List of common virus terms

Source: Internet
Author: User
Boot Sector
Both hard drive, soft drive, and logical drive (After partitioning) have information about the boot sector. See Partition Table, Master Boot Record, and multi-partite virus.

Boot Sector or MBR Virus

A virus that can affect a fixed boot sector or a soft drive. Any formatted hard disk (even empty or containing only some data) may be infected with a boot sector. When you try to start the boot system from an infected floppy disk or hard disk, the boot virus will be activated and reside in the memory .. The virus type will be copied to the Master Boot Record (MBR) or the Boot Sector of the hard disk. Every time you restart the system, the virus in the memory will become active. This is a common virus. If the virus in the memory tries to eliminate it out of the activation status, it will not work because it will copy itself to the hard disk before you clear it from the memory. In addition, most of them are stealth viruses. To ensure security, you should use a write-protected clean floppy disk to cold start the computer and try to clear the infected boot virus.

Circulating Infection

When two viruses infect the boot sector of a hard disk, the infected type will occur, as this disk cannot be used as the boot system. Clearing a virus usually causes another infection. See boot sector or MBR virus.

CMOS

Complementary Metal Oxide Semiconductor complimentary metal oxide semi-conductor. in CMOS, the interface structure information is stored, and some viruses try to change this data.

Companion Virus

An executable file is infected by creating a "partner" file with the same file name, except for the. COM Extension. Because dos executable files (. com,. EXE,. BAT) Load viruses before execution.

Cross-linked file

Cross-linking is a rare virus that occurs when two files use a shared Magnetic Record cluster on the hard disk.

Dropper

To release a virusProgramIncluding the compressed viruses with pklite, diet, lzexe, and so on. It has a plan to release viruses to hard disks, soft drives, a file or memory.

Encryption

In a hard-to-find encrypted virus, the encrypted virus uses an encryption process at the beginning of the program to run the program after decryption. This means that the virus scanner relies on some bytes of the signature file for searching. The probability of virus success will be greatly reduced. The encrypted password is changed every time. For more information, see polymorphic virus.

Executable code

On the computer, it is displayed as "executableCode". This includes COM, EXE, DLL and some similar files. Broadly speaking, executable code includes some common application software such as disk Boot Sector, batch processing files, and macros.

False Positive

A false positive when the scanner reports a file that is not infected with the virus.

File stealth Virus

When you find that the. com and. EXE files are opened or copied from the Dir and try to hide changes in the file size, it is a virus that uses this stealth technology. When you try to use chkdsk/F and the report file size is different from the displayed size, this main problem will be manifested. Chkdsk assumes that this is the result of a cross-link file and tries to fix this corrupted file. The result is that the file will be corrupted. Frodo or 4096 viruses are famous representatives of this type. For more information, see stealth virus and full stealth virus.

Full stealth Virus

In this case, the file location is hidden when the virus reduces its length, so that it is displayed as cleanup. For more information, see stealth virus, and file stealth virus.

Heuristics

A rule-based method for identifying new viruses. This scan method does not rely on special virus feature strings. The advantage of this heuristic scan is that it is not fooled by the existing virus's own deformation and transformation technologies. However, in a normal program, it occasionally reports suspicious code and produces possible false positives. For example, when scanning a program, the following information appears:

C: \ dos \ msherc. com has been modified by adding some

Code at the end. Ths does not appear to be

Virus, but might be a self-checking routine or some

"Wrapper" program.

On the basis that the program might really contain viruses, the F-PROT will send a strong alarm.
Integrity checker
Integrity test-based file moderation program. Correct use of integrity checkers can provide reliable protection against attacks against new or variant viruses.

In the wild

Popular viruses are some well-known viruses that have been spread on public computers.

Joke programs

F-PROT detects some well-known joke programs that usually affect the normal operation of PCs. A joke virus is harmless, and its side effects are often mistakenly considered a virus.

Logic bomb

Macro virus is a program that executes a specified function (often destructive) when appropriate conditions are met. The logic bomb does not copy itself.

Macro virus is a virus written in many macro codes. This macro virus is spread through infected documents, databases, or computer program files that allow macro code use. Currently, these viruses can infect Microsoft's word and Lotus Ami Pro documents. For more information, see macro virus.

Malware

A general term for deliberately Executing software that can damage date and system performance.
Master Boot Record

On the Fixed hard disks of all PCs, the first physical sector is retained by a short script program. This sector is the Master Boot Record (MBR). It also includes the partition table. See Boot Sector and boot sector or MBR virus.

Memory-resident

Resident in computer memory rather than on disk.

Multi-partite

A virus that can infect colleagues with files and boot sectors, called multi-partite, is highly contagious.

Partition Table

Partition tables are often separated by PC disks in logical areas. The requirement information passes through these partitions, just like some indication labels. The isolation zone is used to being imported into the system (active partition) for storage in the Master Boot Record.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.