There are many types of computer virus today. However, here we present a list of most common viruses so that you are attentive and never hack you. Protecting your computer against hackers is an important task to secure your data!
Types of Computer Virus: List of computer viruses!
Boot Virus: Say goodbye to your PC
One of the first known types of viruses, the boot virus infects the operating system initialization partition. The virus actives when the computer is turned on and the operating system loads. This is the first types of computer virus. It’s simple but effective.
Time Bomb: Explosive problem
Viruses of the “time bomb” type activates at certain times. Once a certain system has been infected, the virus will cause some type of damage on the previously day or time. Some viruses became famous, such as “Friday the 13th” and “Michelangelo”.
Worms: Types of computer virus with replication!
With the interest of making a virus can be spread as widely as possible, its creators went on to program their viruses so that they only replicate. Without the aim of causing serious damage to the system.
In this way, its authors try to make their best known creations on the internet. This type of computer virus is worm. They are increasingly perfect, there is a version that by attacking the computer, not only replicates, but also spreads over the Internet.
Hackers send to the e-mails you have in your account, infecting the computers that open that e-mail and restarting the cycle.
Trojans or Trojan horses: A mortal PC virus trap
Certain viruses have a separate code inside them, which allows a person to access the computer, collect data and send it over the Internet to a stranger. These codes are Trojans or Trojan horses.
Initially, Trojan horses allowed the computer to receive external commands, without the user’s knowledge.
In this way the invader could read, copy, delete and alter system data. Currently, Trojan horses seek to steal confidential user data, such as bank passwords.
Viruses were in the past, the biggest responsible for the installation of Trojan horses, because they do not have the ability to replicate. Currently, Trojan horses no longer arrive exclusively on viruses; they are now on an Internet file and when user executes it.
This is an effective practice due to the huge amount of fraudulent e-mails that reach users’ mailboxes. Such e-mails contain an address on the web for the victim to download, without knowing, the Trojan horse, instead of the file that the message says it is.
This practice is phishing, an expression derived from the verb to fish. Currently, most Trojan horses simulate banking websites, “fishing” the password typed by users of infected computers. There are different ways to know if you got a Trojan horse and how to remove it from your PC. This is the most dangerous virus among the types of computer virus.
Hijackers: Types of virus if you use IE
The hijackers are programs or scripts that “hijack” Internet browsers, mainly Internet Explorer. When that happens, the hijacker alters the browser’s initial page and prevents the user from changing it, displays pop-up ads or new windows, installs toolbars in the browser and can prevent access to certain websites (such as anti-virus software websites, for example).
Zombie: Is this The Walking Dead?
The zombie state in a computer occurs when it is infected and controlled by third parties. Also, they can use it to spread viruses, key loggers, and invasive procedures in general.
Usually, this situation occurs because the computer has its Firewall operating system without last actualization. According to studies, a computer that is online in those conditions has almost a 50% chance of becoming a zombie machine. Thus, Find out how to protect your Website from hackers.
Macro Virus: Macro PC problems
Macro viruses (or macro viruses) link their actions to document models and other files so that when an application loads the file and executes the instructions in the file, the first instructions will be those of the virus.
Also, Macro viruses are similar to other viruses in several aspects: they are codes so that, under certain conditions, this code will be on your PC, making a copy of it.
Finally, this is the list of computer viruses that we bring you from technology tips. I hope it is informative and you have a better knowledge of the tactics of hackers. Remember to follow us on our social networks for more articles. See you soon!