subject: Some Common Types Of Virus [print this page] System virus System virus
The system of the virus prefix for: Win32, PE, Win95, W32, W95, etc. These viruses commonly Shared characteristics of can be infected Windows operating system *. Exe and *. DLL files, and through free antivirus download these documents are spread. Such as CIH virus.
Worm virus
The Worm virus prefix is: the Worm. This virus is through the network of characteristics or system spread hole, a large part of the worm has sent out poisonous mail, blocking the characteristics of the network. Such as shock wave (jam network), small postman (hair band poison mail), etc.
Trojan viruses, hackers, virus
Trojan virus the prefix is: Trojan, hackers virus name for general prefix Hack. The Trojan horse is through the network of characteristics or system vulnerability into a user's system and hide, and then to the outside of the leak user information, and hackers are a visual virus of the interface, user can to the computer remote control. Trojan viruses, hackers, is often come in pairs, namely Trojan virus responsible for invading the user's computer, and hackers may pass the virus to the Trojan viruses for control. Now the two types are more and more incline to at integration. The general Trojan such as QQ news tail Trojan Trojan. QQ3344, and we may meet more against the network game of Trojan virus such as Trojan. LMir. PSW. 60. Here to add, the virus in the name or what such as PSW PWD generally said the virus have steal passwords function (these letters generally for "password" English "password" abbreviation) some hacker programs such as: American network (Hack. Nether. Client), etc.
Script viruses
The Script of the virus prefix is: Script. The Script of the virus is to use scripting language characteristics were written, through the web page for the spread of the virus, such as red code (Script. Redlof). Script viruses will also have the following prefix: VBS, JS (show that is what the script writing), such as happy hour (VBS. Happytime), 14 (JS. Fortnight. C.s), etc.
In fact is also the script (ncsa) a virus, because of its particularity, so here is a separate into. The prefix (ncsa) is: Macro, the second prefix is: Word, Word97, Excel, Excel97 (may have other) one of them. All WORD97 and previous version only infection of the virus WORD97 WORD document as a second prefix, format is: Macro. WORD97; Only after all WORD97 infection by the virus version WORD document WORD as the second prefix, format is: Macro. WORD; Every infection and previous version only EXCEL97 EXCEL documents using EXCEL97 as the second virus prefix, format is: Macro. EXCEL97; Only after infection who EXCEL97 version of the document by EXCEL EXCEL virus as a second prefix, format is: Macro. EXCEL, and so on. This kind of characteristic of the virus can infect OFFICE series is document, and then through the OFFICE general template spread, such as: the famous beauty lisa
Back door virus
The back door of the virus prefix is: the Backdoor. The virus is spread through the network of characteristics, few corners to the system, to bring security hidden danger user's computer.
Virus planting program virus
This kind of virus of characteristics is to run from the body will release one or several new virus to the system directory, released by the new virus damage. Such as: ice BoZhongZhe (Dropper. BingHe2.2 C), MSN striker (Dropper. The Worm. Smibag), etc.
Destructive program virus
Destructive program of the virus prefix is: Harm. This kind of characteristic of the virus is itself has good icon to lure users click, when users click on this kind of virus, the virus will directly on the user's computer damage. Such as: format disk C (Harm. FormatC. F), Killer Command (Harm. Command. The Killer), etc.
Joke virus
The virus is prefix Joke, Joke. Also called prank virus. This kind of characteristic of the virus is itself has good icon to lure users click, when users click on this kind of virus, the virus will make all sorts of destruction operation to frighten the user, in fact virus did not make any damage to computer users. Such as: female the ghost (Joke. The Girl ghost) virus.
Bound machine virus
The virus is bound machine prefix: Binder. This kind of characteristic of the virus is virus authors will use specific bound program will virus and some applications such as QQ, IE tied up and on the surface is a normal documents, when users running these bound virus, will run on the surface of these applications, and then hide execution tied to the virus, which cause harm to the user. Such as: bind QQ (Binder. QQPass. QQBin), system killer (Binder. Killsys), etc.
Above is more common virus prefix, sometimes we will see some other, but relatively rare, here simple mention:
DoS: will for a specific host or server DoS attack;
Exploit: will automatically through the overflow the other party or his system vulnerability to spread itself, or he is itself a used for Hacking the spill tool;
HackTool: hackers tools, maybe itself is not destroy your own computer, but someone else will be use to use your avatars to destroy others do.
You can find out a virus in the future by the said preliminary judgment method to the virus in the basic situation, achieve the effect of the enemy. In the antivirus cannot automatically retaliation, plan to use manual party