What are Computer Viruses & what types of viruses are there?

Authors Avatar

                         What are Computer Viruses & what types of viruses are there?

Computer Viruses have become a major concern of the government, corporations, and personal computer users. Not only do viruses cause a disturbance to everyday life, they can destroy existing files and can potentially cause major loss to the user. A computer virus is a program that attaches itself to existing files in the computer and infects it. Viruses are named after the biological contagion because a virus attaches itself to healthy files and then  spreads to other parts of the computer. This process is replicate of a biological virus that would attach itself to a healthy cell and it spreads to other cells to infect a whole area of the body.

        The first acknowledged virus dates back to 1987 called the “Brain”. The “Brain” is a boot sector virus. A boot sector virus affects the boot sector which is a small program where information about the drive or disk structure is held. The boot sector is used when the operating system is started up. As a result of the virus attaching itself to the boot sector, every time the computer boots up, the virus is loaded to memory. This type of virus can spread very quickly in environments where computers are shared. A boot sector virus works as long as the computer is on and this guarantees that the virus gets executed because all computers need to boot up.

        Other types of viruses are the file or program infector viruses, the macro viruses and most recently, e-mail viruses. The file or program viruses connect themselves to executable programs and then once the programs are run, they load themselves onto memory and from there infect the rest of the computer. Macro viruses attack programs with macros, which are programs that allow users to run a single input and be able to trigger a series of instructions which the computer automatically executes. Macro viruses infect such programs as spreadsheet and word processing files. They are dangerous because once the file is shared the virus is also shared. Also, these viruses can be spread to different platforms such as from Microsoft Windows to Macintosh operating systems which make these viruses more harmful.

        More recently, e-mail viruses have become popular. Worms such as the “Melissa virus” have been a threat in recent years where the worm would affix itself to a Word Document and then the virus would create an email and send it to the first fifty people of the user’s e-mail address book. This caused such a widespread infection that it forced Microsoft and other companies to shut down their email systems for a while.  There are also the Trojan viruses that disguise themselves behind something valid and useful and then they would infect files once the disguises are opened. Trojans do not reproduce like worms but it can destroy files and cause harm like them.

History of Viruses

In 1986, the first IBM PC virus called the “Brain” became widespread. Also in 1986, a man named Ralph Burger discovered that he would be able to add code to a DOS executable and that would enable him to replicate files. This was called the “Virdem”. Some other notable events that happened in the late 80’s to early 90’s are the appearance of polymorphic viruses like the “Chameleon”, is the appearance of automating production and viral construction sets, CD viruses, and the appearance of the first Windows 95 viruses.

In 1990, the Chameleon virus was created. The Chameleon virus is a benchmark in virus attacks because before these polymorphic viruses, anti-viruses had been using part of virus code to look for viruses. The polymorphic viruses made this method obsolete. These viruses are encrypted so they can hide themselves from the prevention software and therefore can spread throughout the computer without getting noticed. The polymorphic virus is very difficult to detect because every time the virus infects a new file or program, the data on the virus will change its encrypted code. Therefore, even though an antivirus can detect one string of the polymorphic virus, once the virus changes, it will not be effective in preventing another virus attack.

In 1992, the first viral code construction set for IBM PC compatibles was available for purchase. These code construction sets generate viruses at a touch of a button. They include commented source code, object modules and sample infected files. This sets helped construct any type of virus and also help encrypt the code for a deadlier virus package.  This made virus creation quick and easy and tempted many programmers to create one just for fun. Other versions of virus construction sets were released later that year such as the Phalcon/ Skism Mass-Produced Code Generator. The later versions of the constructions sets used configurations files which listed all the details of the virus and then formed all the viruses from these files.

In 1994, CD-Rom’s were becoming increasingly popular. This caused virus programmers to create viruses that inhabited on CD’s. Because many disks are shared, the viruses spread quickly. These viruses are incurable and therefore must be destroyed. There were cases during this year that showed that a virus created on a master copy on a compact disc and then this disk was reproduced in batch sizes and then distributed and infected tens of thousands of systems.

In late 1995 and early 1996, the first Windows95 virus appeared and spread throughout the world. The virus was called the “Win. Tentacle” and it infected hospitals and other institutions in France. Before this, a Window’s virus had only been talked about and written about in virus publications and it was a huge event when the first virus became widespread. Since Windows is the most popular and most used operating system, these viruses became more prevalent. Versions of viruses that attack Linux and other operating systems also came about during those years.

More recently in the 21st century, emails and internet are the chosen method of spreading viruses. Such programs as MyDoom and the Melissa virus that attack a person’s address book are popular. There are vast amounts of viruses on the loose and many companies and organizations have been trying hard to prevent the damages these viruses can cause.

Anti-viruses

        A way to prevent viruses is to use anti-virus software. Anti-viruses fight against virus attacks. First a virus must be reported and then the antivirus software creates a signature file that counteracts the attacking virus. This signature file is then added to an antivirus database and then if the virus attacks again, the system would know how to deal with it. The downside to this method for fighting viruses is that someone must activate the virus first in order for the system to develop a signature file. Another method for identifying viruses is called heuristics. Heuristics tracks all the activity that is running in the computer and then if something is acting like a virus, the system is alerted and the file is either destroyed or quarantined. The downside of this method is that it is hard to create guidelines that would explain a “virus-like” activity. For example, viruses are known to replicate and if heuristics is used, it can detect the wrong actions and destroy the files when it could be legitimate replication like in program association. Overall, anti-viruses are important to have because they can potentially prevent a harmful virus from destroying valuable information. They, however, are not enough because there are weaknesses within existing methods. There are also so many viruses that are being released that it is hard to keep track of and to prevent all of them. Some popular Anti-virus software that is for sale is the Norton Antivirus, Grisoft, McAfee VirusScan and Panda Titanium Anti-virus.

Join now!

Why people write viruses

        The general public’s view of a virus writer is a misconception that he is a “dysfunctional, pasty-faced teenager with no girlfriend and no life”. One reason that can be attributed to this generalization is the fact that the internet is able to hide the virus writer’s identity so the general public will take on a false impression of the writer. The realistic scenario is that most virus writers are normal people with normal lifestyles and they often do not write codes for malicious purposes.

Virus writers come from different age groups, backgrounds, and countries. Many ...

This is a preview of the whole essay