ComputersSecurity

What are the distinguishing features of a computer virus?

Viruses that negatively affect computer systems, today nobody is surprised. But here's how to recognize the threat on time even without the presence of a security software installed in the system, not everyone knows. Distinctive features of the computer virus are several basic features, which will now be discussed.

What is computer viruses?

Everyone who uses a computer or mobile device in everyday life must know what the viruses are.

If you look at threats in general terms, they are special programs, applets or files with executable codes that lead to disruption of the systems themselves, theft or complete destruction of user data. There is also a separate category of extortion viruses, which first encrypt files, and then require payment for decryption.

Computer virus: a variety of effects

Among all the many threats that are known to date, there are several main classes in which computer viruses are combined by degree and method of impact on the system.

On this basis, it is possible to classify viruses. But once it is worth saying that the list will be very conditional. This looks approximately as follows:

  • Harmless threats (the distinctive features of the computer virus are the reduction of disk space on the hard drive and the use of too much RAM due to self-propagation);
  • Non-dangerous viruses (basically, except for memory reduction, use sound or video effects);
  • Dangerous programs (lead to the hanging of computer systems and non-critical malfunctions);
  • Very dangerous applications and applets (imply a complete system outage, destruction or modification of information, formatting of the hard disk or its logical partitions, stealing confidential information).

Classification of viruses by habitat

There is also an alternative classification. Analysis of modern computer viruses allows us to present one more list:

  • File threats that are introduced into documents or programs;
  • Boot viruses that affect the Boot-sectors of operating systems;
  • Macro viruses that use executable commands, applets and macros in office documents, infecting a standard template;
  • Network threats that spread through the Internet and local networks.

The main features of computer viruses

Now we proceed to the question of the specifics of such threats directly. Typically, the distinguishing features of a computer virus are the following factors:

  • Small amount of application or file with executable code;
  • Use automatic self-launch;
  • Constant copying of the embedded code for the purpose of cloning;
  • The creation of interference in the work of software and hardware components of the PC.

Scanning and protection tools

Proceeding from the fact that the main features of the computer virus are the above factors, you can devote several lines of protection to them.

To date, full-time or portable scanners have been developed quite a lot. If we talk about viruses and anti-virus programs, it can be noted that the software products of such developers as Kaspersky Lab, Dr. Web, Eset, etc. But such packages are paid, although it is possible to use trial versions with a permanent activation for 30 days.

Free antivirus utilities are also used, but they sometimes do not meet the security requirements and are able not only to miss the penetrating threats, but also cause conflicts at the hardware and software level (lack of support for some drivers, disconnect with the firewall application or even the "iron" firewall) .

In addition, such programs have completely different functionality. Some are able to detect and neutralize viruses with executable codes that violate the OS, others can get rid of spyware or mass mailing of advertisements. And the saddest thing is that no known today product can not cope with the decryption of user files, which is produced by viruses-extortioners using AES 1024 technology. This is noted even in Kaspersky Lab.

What to use for protection? It's best to install paid packages. Here you can be 99.9% sure that the threat will be detected in a timely manner and will not harm the system or user information.

If you need a one-time scan for threats with obvious signs of infection, you can use free portable utilities or special applications with the common name Rescue Disk. They are the most effective, since they start before the operating system is loaded and even identify threats that can not be detected in the usual way.

Instead of the total

As you can see, the distinctive features of the computer virus are all known signs (maybe someone just did not pay attention to them). Nevertheless, this brief information will be enough to notice the first signs of infection in time if there is no anti-virus software in the system, although it is better to have it. And which package to choose depends on the user, the administrator of the computer terminal or the network. After all, modern programs often use heuristic analysis, and virus databases are updated even several times a day.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.delachieve.com. Theme powered by WordPress.