7 Types of Viruses You Need to Know

Pink White Black Purple Blue Textile Web ScriptsVirus alert, virus alert! There is a basis for being alarmed as a virus could steal your file, delete them, and make use of your email to spread itself to other people’s computer.

Viruses are a type of malicious software and are able to spread through email attachments. Never open an email attachment unless you know who sent it. They could disguise themselves as a friendly greeting card, funny and cute images, audio and video files, but viruses rely on human interaction. Always be careful in downloading anything on the internet. It may seem harmless at first, but it might be unsafe for your computer.

Here are the list of viruses you need to know about and where they usually attack:

  • Boot Sector Virus is an example of the most dangerous. They could affect the master boot record, encrypt or destroy the code. The hard part is that, it is difficult to remove it and a full system format is required. An example of this is Parity Boot.
  • Resident Viruses is a permanent virus that stays in the RAM memory and could cause interruption of the operations that the system has executed. This leads to corrupting files and programs. Examples are CMJ, Mr Klunky, Randex, and Meve.
  • Non-resident Viruses is a kind of virus that does not stay or complete itself from the computer’s memory. Aside from that, it is also a finder module. It can infect files once the module is executed.
  • Multipartite Viruses will spread in multiple ways and distributed via the infected media. It remains in the memory and then slowly moves to the boot sector of the hard drive. They can simultaneously infect both the executable files and the boot sector and then spread quickly. These attacks will make the multipartite viruses very hard to remove. Cleaning the program files will be useless if the virus stays in the boot sector. Once you open your computer, the virus reproduces.
  • Overwrite Viruses is not dangerous to your system, but it can delete the files which it infects. To get rid of this virus, delete the file and its contents. This virus can infect the entire pieces of software and standalone files. It spread itself through email. Notable examples: Trj.Reboot, Trivial.88.D.
  • Direct Action Virus is a file infector and it works by connecting itself to a specific kind of file which is usually .COM or .EXE files. When the file is executed the virus will look for other files in the directory and starts spreading itself. An antivirus program can remove the virus so make sure your antivirus program’s virus definitions are always up to date.
  • Stealth Viruses can trick antivirus software by stopping the request of the operating system. They can hide itself making it hard for some antivirus program to detect them.

These are just a few of the viruses out there waiting to get to your system. The only way to protect ourselves from these viruses is to know about them, where they attack, and know how to get rid of them. You can apply these safety tips. Lastly, find a great antivirus program and always scan your computer for potential threats.

Safety Tips in Preventing Malwares

computer cure

Prevent malwares.

With all the different malwares out there, it is easy to get paranoid that your computer is already infected with viruses, that this website is unsafe, or that your email contains a malicious attachments. Refer to this list in order to minimize your risk of getting infected by malwares. Practice safe computing and inform everyone you know to do the same.

  • Be suspicious of email attachments. If you are not expecting an email, most probably, the emails you got are just spam. Do not aimlessly open every email you received. Mostly importantly, do not download email attachments from unknown sources.
  • Verify email messages. Some email messages appear to be from people you know, or to be from services that you currently use. Always check the sender’s email address. For example, if you are using PayPal when transacting online, all emails should be sent via If you received emails from services providers like, or, then, these people are just pretending to be someone from PayPal. Do not engage with these emails especially if it contains attachments.
  • Do not set devices to “auto run”. Whether you are inserting an external storage device, or opening an email attachment, do not set it to auto run. Manually open your storage devices, DVDs, email attachments. Anything that can store a file of any size can be a carrier of a malware.
  • Scan all media devices that is from someone else. Like what I said above, these devices can possibly carry a malicious software. Remember, these softwares are typically small in size. They can definitely fit in any media device that you can think of.
  • Scan all new software before you install it. When you buy a new software, they are usually stored in a DVD, or you can digitally download them. Either way, you should scan any software you wish to install in your computer.
  • Back up your files frequently. Keep important files safe. Preferably, you should have an external media device that is only for important files in case your computer gets infected. Do not just rely on the storage device in your computer. Always have a back up that is in a different location than your computer. You can also store these files online. When files are online, it is also vulnerable to intrusion. Offline back up is better.
  • If you own a Windows PC, it is advisable to install all Microsoft security updates. Update your Windows Defender (Windows 8 and above), and Microsoft Security Essentials (Windows 7). These will provide you real-time protection especially if you are connecting a foreign device to your computer.
  • Make sure that your malware scanners have the most recent virus and spyware definitions. If it is updated, it can detect the latest malwares that will try to invade your computer.

Remember that no security solution offers 100% protection. You have to be cautious when opening a file. Scan ALL the files – not just the program files – in your computer. You can use an online malware scanner and upload every file you receive. Jotti’s Malware Scanner uses 18 different scanners. You can also scan a website using Norton’s Safe Web. If you want to review of the different categories of malwares, you can view it here.

Is It a Virus, a Worm, or a Trojan Horse?

Computer errorWhen our computer goes crazy, we casually say, “My computer is infected by a virus.” Is the correct term for a system infection a virus? Should it be a worm instead? The truth is that a virus, a worm, and a trojan horse are all under the category of what we call a malware. They are all considered malicious software, or otherwise known as malware. A malware is a series of code that is meant to harm, burglarize, and deliver an unauthorized course of action. There are several threats that are considered a malware. The top three malwares are: trojan horses, viruses, and worms.


  • Trojan Horse. If you are familiar with the Ancient Greek story of the city of Troy, you know that they got invaded because of a Trojan Horse. They thought it was a beautiful gift, but in truth, the horse is just a disguise for the soldiers. Like in that classic tale, a trojan horse appears like a useful and beneficial computer program. You will be enticed to install it and once you do, the trojan horse has now access to your computer.
    To avoid it, beware of legitimate-looking computer programs. It may seem useful, but you might endanger your safety and security. Trojan horses proliferate through user interaction. If you are careful with opening email attachment, and installing software, you are secure. Safety tip: Download only from verified sources like the program’s official website, and do not install every fascinating program you see.
  • Virus. A virus is a computer program that is made to modify the way a computer works, without your permission or your knowledge. Almost all viruses are attached to an executable file (anything with a .exe file extension.), and it will make itself part of that file. A virus can execute itself, and it can replicate itself. It can also spread easily as it can travel from one computer to another. Unlike a trojan horse that relies on user interaction, a virus can place its own code in the path of execution of another program. It inserts itself into other files, and it usually does an unapproved action like deleting data, damaging existing programs, or reformatting the hard disk. Other viruses are not designed to do any damage, but simply to annoy displaying a text, video, and an audio message.
  • Worm. A worm is similar to a virus that it can duplicate itself and deal damage to certain files. In contrast to viruses, which call for the propagation of an infected host file, a worm a stand-alone malicious software, and it does not require a host program or human help to disperse. In order to spread, a worm enters a computer through a weakness in the system and takes advantage of file-transport features on a computer, allowing it to travel by itself.

Now, you know the main differences of the top three malwares. You can now use the terms properly. By definition, they may be different, but all these malwares are harmful. Learn to protect your computer by reading these safety tips. Always think before you click!

© 2017. All rights reserved. Phoenix Website Design • Sitemap • (602) 388-8622
20 E Thomas Rd #2200, Phoenix, AZ 85012
Phoenix Web Design


Apache Junction, Avondale, Buckeye, Carefree, Chandler, Chandler Heights, El Mirage, Fountain Hills, Gilbert, Glendale, Goodyear, Litchfield Park, Mesa, New River, Paradise Valley, Peoria, Phoenix, Queen Creek, Scottsdale, Sun City, Sun City Grand, Sun City West, Surprise, Tempe, Tolleson, Wickenburg