The information in this article applies to:
SUMMARY
A computer virus is an executable file designed to replicate itself and
avoid detection. A virus may try to avoid detection by disguising itself
as a legitimate program. Viruses are often rewritten and adjusted so that
they will not be detected. Anti-virus programs must be updated continuous-
ly to look for new and modified viruses. Viruses are the number-one method
of computer vandalism.
MORE INFORMATIONBoot-Sector VirusesWhen a computer boots (or starts), it looks to the boot sector of the hard disk before loading the operating system or any other startup files. A boot-sector virus is designed to replace the information in the hard disk's boot sectors with its own code. When a computer is infected with a boot-sector virus, the virus' code is read into memory before anything else. Once the virus is in memory, it can replicate itself onto any other disks that are used in the infected computer.The Form, Michaelangelo, Junkie Virus, and Ohio viruses are examples of this type of virus. A boot-sector virus can cause the following problems:
File-Infecting VirusesThis is the most common type of virus. A file-infecting virus attaches itself to an executable program file by adding its own code to the executable file. The virus code is usually added such that it escapes detection. When the infected file is run, the virus can attach itself to other executable files. Files infected by this type of virus usually have a .COM, .EXE, or .SYS extension.Some file-infecting viruses are designed for specific programs. Program types that are often targeted are overlay (.OVL) files and dynamic-link library (DLL) files. Although these files are not executed, they are called by executable files. The virus is transmitted when the call is made. Damage to data occurs when the virus is triggered. A virus can be triggered when an infected file is executed, or when a particular environment setting is met (such as a specific system date). The Friday the 13th, Enigma, Loki, and Nemesis viruses are examples of this type of virus. Trojan Horse ProgramsA Trojan horse program is not a virus. The key distinction between a virus and a Trojan horse program is that a Trojan horse program does not replicate itself; it only destroys information on the hard disk.A Trojan horse program disguises itself as a legitimate program such as a game or utility. A Trojan horse program often looks and initially acts like a legitimate program, but once it is executed, it can destroy or scramble data. A Trojan horse program can contain viruses, but is not a virus itself. The Aids Information, Twelve Tricks A and B, and Darth Vader programs are examples of Trojan horse programs. Commonly Asked Questions and Answers About Computer Viruses
Additional query words: 3.10 3.11 5.00 6.00 6.20 6.21 6.22 swapfile michaelangelo Anit-CMOSa Bloomington Enemy 2 Form Forms Friday 13th Jerusalem Keypress 1 1A 1C 1E JENB Little Red Li'l Monkey Mummy NOINT PSQR1-1364 SCR2 Screaming Fish II IIB Sticky [ML2] Stoned Sunday Yankee Doodle
Keywords : win31 msdos win95 wfwg |
Last Reviewed: December 20, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |