity to breach web browser security. When it
breaches the web browser security, it injects some malicious code to take over the web browser and
alter some settings. This type of malware spreads like any other computer virus.

-Function

Functions of the web scripting virus :

It breaches the web browser security to take over the web browser and make some changes in it.

It can also be used for sending spam emails(phishing).

It can also spread and affect the system of the user through ads that pop-up on the webpage.

It can also be used to create a malicious link, which could be sent as an attachment in an Email.

Disadvantages

Disadvantage of the web scripting virus :

It can damage the data of the user.

It can be used to steal confidential data.

-Created

It all happened in six months from May to December 1995. Netscape Communications Corporation
had a strong presence in the young web. Its browser, Netscape Communicator, was gaining traction
as a competitor to NCSA Mosaic, the first popular web browser. Netscape was founded by the very
same people that took part in the development of Mosaic during the early 90s, and now, with
money and independence, they had the necessary freedom to seek further ways to expand the web.
And that is precisely what gave birth to JavaScript.

5.POLYMORPHIC VIRUS

-Meaning

In computing, polymorphic code is code that uses a polymorphic engine to mutate while keeping the
original algorithm intact. That is, the code changes itself each time it runs, but the function of the
code will not change at all.

-Function

Polymorphic viruses are complex file infectors that can create modified versions of itself to avoid
detection yet retain the same basic routines after every infection. Polymorphic viruses rely on
mutation engines to alter their decryption routines every time they infect a machine.

-Disadvantages

After a polymorphic decryptor can be detected, using it becomes a disadvantage to virus writers
because any new viruses are covered by the same detection. Such detections, however, usually
come with the price of several false positives and false negatives.

-@Created
The first known polymorphic virus was called 1260, or V2PX, and it was created in 1990 as part of a
research project. The author, computer researcher Mark Washburn, wanted to demonstrate the
limitations of virus scanners at that time.

You might also like