7 Types of Viruses You Need to Know

Pink White Black Purple Blue Textile Web ScriptsVirus alert, virus alert! There is a basis for being alarmed as a virus could steal your file, delete them, and make use of your email to spread itself to other people’s computer.

Viruses are a type of malicious software and are able to spread through email attachments. Never open an email attachment unless you know who sent it. They could disguise themselves as a friendly greeting card, funny and cute images, audio and video files, but viruses rely on human interaction. Always be careful in downloading anything on the internet. It may seem harmless at first, but it might be unsafe for your computer.

Here are the list of viruses you need to know about and where they usually attack:

  • Boot Sector Virus is an example of the most dangerous. They could affect the master boot record, encrypt or destroy the code. The hard part is that, it is difficult to remove it and a full system format is required. An example of this is Parity Boot.
  • Resident Viruses is a permanent virus that stays in the RAM memory and could cause interruption of the operations that the system has executed. This leads to corrupting files and programs. Examples are CMJ, Mr Klunky, Randex, and Meve.
  • Non-resident Viruses is a kind of virus that does not stay or complete itself from the computer’s memory. Aside from that, it is also a finder module. It can infect files once the module is executed.
  • Multipartite Viruses will spread in multiple ways and distributed via the infected media. It remains in the memory and then slowly moves to the boot sector of the hard drive. They can simultaneously infect both the executable files and the boot sector and then spread quickly. These attacks will make the multipartite viruses very hard to remove. Cleaning the program files will be useless if the virus stays in the boot sector. Once you open your computer, the virus reproduces.
  • Overwrite Viruses is not dangerous to your system, but it can delete the files which it infects. To get rid of this virus, delete the file and its contents. This virus can infect the entire pieces of software and standalone files. It spread itself through email. Notable examples: Trj.Reboot, Trivial.88.D.
  • Direct Action Virus is a file infector and it works by connecting itself to a specific kind of file which is usually .COM or .EXE files. When the file is executed the virus will look for other files in the directory and starts spreading itself. An antivirus program can remove the virus so make sure your antivirus program’s virus definitions are always up to date.
  • Stealth Viruses can trick antivirus software by stopping the request of the operating system. They can hide itself making it hard for some antivirus program to detect them.

These are just a few of the viruses out there waiting to get to your system. The only way to protect ourselves from these viruses is to know about them, where they attack, and know how to get rid of them. You can apply these safety tips. Lastly, find a great antivirus program and always scan your computer for potential threats.

Is It a Virus, a Worm, or a Trojan Horse?

Computer errorWhen our computer goes crazy, we casually say, “My computer is infected by a virus.” Is the correct term for a system infection a virus? Should it be a worm instead? The truth is that a virus, a worm, and a trojan horse are all under the category of what we call a malware. They are all considered malicious software, or otherwise known as malware. A malware is a series of code that is meant to harm, burglarize, and deliver an unauthorized course of action. There are several threats that are considered a malware. The top three malwares are: trojan horses, viruses, and worms.


  • Trojan Horse. If you are familiar with the Ancient Greek story of the city of Troy, you know that they got invaded because of a Trojan Horse. They thought it was a beautiful gift, but in truth, the horse is just a disguise for the soldiers. Like in that classic tale, a trojan horse appears like a useful and beneficial computer program. You will be enticed to install it and once you do, the trojan horse has now access to your computer.
    To avoid it, beware of legitimate-looking computer programs. It may seem useful, but you might endanger your safety and security. Trojan horses proliferate through user interaction. If you are careful with opening email attachment, and installing software, you are secure. Safety tip: Download only from verified sources like the program’s official website, and do not install every fascinating program you see.
  • Virus. A virus is a computer program that is made to modify the way a computer works, without your permission or your knowledge. Almost all viruses are attached to an executable file (anything with a .exe file extension.), and it will make itself part of that file. A virus can execute itself, and it can replicate itself. It can also spread easily as it can travel from one computer to another. Unlike a trojan horse that relies on user interaction, a virus can place its own code in the path of execution of another program. It inserts itself into other files, and it usually does an unapproved action like deleting data, damaging existing programs, or reformatting the hard disk. Other viruses are not designed to do any damage, but simply to annoy displaying a text, video, and an audio message.
  • Worm. A worm is similar to a virus that it can duplicate itself and deal damage to certain files. In contrast to viruses, which call for the propagation of an infected host file, a worm a stand-alone malicious software, and it does not require a host program or human help to disperse. In order to spread, a worm enters a computer through a weakness in the system and takes advantage of file-transport features on a computer, allowing it to travel by itself.

Now, you know the main differences of the top three malwares. You can now use the terms properly. By definition, they may be different, but all these malwares are harmful. Learn to protect your computer by reading these safety tips. Always think before you click!

© 2017. All rights reserved. Phoenix Website Design • Sitemap • (602) 388-8622
20 E Thomas Rd #2200, Phoenix, AZ 85012
Phoenix Web Design


Apache Junction, Avondale, Buckeye, Carefree, Chandler, Chandler Heights, El Mirage, Fountain Hills, Gilbert, Glendale, Goodyear, Litchfield Park, Mesa, New River, Paradise Valley, Peoria, Phoenix, Queen Creek, Scottsdale, Sun City, Sun City Grand, Sun City West, Surprise, Tempe, Tolleson, Wickenburg