Solution For Tech Computer Warranty - Complete Computer Shop "Solution For Tech

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 30 November 2012

Types Of Viruses

Posted on 08:34 by Unknown
1. Encrypted Viruses – The encrypted virus is probably the most difficult kind of bug to detect and the most difficult to stop. You may accidentally have downloaded one of these bugs and before you know it, your entire computer can be infected. Many top virus protection programs miss encrypted viruses because these bugs use a different form of encryption every time. When the bug wants to run wild, it decrypts itself. In most cases, your virus protection can then identify it and stop it.

2. Secret Viruses – These types of viruses will make changes to files on your computer, or completely replace files, but then try to trick your computer and your anti virus program into thinking that the originals are being used. Most advanced virus protection programs can stop these common computer viruses dead in their tracks.

3. Time Delay Viruses – These types of viruses take a much slower, more disciplined path towards ruining your computer. Instead of instantly trying to take over your computer the moment you download them, they will wait and slowly infect files bit by bit. You may not have been online for days but then suddenly find yourself with an infection. These common computer viruses are the reason why you should run your virus protection every few days, just in case.

4. The Anti-Virus Virus – Believe it or not, there are viruses out there that do nothing more than attack your pre-installed anti virus program in hopes of disabling it so other viruses can then be downloaded. This is why many people have a virus protection program as well as a separate anti-spyware or anti-malware program on their computer.

5. The Multi-Headed Virus – This is one of the most nefarious bugs on the whole Internet. Not only are there parts of this virus that will attach themselves to .exe files on your computer, but it will also affect your computer’s start up so that you begin running the virus every time you turn your computer on automatically.

6. The Misdirection Virus – This type of virus is downright scary. It has a built in subprogram that is made to give false readings to your virus protection software. You think you have a bug in one directory, when, in fact, the virus is busy harming your computer in a whole other area.

7. A Cloning Virus – The cloning virus is an old fashioned type of bug. When you download it, it will quickly create duplicates for .exe files you have on your computer, hoping that you’ll click on it when you really mean to click on a healthy program you already have.

8. The Author Virus – When you download a virus, it usually attaches itself to a program and then runs when you run that program. The Author Virus, on the other hand, finds an .exe file and actually deletes and rewrites code so that the program is changed. Few common computer viruses run this way since the level of virus needs to be so sophisticated.

9. The Bad Penny Virus – The very first computer virus to ever hit the Internet was a Bad Penny virus. This is a bug that automatically passes itself on to everyone on a network or on the Internet unless something stops it. This was the whole reason why firewalls were invented.

10. When most of us think of viruses, we think of PC’s running Windows software. However, there are a handful of bugs out there for the Mac.

11. Rewriting Virus – This bug made a habit out of rewriting some of your most needed files, as well as filling up your hard drive with all sorts of invisible files you couldn’t normally see.

12. The Melissa Virus – This was a bug that hit everyone, both PC users and Mac users. It would automatically email itself to other people without permission. It can be extra harmful if you use a private mail server at your place of employment. The Melissa virus has gone down in history as one of the most common computer viruses of all time.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • New Year Resolution For Computer Users
    The start of a new year is always a good time to reflect and make new resolutions. While most people vow to exercise more often, quit smoki...
  • How to completely erase the harddrive on PC and install Windows Xp?
    Follow the below steps. Step 1: Make sure you have your Windows XP disk. Then backup all your important data and all the installers onto a p...
  • How to Troubleshoot Safari Browser
    Safari is a stable and versatile browser for the Mac operating system. If it is not operating properly, there are several possible reasons. ...
  • Solution For Tech - Is it a Scam?
    Solution For Tech Ltd, Basingstoke - UK has been formed with the idea to help users, whenever they require it. It aims to help novice users ...
  • How To Extend Your Laptop's Battery Life ?
    Making sure your laptop is ready to run at all times and in any location is important for mobile office professionals. Here's How: Use t...
  • How to create and deploy Image from partition locked by Bit Locker?
    How to create and deploy Image from partition locked by Bit Locker? How to enable bit locker on partition? Below are the steps to enable bit...
  • How to Create a New Gmail account and how to protect it from hackers?
    Gmail is an  email service provided by search engine giant Google. When Gmail was first created, users could only create a Gmail account I...
  • Certified Toolbar Redirection Virus
    Yesterday one of our Customer called up he was facing problem while changing his browsers home page, when he opened the Internet Explorer b...

Categories

  • 24 hours computer support
  • Accepting payment in Different Currencies
  • Blue Screen Errors
  • Bootable Pendrive
  • Bootable USB
  • Bootable Windows 7
  • Cooling Fan
  • Create Gmail Account
  • Create System Restore Disk yourself
  • Create Yahoo Emails
  • customers review
  • DCC
  • Difference between Onsite and Offsite Support
  • Discounted Softwares
  • Dual Boot
  • Dynamic Currency converter
  • Employees review
  • Failed to connect to a window service
  • Failed to connect to a window Service error
  • Find PC Technicians
  • Free Softwares
  • GfxUI has stopped working
  • Gmail Account From Hackers
  • graphic card issue
  • hotmail
  • hotmail password
  • hotmail password recovery
  • Is it really a Scam?
  • Keyboard shortcuts
  • Laptop
  • Laptop heats up
  • Laptop Speed up. Laptop Protection
  • Learn keyboard shortcuts
  • Longer Life For Laptops
  • Make Bootable USB Pendrive
  • malware
  • Microsoft Certification
  • Microsoft Certified
  • Microsoft Computers
  • Online Technical Support
  • Payment types
  • PC Technicians
  • PC Technicians in UK
  • Phone Support
  • Pound Sign on Keyboard
  • Process flow
  • Ransomware
  • Recover Gmail Password
  • Recovery Disk
  • Remote desktop Support
  • Remote Support
  • Repair Windows 7
  • Restore Disk
  • Security Scans
  • SFT accepts Master card
  • SFT accepts Visa
  • SFT Copyright
  • SFT team
  • SFT Trademark
  • signin
  • Slow Shut Down
  • Slow Start up time
  • Slow Windows Boot
  • Solution For Tech
  • Solution For Tech - Scam Alert
  • Solution For Tech is a scam
  • Solutionfortech - Scam Alert
  • spyware
  • Technical Helpdesk
  • Too much to load the windows
  • Tune Up and Maintenance
  • What is PC Technicians?
  • What is SFT Technicians? Locate PC Technicians
  • Yahoo Email
  • Yahoo Email Account
  • yahoo email password
  • Yahoo Email recovery
  • Yahoo password hacked

Blog Archive

  • ►  2013 (19)
    • ►  March (5)
    • ►  February (5)
    • ►  January (9)
  • ▼  2012 (36)
    • ►  December (16)
    • ▼  November (2)
      • Types Of Viruses
      • Viruses in 2012
    • ►  September (1)
    • ►  June (3)
    • ►  April (3)
    • ►  March (1)
    • ►  February (9)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile