Skip to content
Related Articles
Get the best out of our app
GeeksforGeeks App
Open App

Related Articles

Some Known Viruses & Worms

Improve Article
Save Article
Like Article
Improve Article
Save Article
Like Article

A program positioned into another program is called a virus though it is due to the host program any program gets activated, and it copies itself and opens it out to others through floppy transfer. Every time the user will run the malicious application a virus will infect the information Or program Or data and the virus take advantage & copy itself. 

Some Popular Viruses :

  1. Central Processing Unit-Brain Virus – 
    At a disposable price in January 1986 Amjad and Basit the two Pakistani brothers created this program this is done to discourage people from purchasing unauthorized software as this virus damaged various devices and this virus was popularly known for its cause. Well it’s used was to stay in a foot sector of a disc or drive, or it could be near to zero sectors and if you will boot with a malicious floppy or drive the virus will enter into the machine’s memory.
  2. Brandow Virus –  
    Only the Apple Macintosh devices are harmed by the virus not much destruction was reported because of this virus. On any capable PCs or IBM this was not noticed, but we can see a displayed message of peace on the monitor which killed itself. More information is not available on this virus.
  3. Scores Affecting Macintosh – 
    Only on Apple Macintosh pc, this virus turned into additionally located this virus turned into first located in March 1987 if it affected then specifically packages inside Electronic Data Systems Corp. In this virus now no longer a great deal of statistics is available.
  4. Cascade – 
    The compatibles, IBM, PCs are attacked via way of means of Cascade virus. After the virus picked them off in alphabetical order the letter at the display screen can be visible losing vertically right all the way down to the backside of display screen. We can name it a parasitic virus because it attaches itself to different applications and receives activated while the host software is executed. When this system is copied it receives a copy to different PCs.
  5. Logic Bomb Dos Virus – 
    This virus was designed to activate solely on Friday, found in 1987 at Hebrew University Jerusalem in January thirteen and delete all files dead thereon day and date so infects COM and EXE files to break the data.
  6. Data crime or Columbus or October the 13th virus –  
    In October 1989 information wrongdoing infection is like Jerusalem and was programmed to assault this track 0 of PC hard plate is obliterated and the substance of circle and delivered unintelligible. This infection harms the hard circle as it enters the EXE and COM documents a cure called V checker and was created by the American Computer Society. In March 1989 this infection was found and harm revealed after October 13 was insignificant and the Royal National Institute for the Blind, UK was the most exceedingly awful hit and much information was accounted for to be lost.
  7. Win32/Patched (Patch EXE) – 
    Like a Patch COM virus this attack only EXE files as effect both COM and EXE files.
  8. Stoned – 
    In October 1989 this infection was found in Bangalore it lives in the boot area of tainted floppy. The infection enters the hard palate and a few areas’ designation tables (FAT) are harmed when the PC is booted through the contaminated floppy. At whatever point the PC is booted from the hard plate as regular the infection duplicates itself onto both areas of the floppy diskette in drive An and spread to another PC this sort of infection won’t enter the hard circle except if it is booted through the tainted floppy plate.
  9. Bomb –  
    This sort of infection is known as rationale bomb or delayed bomb an occasion set off through 3 out of a program that makes program crash whenever characterized as a bomb for the most part bomb is a product embedded in a program by an individual working in the organization any disappointed developer can make a program to erase all the organization documents on the off chance that he gets and sign that I might be sacked or moved somewhere else
  10. Bell Labs Virus – 
    Each time another variant of the working frameworks is made a compiler program which makes an interpretation of a software engineer’s guidelines into to numbers that a PC can peruse it has been adjusted, so it inserted a covered up hidden entryway this is changed the frameworks notwithstanding ordinary clients secret phrase it would perceive mysterious passwords known just two one people.

Some better-known Worms :
As we all know worms could be a self-propagating program that damages, and it doesn’t need any host to activated somebody must insert a worm directly into a network of interconnected computers dare messages may be sent from one to a different and information files and program exchange as an example network where everything is shared and has its own files program business enterprise system in the hard disc.

  1. XerPARC – 
    Xerox town center in 1980 John Shock devised a worm wriggled through giant ADP system searching for machines that weren’t being employed and harnessing them to assist an outsized downside. This might take over a complete system.
  2. Individual Worm – 
    During this, a worm whose sole purpose is to remain alive wherever it runs no substantive computer program because the CO Monster worm at university was one like it would show a screen Pine Tree States sage-like “I am a worm kill me if you can!”.
  3. Terror Clock Worm – 
    One equipped with electronic equipment a worm that reaches out through the network to an outgoing terminal and places wakeup calls to an inventory of users.
  4. Gladiator Worms – 
    During this, the article is to put in writing a worm program which will replicate itself quicker than another worm program bit and eat it this sort of worm was given by Bill Buckley and James Mauser developed Core Wars this one was alive at the finish wins a number of the win programs have chromosomes consisting of solely four lines of code. Longer genes cannot execute as quickly as short ones therefore I tend to induce weedless out.
My Personal Notes arrow_drop_up
Last Updated : 09 Mar, 2021
Like Article
Save Article
Similar Reads