This time I want to share information about the types of computer viruses and how to overcome them. Things will be outlined, namely the location of the virus, how the spread and how to provide protection to our operating system. Here's the explanation.
That is the type of virus that is created with the aim to control and steal data that is in the computer. In essence, the trojan is not a virus, but because it is considered to be quite disturbing, then the group breaks into a computer virus that needs to be wary of.
The main deployment location that is connected to the internet access, such as email and personal data dipassword.
To overcome that is by using a special antivirus untu trojans, such as Trojans and Trojan remover hunter.
2. Worm
That is a program that can copy itself. In general, no meninfeksi worm virus, but a dangerous thing: the ability to multiply themselves are so fast that if the computer is attacked in a long time, can lead to fragility in the system. Because the data in memory and hard drive to be great.
Location spread through email and Internet networks. Meanwhile, to overcome it can use the antivirus Iasa. If using antivirus pro even more optimal results.
3. Memory Resident virus
That is the type of virus that infects RAM. Of course, its location in the computer's memory. This virus will be active when the operating system starts up. With own code, virus of this kind will disturb the process pamanggilan program should be running normally. The effect is lemotnya system.
How to protect by using antivirus and update it periodically.
4. Web scripting virus
That is a complex program code which serves to enhance the content of a website. Well ... this is the code that is usually used to interrupt the program with a specific purpose. Example: JS. Fortnight
Location connect Internet, especially email.
For the protection system can be done by installing Microsoft default Windows tool. Do it regularly scans using this application.
5. Multipartite virus
Is a type of virus that is composed of a file to infect a specific operating system. Hiding location that is in RAM, then it will infect the hard drive at a later stage. Conto: invader, flip and tequila.
The fix is to clean up their bad sectors and do disk defragmenter (if using Windows OS).
6. FAT virus
FAT stands for File Allocation Table. That is the type of virus that is created with the purpose to destroy files in a specific location. Usually hide in the storage of personal data. The effect is the ability to hide our important files, making it difficult to detect and will seem to disappear.
Prevention: observe and note the data stored in the hard drive. If we suspect any file that we never do to save it, meaning it is a FAT virus.
7. Companion virus
A virus to interfere with personal data. Beada location in the hard drive. But mempunyaiciri berbeda.Contoh extensions that we have the file extension me.exe, the virus made another extension me.com.
The location on the hard drive, usually gathered with the new files.
Prevention: install an antivirus scan and download the firewall.
8. Polymorpic virus
Is a type of virus that has the ability to encode themselves in different ways depending on the time it infects the system. Example: Marburg, Tuareg and elken.
The way to prevent is to install antivirus high end.
9. Directory virus
Is a type of virus that menginifeksi file with the extension exe or com, then move it. So that when the file is called to run, it will automatically be in action for the virus to infect other systems.
The location is in the hard drive and potential to disrupt all programs. Examples of Dir-2 virus.
Handling: format and reinstall all the programs and operating systems.
10. Macro viruses
Having the ability to infect macro files such as .doc, .xls, .mdb Pps and. Besides this type of virus will infect an email containing the document.
Location: via e-mail and Internet networks.
How to cope with to avoid opening unknown emails and also disable macro program.
11. Boot sector viruses
Is a type of virus that infects Baian smallest in a hard drive is called the boot sector. Its location is hiding in the floppy disk. So that when the system is running he could move kemama everywhere to take action on the infection. Example: Polyboot.B, Anti EXE.
The most powerful way to overcome that is by ensuring the floppy disk in the write protect position.
12. Direct action viruses
Viruses that infect duties AUTOXEC BAT file types. Located on the hard drive directory. This type will be in action when the operating system starts. This strain has the ability to infect external devices such as external hard drives and flash. Examples of Vienna.
Location: generally in the HDD directory. But it also has the ability to move.
How to solve it by installing an antivirus scan.
Thus the explanation of the types of viruses and how to overcome them. It is expected with this knowledge we can take the appropriate action when their computers are infected with a virus.