Boot Sector Viruses are spread is very common. The virus is in the double he will move or replace the original boot sector with the program boot virus. So when there is booting then the virus will be loaded into memory and then the virus will have the ability to control the standard hardware (example : monitor, printer, etc.) and from memory is also the virus will spread throughout the existing drive and connected to the compputer (example : floppy, another drive axcept c drive).
Virus Samples :
- Variant Virus wyx
ex: wyx.C (B) infect the boot record and floppy
length : 520 bytes
characteristics : memory resident and encrypted
- Variant V-Sign :
Infect : Master boot record
length of 520 bytes
characteristics : resident in memory (memory resident), encrypted, and polymorphic.
- 4th - Stoned.june / bloddy! :
Infect : Master boot record and floppy
length of 520 bytes
characteristics : resident in memory (memory resident), encrypted and display message "Bloody! June 4th 1989" after the computer is booting 128 times.
Subscribe to:
Post Comments (Atom)
Popular Posts
-
Total losses from cyber crime were reached hundreds of billions of dollars. It was so 'whip' for the manufacturer of anti virus, ...
-
On Wednesday, Microsoft warned of a gap in the browser Internet Explorer made they can make an attacker to access files stored on compu...
-
Excess antivirus smadav: SmadAV very easy to operate. The process is very fast scan. Can be used instantly (previous versions) without...
-
Advantages and Disadvantages of AVG Antivirus. AVG Antivirus excess are as follows : 1. AVG Installation is quite easy 2. Auto updat...
-
New Panda Antivirus Pro is not part of the best antivirus in 2012, then the antivirusPanda Antivirus Pro 2012 is worth your sandingkan wi...
-
Want to know anyone who saw your profile on Twitter ? Do not be easily fooled by 'tempting offer' like that. The problem now many...
-
Although long enough AVI update server is not active. The problems that we face are often experiencing server overload facing a flood of use...
-
A group of hackers say manage to enter the Apple website. A series of internal party data from Apple was stolen and exposed freely on th...
-
Here Are Steps To Remove Viruses From Your Computer Recycler : Make sure beforehand that your computer actually are infected by the virus,...
-
Indonesia recordet the second highest country in the world are infected by the VIRUS STUXNET, Malware (malicious software) or malicious prog...
0 comments:
Post a Comment