Computer Virus Basics
What is a computer virus? Simply put, it is a program that reproduces. When it is executed, it simply makes one or more copies of itself. Those copies may later be executed to create still more copies.
Typically, a computer virus attaches itself to another program, or rides on the back of another program, in order to facilitate reproduction. This approach sets computer viruses apart from other self-reproducing software because it enables the virus to reproduce without the operator’s consent. Compare this with a simple program called “1.COM”. When run, it might create “2.COM” and “3.COM”, etc., which would be exact copies of itself. Now, the average computer user might run such a program once or twice at your request, but then he’ll probably delete it and that will be the end of it. It won’t get very far. Not so, the computer virus, because it attaches itself to otherwise useful programs. The computer user will execute these programs in the normal course of using the computer, and the virus will get executed with them. In this way, viruses have gained viability on a world-wide scale.
The Structure of a Virus
Every viable computer virus must have at least two basic parts, or subroutines, if it is even to be called a virus. Firstly, it must contain a search routine, which locates new files or new disks which are worthwhile targets for infection. This routine will determine how well the virus reproduces, e.g., whether it does so quickly or slowly, whether it can infect multiple disks or a single disk, and whether it can infect every portion of a disk or just certain specific areas. As with all programs, there is a size versus functionality trade off here. The more sophisticated the search routine is, the more
space it will take up. So although an efficient search routine may help a virus to spread faster, it will make the virus bigger.
Secondly, every computer virus must contain a routine to copy itself into the program which the search routine locates. The copy routine will only be sophisticated enough to do its job without getting caught. The smaller it is, the better. How small it can be will depend on how complex a virus it must copy, and what the target is. For example, a virus which infects only COM files can get by with a much smaller copy routine than a virus which infects EXE files. This is because the EXE file structure is much more complex, so the virus must do more to attach itself to an EXE file.
In addition to search and copy mechanisms, computer viruses often contain anti-detection routines, or anti-anti-virus routines. Computer Virus Basics 15 These range in complexity from something that merely keeps the date on a file the same when a virus infects it, to complex routines that camouflage viruses and trick specific anti-virus programs into
believing they’re not there, or routines which turn the anti-virus they attack into a logic bomb itself.
Saturday, November 7, 2009
Virus Writing
4:23 PM
Karthikh Venkat
Popular Posts( Last 7 Days )
-
wwe wallpapers,wwe stills, wwe posters,wwe latest picture photo posters collections, batista latest pictures wallpapers posters news recent
-
Pak match-fixing scandal: Handed over 'proof' of Asif's corruption, says Veena Malik Lahore: Pakistani cri...
-
Holly Madison Cullen is an American model and television celebrity was born on December 23, 1979 in Astoria, Oregon. Holly Madison is bes...
-
Thalaivaa Our Thalaivaa Our Thalaivaa Thalaivaa Thala Thala Thala Thala Thala Thalaivaa Ivane Tamilanin Thalapathy Kodai Thaan Iv...
-
Deepika Padukone on Grazia Magazine Cover Page (February 2011) Deepika Padukone features on the cover of Grazia Magazine Indian edition for ...