The World of Technology News and Products

The anatomy of a Virus

The anatomy of a Virus

Experts believed at the beginning that hostile sixteen-year-olds created the virus. Their sole purpose being to disrupt the internet, make fun, cause sabotage, only to satisfy their fascination with fame. When experts looked into the matter thoroughly, they found three categories of computer virus authors: teens who are part of a hobby hacking group, security employees for big companies and professional intrusion specialists. Writing viruses is now an expensive job and here is the anatomy of it

The Mechanism of the Virus

Replicator System (Replicator)

Without a replicator system, the virus cannot replicate. Thus, we cannot consider it a computer virus.

Immune System (Concealer)

Viruses often attach to other files with extensions such as .exe, .mp3, and others. So if you’re going to detect a virus in a file you suspect possibly infected try looking outside of the suspicious file. This is because often times malware disguises itself like this in order to avoid detection.

Some viruses have such sophisticated hiding strategies that they can replicate themselves and stay away from detection. Some famous examples of these types of viruses are Polymorphic viruses. The most dangerous viruses are those which have evolved to evade detection. This file system is a way to delete them, before they cause too much harm.

Control System (Triggering)

Viruses can have their own specific control system that can activate different systems on the computer. These systems include the computer’s clock and calendar, or the execution of other programs on the user’s machine.

In typical examples, Jerusalem activated on the 1st Friday and 13th day (6/13) after it’s release. Michelangelo launched on his birthday which is in March 6th.

Action System (Payload)

The payload of any virus is the sequence (process) of actions it puts in place. They can be either the deletion of ‘vital’ files for your operating system, destruction of your hard disk, or partial (undetectable) corruption of your files.

Where can we locate the viruses

Viruses can infect a variety of file-types such as floppy disks or CDs.

Your computer and smartphone are vulnerable to viruses, so these steps are vital to protect against outside threats. Using these security features will also prevent computer errors. We want to make sure that our computers are running reliably and we want your CD, DVD or USB copy of your files in case you need them later.

We always use Ad-Aware and Spy-Doctor, just in case. Part of the process of securing your computer is password protection. We encrypt our floppy disks to prevent any virus from spreading. Our best practice makes it easier to protect your business, while also being easily scalable. When downloading software from the Internet, it’s extremely important to scan any files you download. There might be some kind of virus or malicious content within them

The computer can sometimes be a little bit strange and there are instances where, for example, you tried to install a CD-ROM without your permission. We have also had it happen when our computer tries to access the internet, as if someone has given it an IP address.

There is no legal restriction to make viruses. The prohibition lies on releasing them or injecting them into the Internet in any way. In the case of unintentional release of a virus, the last detectable owner may need to be informed.

There is also no prohibition on the vaccine production of Do-it-yourself (DIY) when done purely for private use. But when it is freely circulating on the internet and either its harm is ambiguous or it’s not even harmful, it’s prosecuted. At best, the virus is harmless to unwitting users – but they are still exposed to prosecution risks.

It is imperative to mention that the cybercrime prosecution services, not only of Greece, but of most countries of Western civilization, have been upgraded and developed to the fullest extent. It is relatively easy to identify especially the novice hackers who do this kind of work.

So be careful and keep your eyes peeled. Recommending to stay away from these ventures, you will possibly avoid going to jail. You’d better play video games or web surf.

If you liked this article, then you may also enjoy this one.

Author: PC-GR
The World of Technology

The World of Technology
Logo
Enable registration in settings - general
Skip to content