By surfing the internet, you’re exposing yourself to a vast assortment of security threats.
Some of the most common risks are computer viruses. Various kinds of viruses may try to slither into your computer and spread a disease throughout the system. And while many are similar in function, most have noteworthy distinctions that set them apart.
According to Symantec, among the leading developers of anti virus applications, all viruses fall under five major groups.
MBR (Master Boot Record) viruses:
- Macro viruses
- Multi-part viruses
- Boot sector viruses
- File infector viruses
As its name indicates, the function of a file infector is to infect the files of a computer. This is one of the most often deployed viruses and has been known to inflict appreciable damage.
Upon running a program that’s been corrupted by a file infector, the virus copies the malicious code and applies it to other executable software on the computer. Files which are the most vulnerable to this sort of infection bare the extensions of EXE. (execute) and .COM (control ), though any document capable of implementation can be infected.
A favorite example of the file infector is the Cascade virus, an illness that has essentially become obsolete. The original variation of the virus was designed to deliver a payload from October 1st through December 31st in 1988. Upon implementation, the figures on the sufferer’s screen descend and find themselves stacked in the bottom of the screen.
The Cascade virus has spawned numerous variants through the years, the majority of which have shown the exact same basic function. A more recent illustration of a file infector is that the Cleevix virus, and this is reported to be found in January of 2006. When implemented, it seeks out the current directory, the system directory and the Windows directory. It then infects all portable executable files inside them.
Since the disease typically shows a message upon execution, it’s rather easy to detect. Other than being outfitted with a couple of security features, Cleevix as a fairly simple virus which can be removed effortlessly.
Although there are lots of different types of file infector viruses, the majority of them operate the exact same and take the next course of actions. – When a user executes an infected document, the virus copies the document and puts into a region where it can be implemented.
The malicious code runs while the infected file stays quiescent, the virus then copies itself at a place separate from where the disease occurred, letting it constantly infect files as the user acts other applications.
When the first process is set into place, the virus grants control back to the infected document. When a user opens another program, the dormant virus proceeds to operate again.
It then inserts a copy of itself into documents that were previously uninfected which empowers the cycle to repeat consistently, file infectors can be both a hassle, in addition to a tremendous risk to your computer. Because of this, it’s suggested to secure your system with anti virus software that receives free upgrades for the most recent virus definitions.