Joke Collection Website - News headlines - The latest virus types and names?

The latest virus types and names?

Computer viruses and worms are the most destructive types of malicious code because they have the ability to replicate and infect distant systems. Computer viruses can generally be divided into the following categories: Boot sector computer viruses File type computer viruses Compound type computer viruses Macro viruses Trojan/Trojan horse worms Other computer virus/malignant program code types and production techniques Boot sector computer viruses were the most popular in the mid-1990s The most common computer viruses are boot sector viruses, which are mainly spread through floppy disks in the 16-bit Disk Operating System (DOS) environment. Boot sector viruses will infect the boot sector in the floppy disk and the hard disk, and can also infect the master boot sector (MBR) in the user's hard disk. Once a computer is infected, every floppy disk read by the infected computer will be infected. Boot sector computer viruses spread like this: hidden in the disk, the computer virus has already resided in the memory before the system files are started. In this way, the computer virus can completely control the DOS interrupt function in order to carry out virus propagation and sabotage activities. Boot sector viruses designed to run on DOS or Windows 3.1 cannot spread on new computer operating systems, so such computer viruses are relatively rare. Typical example: Michelangelo is a boot sector virus. It infects the disk in the boot sector and the MBR in the hard disk. When this computer virus is resident in memory, it will infect all disks that are being read and that are not write-protected. In addition, Michelangelo will delete all files on the infected computer on March 6. File-based computer viruses File-based computer viruses, also known as parasitic viruses, usually infect executable files (.EXE), but some also infect other executable files, such as DLLs, SCRs, etc... Each time an infected file is executed , a computer virus will attack: the computer virus will copy itself to other executable files and continue to execute the original program to avoid being noticed by the user. Typical example: CIH will infect Windows95/98 .EXE files and cause serious damage on the 26th of every month. On the 26th of every month, this computer virus will try to overwrite some random data on the system's hard drive, making the hard drive unable to read the original data. In addition, this virus will try to destroy the data in FlashBIOS. Composite computer viruses Composite computer viruses have the dual characteristics of boot sector viruses and file viruses. Macro viruses differ from other computer virus types in that macro viruses attack data files rather than program files. Macro viruses specifically target specific application software and can infect macros attached to certain application software. It can be easily spread through email attachments, floppy disks, file downloads and group software, such as Microsoft Word and Excel. . Macro viruses are written in programming languages, such as Visual Basic or CorelDraw, which are easy to master. Macro viruses were first discovered in 1995 and soon became the most common type of computer virus. Typical example: JulyKiller, a computer virus, spreads in MSWord97 files through VB macros. Once the infected file is opened, the virus first infects the normal template (normal.dot), causing other opened files to be infected one by one. This computer virus is very destructive. If the month is July, the virus will delete all files in c:\. Trojan/Trojan Horse A Trojan or Trojan horse is a program that appears to be legitimate, but in fact performs some malignant and improper activities when executed. Trojans can be used as hacking tools to steal users' password information or destroy programs or data on the hard drive. Unlike computer viruses, Trojans do not replicate themselves. Its propagation technique is usually to trick computer users into implanting Trojan horses into their computers, such as through game attachments on emails.