Pinterest Stumbleupon Whatsapp
Advertisement

Just like human viruses, computer viruses come in many forms and can affect your machine in different ways. Obviously, your computer isn’t going to spend a week in bed and need a course of antibiotics, but a severe infection can wreak havoc on your system. They can delete your files, steal your data 5 Ways Hackers Can Use Public Wi-Fi to Steal Your Identity 5 Ways Hackers Can Use Public Wi-Fi to Steal Your Identity You might love using public Wi-Fi -- but so do hackers. Here are five ways cybercriminals can access your private data and steal your identity, while you're enjoying a latte and a bagel. Read More , and easily spread to other devices on your network.

In this article, I’m going to introduce you to seven of the most common computer viruses. I’ve excluded Trojan horses and worms; although they might display similar symptoms to a virus, they are technically not the same thing.

1. Boot Sector Virus

From a user perspective, boot sector viruses are some of the most dangerous A Look at Some of the Worst Computer Viruses in History A Look at Some of the Worst Computer Viruses in History Read More . Because they infect the master boot record, they are notoriously difficult to remove, often requiring a full system format. This is especially true if the virus has encrypted the boot sector or excessively damaged the code.

They typically spread via removable media. They reached a peak in the 1990s when floppy disks were the norm, but you can still find them on USB drives and in email attachments. Luckily, improvements in BIOS architecture have reduced their prevalence The Internet Archive Shines A Light On Viruses of Yesteryear The Internet Archive Shines A Light On Viruses of Yesteryear The Internet Archive has revealed they have been archiving something which we didn't expect: malware. It sounds bizarre, but there's a pretty good reason for it. Read More in the last few years.

2. Direct Action Virus

A direct action virus is one of the two main types of file infector viruses (the other being a resident virus). The virus is considered “non-resident”; it doesn’t install itself or remain hidden in your computer’s memory.

It works by attaching itself to a particular type of file (typically EXE or COM files). When someone executes the file, it springs into life, looking for other similar files in the directory for it to spread to.

Advertisement

On a positive note, the virus does not typically delete files nor hinder your system’s performance. Aside from some files becoming inaccessible, it has a minimal impact on a user and can be easily removed with an anti-virus program.

3. Resident Virus

Resident viruses are the other primary type of file infectors. Unlike direct action viruses, they install themselves on a computer. It allows them to work even when the original source of the infection has been eradicated. As such, experts consider them to be more dangerous than their direct action cousin.

virus-keyboard
Image Credit: Roobcio via Shutterstock.com

Depending on the programming of the virus, they can be tricky to spot and even trickier to remove. You can split resident viruses into two areas; fast infectors and slow infectors. Fast infectors cause as much damage as quickly as possible and are thus easier to spot; slow infectors are harder to recognize 10 Signs Your Computer Is Infected With A Virus 10 Signs Your Computer Is Infected With A Virus You have a sneaking suspicion that you computer has a virus. Why? Read More because their symptoms develop slowly.

In a worst-case scenario, they can even attach themselves to your anti-virus software, infecting every file the software scans. You often need a unique tool – such as an operating system patch – for their total removal.

4. Multipartite Virus

While some viruses are happy to spread via one method or deliver a single payload, Multipartite viruses want it all. A virus of this type may spread in multiple ways, and it may take different actions on an infected computer depending on variables, such as the operating system installed or the existence of certain files.

They can simultaneously infect both the boot sector and executable files, allowing them to act quickly and spread rapidly.

The two-pronged attack makes them tough to remove. Even if you clean a machine’s program files, if the virus remains in the boot sector, it will immediately reproduce once you turn on the computer again.

5. Polymorphic Virus

According to Symantec, polymorphic viruses are one of the most difficult to detect for an anti-virus program. It claims anti-virus firms need to “spend days or months creating the detection routines needed to catch a single polymorphic”.

But why are they so hard to protect against? The clue is in the name. Anti-virus software can only blacklist one variant of a virus – but a polymorphic virus changes its signature (binary pattern) every time it replicates. To an anti-virus program, it looks like an entirely different piece of software, and can, therefore, elude the blacklist 3 Things Your Antivirus Doesn't Take Care Of 3 Things Your Antivirus Doesn't Take Care Of Antivirus softwre should be installed on every computer, but what doesn't it take care of? Which aspects of your antivirus could leave you or your business exposed, even when you've installed and updated? Read More .

6. Overwrite Virus

To an end-user, an overwrite virus is one of the most frustrating, even if it’s not particularly dangerous for your system as a whole.

That’s because it will delete the contents of any file which it infects; the only way to remove the virus is to delete the file, and consequently, lose its contents. It can infect both standalone files and entire pieces of software.

Overwrite viruses typically have low visibility and are spread via email, making them hard to identify for an average PC user. They enjoyed a heyday in the early 2000s with Windows 2000 and Windows NT, but you can still find them in the wild.

7. Spacefiller Virus

Also known as “Cavity Viruses”, spacefiller viruses are more intelligent than most of their counterparts. A typical modus operandi for a virus is to simply attach itself to a file, but spacefillers try to get into the empty space which can sometimes be found within the file itself.

This method allows it to infect a program without damaging the code or increasing its size, thus enabling it to bypass the need for the stealthy anti-detection techniques other viruses rely on.

Luckily, this type of virus is relatively rare, though the growth of Windows Portable Executable files is giving them a new lease of life.

Prevention is Better Than the Cure

As always, taking sensible steps to protect yourself is preferable to dealing with the potentially crippling fallout if you’re unlucky enough to get infected.

Use a highly-regarded anti-virus suite 5 Best Free Internet Security Suites for Windows 5 Best Free Internet Security Suites for Windows Which security suite do you trust the most? We look at five of the best free security suites for Windows, all of which offer anti-virus, anti-malware, and real-time protection features. Read More , don’t open emails from unrecognized sources, don’t trust free USB sticks from conferences and expos ConferenceCalendar: Track Conferences Around the World ConferenceCalendar: Track Conferences Around the World Read More , don’t let strangers use your system, and don’t install software from random websites.

Has a computer virus devastated your machine? How did you encounter it? How did you cure it? Share you own stories and experiences in the comments below.

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. Adjei Williams
    June 4, 2017 at 7:32 pm

    Useful articles very good

  2. Pavith Prakash
    March 29, 2017 at 4:33 pm

    It is useful

  3. Gena Lott
    February 11, 2017 at 8:39 pm

    Easy to understand and good information. Thanks!

  4. joaness katabalo
    January 4, 2017 at 8:06 am

    seen thanks for your point

  5. Om ahuja
    November 28, 2016 at 3:08 am

    You missed logic bombs Trojans worms etc

  6. Sam
    August 26, 2016 at 3:15 am

    my nigga learn to count

    • Slay
      January 11, 2017 at 10:31 pm

      LMAOOO

  7. simon
    August 11, 2016 at 10:31 am

    hello

    my memstick got infected by a software that recreates uuuuuu folders
    i have tried to format the memstick but on creating a new folder the the files fill it up
    any help i would appreciate

  8. Kelvin100WILLIAMS
    July 5, 2016 at 7:34 am

    ther is no Overwrite virus,Macro virus,Sparse Infectors,Spacefiller(Cavity)virus and also FAT Virus.

  9. emmanuel makui
    July 1, 2016 at 9:25 am

    w are learning types of viruses and your notes are good for learning

  10. harvey
    June 13, 2016 at 8:54 am

    ive got a massive deck

  11. harvey
    June 13, 2016 at 8:52 am

    im in a computing lesson ty

  12. samifss
    June 2, 2016 at 10:40 pm

    203.202.252.189/hms

  13. Nigga
    May 25, 2016 at 1:47 am

    No #2, 5, 8, or 9?

  14. Sky Blue
    April 5, 2016 at 3:30 am

    Why is Grouvi App not available at Malaysia :(

  15. Luckless Person
    March 29, 2016 at 4:05 am

    thanks for share this post

  16. Peter Anton
    May 28, 2015 at 3:47 pm

    Super great article ! Is there a way to notice a possible virus simply by the kb of a file ?

    • letsplayordy
      June 10, 2015 at 6:45 pm

      Yes, but by number of bytes would be more effective. You could also compare hashes of the original and the new file.

  17. 1yohcAD
    May 1, 2015 at 11:35 pm

    I am sure there is many more (undiscovered) types of viruses, rootkits, worms & Trojans out there!

  18. Maaz
    March 29, 2015 at 11:28 am

    good information and all people seek them .

  19. Parviz
    March 26, 2015 at 1:44 pm

    Thanx so much:)

  20. charmi somaiya
    March 14, 2015 at 2:25 am

    vao wht a wonderful book it is to read carefully and think about this

  21. prema
    March 5, 2015 at 10:47 am

    good information thankyou

  22. Akanksha
    December 10, 2014 at 10:26 am

    Any idea about what is a Stealth virus??

    • manan
      January 3, 2015 at 5:52 pm

      A stealth virus is the 1 which camouflages or masks itself in order to remain undiscovered.It alters the file size and thus remains undetected by antiviruses..:)..btw vry nice web site..

    • sakina bohra
      February 22, 2015 at 4:51 pm

      they have the capability to hide from antivirus by making changes to file size or directory structure . they are anti-heuristic.

    • joy jackson
      March 3, 2015 at 6:40 pm

      a stealth virus hides itself by making an infected file appear not affected

  23. M.S. Smith
    March 7, 2011 at 8:45 am

    A resident virus isn't always a Trojan but a Trojan would be one example of such a virus. Most viruses today are of the resident type, IIRC.

  24. M.S. Smith
    January 9, 2011 at 5:04 pm

    The terms are always a bit vague by their nature. A Trojan might also be considered a worm if it self-replicates using software or hardware exploits; a worm might be a rootkit if it tries to hide itself by embedding into critical operating system files. The number of terms is why the general catch-all "malware" is often used to describe threats.

    As far as the signs to look for - unexplained CPU or network utilization, programs or web pages that open at random, and changes to programs that you don't remember approving are all signs of a malware threat.

  25. Robholyfield
    January 6, 2011 at 10:11 am

    I have always wondered about "rootkits" and have run a but few searches; however, they failed to help me understand. Maybe an article someday about rootkits, bots, worms and trojans with info on how they work and how to avoid them (other than antivirus SW and avoidind porn sites). Maybe something about if and how to recognize problems as early as possible between reg. sched. scans.

    • Aibek
      January 9, 2011 at 1:52 pm

      thanks for the input, we are going to do a few articles explaining rootkits and alike and how to avoid get infected.

    • M.S. Smith
      January 9, 2011 at 4:04 pm

      The terms are always a bit vague by their nature. A Trojan might also be considered a worm if it self-replicates using software or hardware exploits; a worm might be a rootkit if it tries to hide itself by embedding into critical operating system files. The number of terms is why the general catch-all "malware" is often used to describe threats.

      As far as the signs to look for - unexplained CPU or network utilization, programs or web pages that open at random, and changes to programs that you don't remember approving are all signs of a malware threat.