Types of Computer Viruses & The sense
Understanding Viruses are programs created by a programmer who is merusak.Virus menginpeksi files with certain eksetensi. For example, exe, txt, jpg and other sebagainya.Jenis - types of viruses can be divided into several sections, namely:
a. Boot sector virusIt is a common virus, replicate bersipat by crushing the original bootsector on a disk, so when booting the virus will immediately run into memory.
b. Virus fileAttacking the file that is run by an operating system. Usually attacking com or exe.
c. Virus direct actionThis virus will enter kememori to run another program menajalankan lainnya.lalu files to cheat.
d. Multi partition virusIt is a combination of the virus and the virus bootsector file.
e. Polymorphic virusesViruses are designed to fool the AV program. That changed the structure itself after running the command.
f. Stealth virusControlling instruction - instruction level with a master DOS interrupt table.
g. Magro virus
h. Written by the programming language of the application, so bersipat flatform independent.
Differences viruses with other computer application programs are:
1. The ability to get important information.The virus is designed to infect or file.misalnya banyk program, the virus will infect the whole txt file or htt then the virus will find information about the files - files or programs - programs. Once the virus had been informed, it will be stored in memory or a certain file attributes are set to hidden (tersembnyi).
2. The ability to check the program or fileWhen it infects a file, a virus must be able to check whether a file is infected or not. Usually the virus will check byte used by the virus, or by any other name as a marker. If the marker tersbut exists, the virus will not infect the file. But if the file does not exist penandany, the virus will infect the file.
3. The ability to multiplyThis capability should be (mandatory) owned virus, because this capability is used for virus proliferation. Usually the virus will provide markers and insert a program to reproduce the virus.
4. The ability to manipulateThis capability is used to display messages, images, delete files, steal data or files, and so forth.The ability to hide themselves from data createdAll activities must be conducted invisible virus, either from the user, or from the computer. It is a beauty of a virus.Biasanya we bsia see the whole process is dikomputer (especially windows-based). Simply by pressing ctrl + alt + delete, it will display a box that contains a process - a process running on the computer. Lakeside Lakeside good virus is a virus that is not captured by the trapping process is. Moreover, to avoid detection of an anti-virus.
Various kinds of viruses:
1.Virus Bagle.BCThis BC Bagle virus is one type of harmful viruses and has entered the top ranking of the fastest type of virus affecting your computer. A few hours after the release of the virus, already there are 2 variants of Bagle (Bagle BD and BE) that spread through e-mail, computer networks and P2P applications. The virus is spread through e-mail with a variety of different subjects. According to a study from Panda Software BC Bagle virus is seeping into an e-mail with the subject, among others: Re:, Re: Hello, Re: Hi, Re: Thank you, Re: Thanks. Attachment was also an assortment, among others:. Com,. Cpl,. Exe,. Scr. BC Bagle virus is also able to stop the antivirus programs.
2.Backdoor AlnicaViruses are also dangerous this is one type of Trojan Horse virus. Is one that if successful backdoor virus infects a computer will be able to remotely access and retrieve all the information desired by the attacker. The operating system is attacked by a virus, such as: Windows 200, Windows 95, Windows 98, Windows Me, Windows NT, and Windows XP. This virus size of 57,856 bytes.
3.Trojan in LinuxThe Red Hat Linux users are expected to be wary PATCH sent you via e-mail with the address "security@redhat.com" because it's actually not patch security but Trojan virus that can mess up the security system. E-mail alert from Red Hat usually always sent from the address "secalert@redhat.com" and digitally signed. This virus also attacks the Windows security system in 2003 with the subject offering security solutions.
4.CABIRIs a Symbian Cabir virus first and most popular to date. Cabir including the type of worm that spreads via a Bluetooth connection to a mobile phone and enter your message inbox with names that draw attention. If you click file.sis and install it, Cabir will start looking for new prey open mobile phone with Bluetooth access to infected him.Cabir is also known as SymOS / Cabir.A, EPOC / Cabir.A, Worm.Symbian.Cabir.a and Caribe virus. Variant has now grown to last alphabet frills Cabir.Z. Cabir.Z is actually a variant of the Cabir B, just spread the name velasco.sis.Cabir will activate your Bluetooth periodically, about 15-20 minutes or so to find their prey. There was no significant damage to the file, only if your phone is infected, the battery will run out quickly because it is used to search for other Bluetooth devices.To prevent this, turn off (disable) Bluetooth feature. Activate only when you want to use. And the thing to remember is do not install Symbian application with the name or names caribe.sis strange.
5. PostcardPostcard in the family type of mobile phone virus worm. The virus is spread through MMS, Bluetooth connection, and exchange the memory card with the name beracak (random) xxx.sis.Postcard attack types vary. The most common, Commwarrior spreads via Bluetooth. Some variants can also send random MMS to contacts contained in your phonebook. Postcard not only have one name. Like the villain, he also has a pseudonym or alias as Postcard [known by anvir F-Secure], SymbOS / Commwarrior [McAfee], SYMBOS_COMWAR [Trend Micro].Today is the last variant Postcard Postcard T. Postcard T and Q only infects the Symbian version 8.1 or older. Besides sporadically spread, the virus also opens a html page on your phone with the message:Introduction Surprise! Your phone infected by Commwarrior worm v3.0. Matrix has you, Commwarrior inside. No panic please, is it very interesting to have mobile virus at own phone. This worm does not bring any harm to your phone and your significant data. About Postcard wor for Nokia Series 60 provides automatic real-time protection against Harmful Anti-Virus content. Postcard is free software and is distributed in the hope that it wil be useful, anya without warranty. Thank you for using CommWarrior.CommWarrior 2005-2006 by e10d0r.
6. SKULLSThe next Virus is a virus called Skulls or full name SymbOS.skulls. Skulls Trojan belonging is a change in the phone system and causes the main menu icons turned into a skull. Initially, this Trojan named Extended theme.sis, but are now mostly found as skull.sis.Several variants of this strain has spread. In variant skulls.A somehow he did not give any effect. However skulls.C and H and S, almost all of the icon turns into a skull ... hiiii scary ....During installation Skull variant H, raises notification sentence 'Install' beta'_092_free-sms-RM8 "while Skull S displays the phrase" Install BlueNum Stealer ". Not only change icons, skulls also able to disable applications that the icon had changed. Generally when we pressed the icon of the application that appears is the system error message.
7. DoombootAlthough computer viruses spread not fierce, but the damage caused by Doomboot is quite serious. His full name SymbOS.Doombot. This virus also has a pseudonym such as Doomboot [F-Secure], SYMBOS_DOOMED [Trend Micro].Currently doombot variant manifold. There Doomboot A, C, L, M, G and P. Doomboot including Trojan virus category. Varian Doomboot.A put and make the files corrupt and dangerous, after infecting cell phone, he will put other viruses such Commwarrior.B into your mobile phone. The file system was corrupt cause the phone can not boot.SymbOS.Doomboot.A for example, hacked into your phone with games like Doom2 installation file that has been cracked. Usually named Doom_2_wad_cracked_by_DFT_S60_v1.0.sis. While Doomboot C infiltrated the pseudonym "exoVirusStopv 2:13:19", similar to the name of the mobile phone anti virus. If the received file and install it, you will not receive any technical after that. You also would not think that the phone has been infected because there is no icon or any sign after the installation process. By Doombot Commwarrior.B loaded into the phone will run automatically and spreads via a Bluetooth connection. This will cause the phone to consume excessive battery, so the battery life. Worse, Doomboot will make the phone can not boot when you turn off the phone and restart. If you already do a reboot, then the only way you can do is do a hard reset. As a result, most of the data that you have stored as images, sounds or other data be lost without trace.
8. APPDISBLERPerformance AppDisabler actually similar to Doomboot. He will put the files other viruses such as Cabir Locknut B and Y into the phone system. AppDisabler also took Skulls J and icons will turn your system into a skull. Even more appalling, the virus will stop operating systems performance as well as some third-party applications.
9. CardTrapCardTrap is the first mobile phone virus tries to infect Windows-based computer with a virus put 2 files into the phone's memory card. If the card is connected at any time to infect computers.Varian CardTrap quite a lot. Variants of a single lettered as CardTrap P, Q, R, S to variant double beraksara sepert CardTrap AA, AG, AJ, and so on. CardTrap usually disguised by using the names of well-known applications such as games or Kingkong, Half Life, Battefield 2 and others. CardTrap Z for example, disguised under the name SeleQ 1.7 - CrackedTNT.sis. CardTrap damage the system by turning off some of the applications built-in Symbian. The virus is also quite sophisticated so as to paralyze some kind of anti virus. Furthermore, if there is an opportunity to connect to the computer, CardTrap will attempt to plant viruses in Windows-based PC. Several variants like CardTrap Z can also disable the keypad, disrupt third-party applications, and deploy the files to the memory card corrupted to cause chaos system.
10. LocknutLocknut or full name SymbOS.Locknut a Trojan virus that operate by exploiting weaknesses in the system Symbian S60. virus is quite dangerous because it can replace the binary file on the system ROM. Locknut result may cause the mobile operating system freezes and crashes. The virus is pick the many pseudonyms including Locknut [F-Secure], SYMBOS_LOCKNUT [Trend Micro]. Symbian phones are affected by this virus has characteristics or message will display the following message:
App. closed
AppArServerTh
Read
In addition, the virus also has the added lift aka virus Cabir virus that will follow if virus installed Locknut menangkiti your phone. Several variants of the virus Caribe also strung together this Locknut virus. Locknut E, one variant locknut will damage important files on the Symbian system and causes the installed applications can not be opened. This effectively will make your phone is locked.
11. PBStealerReportedly, PBStealer is one of the mobile phone virus made by Indonesia (made in Indonesia euy,, needs to be honored and given awards nih author hahahaha). PBStealer have aliases SymbOS / PBStealer (Symantec), is a Trojan that resembles the application to collect the contact in your phonebook and will save them as a text file (*. Txt). Glance it is not dangerous. But the steps taken PBStealer selanjutnyalah that makes you have to be vigilant. PBStealer will then send the txt file to another phone via Bluetooth connection. Conceivably it??? If there is in your contacts and important numbers used for evil??PBStealer D, one variant PBStealer can also compile and send the file containing contacts, to do list, and notepad database at once. PBStealer D spread itself by sending two application file extension SIS is ChattingYuk.SIS and PBCompressor.SIS via Bluetooth connection.
12. RommWarSymbOS / Rommwar (according to Symantec) Trojan category. Viruses of this type would put some kind of small software program onto the target cell phone. The program will then be able to make the target phone malfunctioning.Symptoms depend dysfunction ROM software version on your phone. RommWar effect caused by any variety. Starting from the hang, the phone restarts itself, to make the power button does not work. However, in some cases, these symptoms do not appear to be running as normal phone. This RommWar Virus layakanya a Symbian application extension. Sis. His name could change all sorts. It could be the name of the application is very tempting and makes you teratarik to install it. For example theme.sis, bunga_citra.sis, xxx.sis and others. When through the process of installation, usually RommWar will display strange messages.Until now SymbOS / Rommwar has evolved pick 4 variants namely:
* RommWar.A will give the effect varies, depending on the software version ROM on your phone. The first variant is causing the phone hangs and must be restarted again. Shortly after the restart, the phone hangs back. To do this, utilize the functionality of this RommWar MIME recognizer.* RommWar.B Miraculously, this second variant RommWar phone will restart itself and will prevent your phone to boot. Severe right???? Not bad is it????* RommWar.C Just like version B. This virus will prevent your phone to light up!* RommWar.D \ RommWar this latest variant effects range from cell phones can not be flame until the power button is not functioning. Interestingly, installation SymbOS / RommWar, sometimes also boarded by the installation of Kaspersky Anti-Virus mobile is not perfect.
13. Discusx.vbsVirus VBScript this one, has a size of about 4800 bytes. He will try to infect multiple drives on your computer, including flash disk drive, which if infected will create an autorun.inf file on the root drive and System32.sys.vbs it. In addition, he will change the caption of Internet Explorer to ". :: Discus-X LEBARAN MET SAY! [HAPPY LEBARAN?!] ::. '.
14. Reva.vbsAgain, the virus types that VBScript pretty much complained of by some readers. He will try to spread itself to any drive on your computer including flash disk drive. On the drive there will be infected Reva.vbs file, autorun.inf, and shaheedan.jpg. In addition, he will change the default page of Internet Explorer to point to the site http://www.arrahmah.com.
15. XFlyPC Media Antivirus identifies two variants of the virus, namely XFly.A and XFly.B. Just like most other local viruses, he created using Visual Basic. It has a body size of 143,360 bytes without being compressed. And he can masquerade as folders, WinAmp MP3 file or any other way directly change the icon resource that is in his body. It will be more difficult to recognize a lay user. At the infected computer, when running Internet Explorer, its caption is changed to ".. :: X-fly :: ..", and when starting Windows will display a message from the creator of the virus in the default browser. Or every time show at 12:30, 16:00, or 20:00, the virus will display a black screen that also contains a message from the creator of the virus.
16. ExploreaViruses that are compiled using Visual Basic comes with a size of about 167,936 bytes, without being compressed. Using a standard Windows folder icon similar to defraud victims. This virus will attack your Windows Registry to change the default open than some extensions like. LNK,. PIF,. BAT, and. COM. At the infected computer, times when certain error message sometimes appears, for example, when opening the System Properties.
17. Gen.FFEGen.FFE or manufacturer named Fast Firus Engine is one of the Generator Virus program locally made. By simply using this program, it did not take long to create a virus / new variants. Virus output of this program uses the standard folder icon similar to the default Windows image. He will block access to the Task Manager, Command Prompt, and eliminate some of the menu in the Start Menu. He also will read the caption of the current program, if there is a string associated with the antivirus program will soon be closed to him.
18. EmptyViruses are also created using Visual Basic and had a folder icon has a size of about 110,592 bytes, without being compressed. There are so many changes that he made in Windows, such as Registry, File System, and so forth, which can even cause Windows can not be used as it should be. On computers that are infected by this virus, when starting Windows will display a message from the creator of the virus.
19. Raider.vbsThis VBScript virus type size 10,000 bytes, if the virus file opened with Notepad for example, so many strings that can be read because the encrypted condition. In the Registry, he gives recognition to create a new key in HKLM \ Software with the same name as the name of the computer name, the contents of a string value such as a virus, Raider, and the date of the first computer infected.
20. ForrisWaitmeViruses are created with Visual Basic using the standard Windows folder icon similar to disguises. Some of his behavior is exchanged with the left mouse button function right, removes the Folder Options menu, create a message "read saya.txt" the drive is infected, and there were others.
21. PrayLocal virus was created using Visual Basic. We found 2 variants of this virus, for Pray.A variant does not have an icon, while for variant Pray.B use like Windows Explorer icon. If the computer is infected by this virus, while at the computer show at 05:15, 13:00, 16:00, 18:30, or 19:45, the virus displays a message reminding the user to perform the prayer.
22. Rian.vbsVBScript virus has a size of 3788 bytes. When infected, it will create a new file autorun.inf and RiaN.dll.vbs at the root of each drive is installed on the victim's computer, including Flash Disk. Computers infected by this virus, the caption of Internet Explorer.
Understanding Viruses are programs created by a programmer who is merusak.Virus menginpeksi files with certain eksetensi. For example, exe, txt, jpg and other sebagainya.Jenis - types of viruses can be divided into several sections, namely:
a. Boot sector virusIt is a common virus, replicate bersipat by crushing the original bootsector on a disk, so when booting the virus will immediately run into memory.
b. Virus fileAttacking the file that is run by an operating system. Usually attacking com or exe.
c. Virus direct actionThis virus will enter kememori to run another program menajalankan lainnya.lalu files to cheat.
d. Multi partition virusIt is a combination of the virus and the virus bootsector file.
e. Polymorphic virusesViruses are designed to fool the AV program. That changed the structure itself after running the command.
f. Stealth virusControlling instruction - instruction level with a master DOS interrupt table.
g. Magro virus
h. Written by the programming language of the application, so bersipat flatform independent.
Differences viruses with other computer application programs are:
1. The ability to get important information.The virus is designed to infect or file.misalnya banyk program, the virus will infect the whole txt file or htt then the virus will find information about the files - files or programs - programs. Once the virus had been informed, it will be stored in memory or a certain file attributes are set to hidden (tersembnyi).
2. The ability to check the program or fileWhen it infects a file, a virus must be able to check whether a file is infected or not. Usually the virus will check byte used by the virus, or by any other name as a marker. If the marker tersbut exists, the virus will not infect the file. But if the file does not exist penandany, the virus will infect the file.
3. The ability to multiplyThis capability should be (mandatory) owned virus, because this capability is used for virus proliferation. Usually the virus will provide markers and insert a program to reproduce the virus.
4. The ability to manipulateThis capability is used to display messages, images, delete files, steal data or files, and so forth.The ability to hide themselves from data createdAll activities must be conducted invisible virus, either from the user, or from the computer. It is a beauty of a virus.Biasanya we bsia see the whole process is dikomputer (especially windows-based). Simply by pressing ctrl + alt + delete, it will display a box that contains a process - a process running on the computer. Lakeside Lakeside good virus is a virus that is not captured by the trapping process is. Moreover, to avoid detection of an anti-virus.
Various kinds of viruses:
1.Virus Bagle.BCThis BC Bagle virus is one type of harmful viruses and has entered the top ranking of the fastest type of virus affecting your computer. A few hours after the release of the virus, already there are 2 variants of Bagle (Bagle BD and BE) that spread through e-mail, computer networks and P2P applications. The virus is spread through e-mail with a variety of different subjects. According to a study from Panda Software BC Bagle virus is seeping into an e-mail with the subject, among others: Re:, Re: Hello, Re: Hi, Re: Thank you, Re: Thanks. Attachment was also an assortment, among others:. Com,. Cpl,. Exe,. Scr. BC Bagle virus is also able to stop the antivirus programs.
2.Backdoor AlnicaViruses are also dangerous this is one type of Trojan Horse virus. Is one that if successful backdoor virus infects a computer will be able to remotely access and retrieve all the information desired by the attacker. The operating system is attacked by a virus, such as: Windows 200, Windows 95, Windows 98, Windows Me, Windows NT, and Windows XP. This virus size of 57,856 bytes.
3.Trojan in LinuxThe Red Hat Linux users are expected to be wary PATCH sent you via e-mail with the address "security@redhat.com" because it's actually not patch security but Trojan virus that can mess up the security system. E-mail alert from Red Hat usually always sent from the address "secalert@redhat.com" and digitally signed. This virus also attacks the Windows security system in 2003 with the subject offering security solutions.
4.CABIRIs a Symbian Cabir virus first and most popular to date. Cabir including the type of worm that spreads via a Bluetooth connection to a mobile phone and enter your message inbox with names that draw attention. If you click file.sis and install it, Cabir will start looking for new prey open mobile phone with Bluetooth access to infected him.Cabir is also known as SymOS / Cabir.A, EPOC / Cabir.A, Worm.Symbian.Cabir.a and Caribe virus. Variant has now grown to last alphabet frills Cabir.Z. Cabir.Z is actually a variant of the Cabir B, just spread the name velasco.sis.Cabir will activate your Bluetooth periodically, about 15-20 minutes or so to find their prey. There was no significant damage to the file, only if your phone is infected, the battery will run out quickly because it is used to search for other Bluetooth devices.To prevent this, turn off (disable) Bluetooth feature. Activate only when you want to use. And the thing to remember is do not install Symbian application with the name or names caribe.sis strange.
5. PostcardPostcard in the family type of mobile phone virus worm. The virus is spread through MMS, Bluetooth connection, and exchange the memory card with the name beracak (random) xxx.sis.Postcard attack types vary. The most common, Commwarrior spreads via Bluetooth. Some variants can also send random MMS to contacts contained in your phonebook. Postcard not only have one name. Like the villain, he also has a pseudonym or alias as Postcard [known by anvir F-Secure], SymbOS / Commwarrior [McAfee], SYMBOS_COMWAR [Trend Micro].Today is the last variant Postcard Postcard T. Postcard T and Q only infects the Symbian version 8.1 or older. Besides sporadically spread, the virus also opens a html page on your phone with the message:Introduction Surprise! Your phone infected by Commwarrior worm v3.0. Matrix has you, Commwarrior inside. No panic please, is it very interesting to have mobile virus at own phone. This worm does not bring any harm to your phone and your significant data. About Postcard wor for Nokia Series 60 provides automatic real-time protection against Harmful Anti-Virus content. Postcard is free software and is distributed in the hope that it wil be useful, anya without warranty. Thank you for using CommWarrior.CommWarrior 2005-2006 by e10d0r.
6. SKULLSThe next Virus is a virus called Skulls or full name SymbOS.skulls. Skulls Trojan belonging is a change in the phone system and causes the main menu icons turned into a skull. Initially, this Trojan named Extended theme.sis, but are now mostly found as skull.sis.Several variants of this strain has spread. In variant skulls.A somehow he did not give any effect. However skulls.C and H and S, almost all of the icon turns into a skull ... hiiii scary ....During installation Skull variant H, raises notification sentence 'Install' beta'_092_free-sms-RM8 "while Skull S displays the phrase" Install BlueNum Stealer ". Not only change icons, skulls also able to disable applications that the icon had changed. Generally when we pressed the icon of the application that appears is the system error message.
7. DoombootAlthough computer viruses spread not fierce, but the damage caused by Doomboot is quite serious. His full name SymbOS.Doombot. This virus also has a pseudonym such as Doomboot [F-Secure], SYMBOS_DOOMED [Trend Micro].Currently doombot variant manifold. There Doomboot A, C, L, M, G and P. Doomboot including Trojan virus category. Varian Doomboot.A put and make the files corrupt and dangerous, after infecting cell phone, he will put other viruses such Commwarrior.B into your mobile phone. The file system was corrupt cause the phone can not boot.SymbOS.Doomboot.A for example, hacked into your phone with games like Doom2 installation file that has been cracked. Usually named Doom_2_wad_cracked_by_DFT_S60_v1.0.sis. While Doomboot C infiltrated the pseudonym "exoVirusStopv 2:13:19", similar to the name of the mobile phone anti virus. If the received file and install it, you will not receive any technical after that. You also would not think that the phone has been infected because there is no icon or any sign after the installation process. By Doombot Commwarrior.B loaded into the phone will run automatically and spreads via a Bluetooth connection. This will cause the phone to consume excessive battery, so the battery life. Worse, Doomboot will make the phone can not boot when you turn off the phone and restart. If you already do a reboot, then the only way you can do is do a hard reset. As a result, most of the data that you have stored as images, sounds or other data be lost without trace.
8. APPDISBLERPerformance AppDisabler actually similar to Doomboot. He will put the files other viruses such as Cabir Locknut B and Y into the phone system. AppDisabler also took Skulls J and icons will turn your system into a skull. Even more appalling, the virus will stop operating systems performance as well as some third-party applications.
9. CardTrapCardTrap is the first mobile phone virus tries to infect Windows-based computer with a virus put 2 files into the phone's memory card. If the card is connected at any time to infect computers.Varian CardTrap quite a lot. Variants of a single lettered as CardTrap P, Q, R, S to variant double beraksara sepert CardTrap AA, AG, AJ, and so on. CardTrap usually disguised by using the names of well-known applications such as games or Kingkong, Half Life, Battefield 2 and others. CardTrap Z for example, disguised under the name SeleQ 1.7 - CrackedTNT.sis. CardTrap damage the system by turning off some of the applications built-in Symbian. The virus is also quite sophisticated so as to paralyze some kind of anti virus. Furthermore, if there is an opportunity to connect to the computer, CardTrap will attempt to plant viruses in Windows-based PC. Several variants like CardTrap Z can also disable the keypad, disrupt third-party applications, and deploy the files to the memory card corrupted to cause chaos system.
10. LocknutLocknut or full name SymbOS.Locknut a Trojan virus that operate by exploiting weaknesses in the system Symbian S60. virus is quite dangerous because it can replace the binary file on the system ROM. Locknut result may cause the mobile operating system freezes and crashes. The virus is pick the many pseudonyms including Locknut [F-Secure], SYMBOS_LOCKNUT [Trend Micro]. Symbian phones are affected by this virus has characteristics or message will display the following message:
App. closed
AppArServerTh
Read
In addition, the virus also has the added lift aka virus Cabir virus that will follow if virus installed Locknut menangkiti your phone. Several variants of the virus Caribe also strung together this Locknut virus. Locknut E, one variant locknut will damage important files on the Symbian system and causes the installed applications can not be opened. This effectively will make your phone is locked.
11. PBStealerReportedly, PBStealer is one of the mobile phone virus made by Indonesia (made in Indonesia euy,, needs to be honored and given awards nih author hahahaha). PBStealer have aliases SymbOS / PBStealer (Symantec), is a Trojan that resembles the application to collect the contact in your phonebook and will save them as a text file (*. Txt). Glance it is not dangerous. But the steps taken PBStealer selanjutnyalah that makes you have to be vigilant. PBStealer will then send the txt file to another phone via Bluetooth connection. Conceivably it??? If there is in your contacts and important numbers used for evil??PBStealer D, one variant PBStealer can also compile and send the file containing contacts, to do list, and notepad database at once. PBStealer D spread itself by sending two application file extension SIS is ChattingYuk.SIS and PBCompressor.SIS via Bluetooth connection.
12. RommWarSymbOS / Rommwar (according to Symantec) Trojan category. Viruses of this type would put some kind of small software program onto the target cell phone. The program will then be able to make the target phone malfunctioning.Symptoms depend dysfunction ROM software version on your phone. RommWar effect caused by any variety. Starting from the hang, the phone restarts itself, to make the power button does not work. However, in some cases, these symptoms do not appear to be running as normal phone. This RommWar Virus layakanya a Symbian application extension. Sis. His name could change all sorts. It could be the name of the application is very tempting and makes you teratarik to install it. For example theme.sis, bunga_citra.sis, xxx.sis and others. When through the process of installation, usually RommWar will display strange messages.Until now SymbOS / Rommwar has evolved pick 4 variants namely:
* RommWar.A will give the effect varies, depending on the software version ROM on your phone. The first variant is causing the phone hangs and must be restarted again. Shortly after the restart, the phone hangs back. To do this, utilize the functionality of this RommWar MIME recognizer.* RommWar.B Miraculously, this second variant RommWar phone will restart itself and will prevent your phone to boot. Severe right???? Not bad is it????* RommWar.C Just like version B. This virus will prevent your phone to light up!* RommWar.D \ RommWar this latest variant effects range from cell phones can not be flame until the power button is not functioning. Interestingly, installation SymbOS / RommWar, sometimes also boarded by the installation of Kaspersky Anti-Virus mobile is not perfect.
13. Discusx.vbsVirus VBScript this one, has a size of about 4800 bytes. He will try to infect multiple drives on your computer, including flash disk drive, which if infected will create an autorun.inf file on the root drive and System32.sys.vbs it. In addition, he will change the caption of Internet Explorer to ". :: Discus-X LEBARAN MET SAY! [HAPPY LEBARAN?!] ::. '.
14. Reva.vbsAgain, the virus types that VBScript pretty much complained of by some readers. He will try to spread itself to any drive on your computer including flash disk drive. On the drive there will be infected Reva.vbs file, autorun.inf, and shaheedan.jpg. In addition, he will change the default page of Internet Explorer to point to the site http://www.arrahmah.com.
15. XFlyPC Media Antivirus identifies two variants of the virus, namely XFly.A and XFly.B. Just like most other local viruses, he created using Visual Basic. It has a body size of 143,360 bytes without being compressed. And he can masquerade as folders, WinAmp MP3 file or any other way directly change the icon resource that is in his body. It will be more difficult to recognize a lay user. At the infected computer, when running Internet Explorer, its caption is changed to ".. :: X-fly :: ..", and when starting Windows will display a message from the creator of the virus in the default browser. Or every time show at 12:30, 16:00, or 20:00, the virus will display a black screen that also contains a message from the creator of the virus.
16. ExploreaViruses that are compiled using Visual Basic comes with a size of about 167,936 bytes, without being compressed. Using a standard Windows folder icon similar to defraud victims. This virus will attack your Windows Registry to change the default open than some extensions like. LNK,. PIF,. BAT, and. COM. At the infected computer, times when certain error message sometimes appears, for example, when opening the System Properties.
17. Gen.FFEGen.FFE or manufacturer named Fast Firus Engine is one of the Generator Virus program locally made. By simply using this program, it did not take long to create a virus / new variants. Virus output of this program uses the standard folder icon similar to the default Windows image. He will block access to the Task Manager, Command Prompt, and eliminate some of the menu in the Start Menu. He also will read the caption of the current program, if there is a string associated with the antivirus program will soon be closed to him.
18. EmptyViruses are also created using Visual Basic and had a folder icon has a size of about 110,592 bytes, without being compressed. There are so many changes that he made in Windows, such as Registry, File System, and so forth, which can even cause Windows can not be used as it should be. On computers that are infected by this virus, when starting Windows will display a message from the creator of the virus.
19. Raider.vbsThis VBScript virus type size 10,000 bytes, if the virus file opened with Notepad for example, so many strings that can be read because the encrypted condition. In the Registry, he gives recognition to create a new key in HKLM \ Software with the same name as the name of the computer name, the contents of a string value such as a virus, Raider, and the date of the first computer infected.
20. ForrisWaitmeViruses are created with Visual Basic using the standard Windows folder icon similar to disguises. Some of his behavior is exchanged with the left mouse button function right, removes the Folder Options menu, create a message "read saya.txt" the drive is infected, and there were others.
21. PrayLocal virus was created using Visual Basic. We found 2 variants of this virus, for Pray.A variant does not have an icon, while for variant Pray.B use like Windows Explorer icon. If the computer is infected by this virus, while at the computer show at 05:15, 13:00, 16:00, 18:30, or 19:45, the virus displays a message reminding the user to perform the prayer.
22. Rian.vbsVBScript virus has a size of 3788 bytes. When infected, it will create a new file autorun.inf and RiaN.dll.vbs at the root of each drive is installed on the victim's computer, including Flash Disk. Computers infected by this virus, the caption of Internet Explorer.
0 comments:
Post a Comment
KOMENTAR