What Type Of Computer Virus Do You Have?

Is your computer suffering? Are you reading this through a blur of pop-up boxes and fake anti-virus warnings? Well unfortunately for you I am not writing this from the future to tell you the way to get rid of it, I am here just to tell you what it could be by offering a few of the most common types of viruses and what they generally do so that you might narrow who your attacker is to one nasty family.

Virus – Will Destroy Your Computer System

Viruses are generally bad news for your computer. They will get in via a website or email download and mess things around, destroy things or just annoy you.

Resident – Also known as a direct payload virus, this blighter gets into your memory and may cause havoc deleting or renaming stuff.

Web Scripting – Exploits any special code that might be on a website that requires you to execute it specifically e.g. video.

Multipartite – No holds barred virus type that goes after everything from your memory to your operating system.

Polymorphic – Bit like a multipartite but cleverer. This type will mutate and protect itself with encrypted algorithms to avoid detection or to be harder to remove.

Macro – Hides in applications that support macros like Excel.

File Infector – One of the most common types. Hides in the host file and starts when you hit that .exe file.

Direct Action – Bit like a file infector, hides in files until they are executed then deliver their payload and shut down.

Boot Sector – Traditionally delivered via boot floppy disks and infect the OS.

Browser Hijacker – Delivered by your browser, takes it over and normally directs you to pay for some kind of virus removal software or similar.

Trojan – Will Steal All Your Money and Identity

Trojans are sneaky and let criminals access your system or just record and pass on your keystrokes. You get them the same way you get viruses.

Proxy – Takes over your computer making it into a proxy server and makes it the go between for illegal activities such as DDoS attacks.

Data-Sending – Installs a key logger or hunts for sensitive information and transmits it back to the source.

Destructive – These are horrible. They can lie in wait until activated by the hacker or on a specific date, then start deleting all your core OS files.

Anti-Protection – Break down your virus defences from the inside.

Remote Access – Open a back door to your system to let hackers in.

Worm – Will Spread To Your Friends Too

Worms are even sneakier and can do damage but their main goal is to replicate and get passed on to someone else.

Email – Hide in a file or link sent with an email.

Instant Message – Sends a link to the infected website to whole instant message contact lists.

IRC – Spreads through internet relay chat

File Sharing – Through P2P file sharing

So which type do you have? Hope it’s not too nasty!

Pinto MacGuire is an Edinburgh based PC Doctor. He provides computer repairs Edinburgh for shop and contract customers.