Soft exam-virus Summary

Source: Internet
Author: User

Virus:

1. system viruses

System viruses are prefixed with Win32, PE, Win95, W32, and w95. Common public features of these viruses can infect Windows operating systems.
*. EXE and *. dll
File, and spread through these files. For example, CIH virus.

2. Worms
Remote Procedure Call Protocol

The prefix of the worm is worm. The public feature of this virus is spread through network or system vulnerabilities. Most of the worms send out infected emails, blocking the network. For example, shock wave (blocking Network) and small Postman (sending infected mail.

3. Trojan and hacker viruses

The prefix of a Trojan is Trojan, And the hacker virus prefix is generally hack. the public feature of the Trojan virus is to access and hide the user's system through network or system vulnerabilities, and then disclose user information to the outside world. The hacker virus has a visual interface for remote control of users' computers. Trojans and hackers' viruses are often paired, that is, the trojan virus is used to intrude into users' computers, and the hacker virus is controlled by the trojan virus. These two types are becoming more and more integrated. General Trojans, such as QQ message tail Trojans Trojan. qq3344, and many other Trojans for online games, such as Trojan. lmir. ps000060. Here, psw or PWD in the virus name generally indicates that the virus has the password stealing function (these letters are generally abbreviated as "password) some hacker programs such as network hacker (hack. nether. client.

4. Script Virus

The prefix of the script virus is: the public feature of the script virus is a virus that is written in scripting language and transmitted through web pages, such as red code (. redlof ). Script viruses also have the following prefixes: vbs and JS (indicating which scripts are written), such as Happy Time (vbs. happytime), 14th (JS. fortnight. c. s.

5. macro virus

In fact, macro virus is also a type of script virus. Due to its special nature, it is regarded as a unique type here. The macro virus prefix is macro, and the second prefix is word, word97, Excel, and excel97 (maybe there are others. For viruses that only infect word97 and previous Word documents, use word97 as the second prefix in the format of Macro. word97; any virus infected with Word documents later than word97 uses word as the second prefix in the format of Macro. word: any virus that only infected with Excel 97 or earlier versions adopts excel97 as the second prefix. The format is macro. excel97; Excel is the second prefix for viruses that only infect Excel files later than excel97. The format is macro. excel, and so on. The public feature of this virus is that it can infect office documents and then spread it through common office templates, such as the famous Misha (macro. Melissa ).

6. Backdoor Virus

The prefix of the backdoor virus is backdoor. The public feature of this type of virus is to spread over the network, open a backdoor to the system, and bring security risks to the user's computer. For example, 54 IRC backdoor. ircbot that many friends have ever met.

7. Virus planting program virus

The public feature of these viruses is that one or more new viruses will be released from the body to the system directory during runtime, which will be damaged by the released new viruses. Such as dropper. binghe2.2c and dropper. worm. smibag.

8. destructive program viruses

The prefix of the destructive program virus is harm. The public feature of these viruses is that they have good-looking icons to entice users to click. When users click these viruses, the virus will directly damage users' computers. For example, formatting a c drive (harm. formatc. f) and a killer command (harm. Command. Killer.

9. Joke Virus

The prefix of the joke virus is joke, also known as the prank virus. The public feature of these viruses is that they have good-looking icons to entice users to click. When users click these viruses, the virus will make various damage operations to scare users, in fact, the virus has not damaged users' computers. For example, the virus joke. girlghost.

10. bundling machine Virus

The binding machine virus prefix is: binder. the public feature of this type of virus is that the virus author binds the virus with some applications such as QQ and IE using a specific bundle. On the surface, the virus is a normal file, when a user runs these bundled viruses, these applications are run on the surface, and then the virus running together is hidden, causing harm to the user. For example, binder. qqpass. qqbin and binder. killsys.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.