Você está na página 1de 7

Computer Virus and Anti-Viruses

Sarvesh Srriram B
B.Tech(Information Technology)
Mepco Schlenk Engineering College, Sivakasi

Mail : sarveshsrriram@gmail.com

Abstract: This paper describes the clear A Non-memory-resident virus (or "non-resident virus"),
explanation of mechanism of an anti-virus when executed, scans the disk for targets, infects them,
software which we are using in our day-to-day and then exits (i.e. it does not remain in memory after it is
life. In early 90/s, Windows Operating system done executing). It is Non- resident virus since it affects
was just an interface between User and the disk storage and not exists in the disk and exits.
hardware. Now, present windows OS contains
default Anti-virus software Today, all Personal Boot Virus:
Computers (including Mac and Mobile OS like
Boot Viruses specifically targets the boot sector.
android) have mandated Anti-virus software for The host for this type of viruses is the Secondary storage
protection of our system. Since 2010, Many anti- devices such as Hard Disk Drive (HDD), Solid State Drive
virus software like Kaspersky, McAfee, Avast, (SSD), and other external storage devices.
etc., are available in markets. The main purpose
of antivirus is to protect PC from unwanted Macro Virus:
instructions or Apps. It also saves PC while
surfing through Internet. In this paper, A macro virus is a special type of computer
Algorithms used in a common antivirus, different virus which was specially written in Macro languages and
types of virus, stages of execution of malicious embedded in documents so that when the users open the
programs, Mechanisms and the importance of file, the virus code will get executed.
antivirus in a system is clearly described and
Macro viruses have become common since the
extra details are given for further reference via
mid-1990s. Most of these viruses are written in the
links.
scripting languages for Microsoft programs such as
What is a Computer Virus : Microsoft Word and Microsoft Excel and spread
throughout Microsoft Office by infecting documents and
A computer virus is the set of
spreadsheets. Since Word and Excel were also available
instructions causes malfunctioning on the system. It’ll
for Mac OS, most could also spread to Macintosh
affect the system by modifying the defaults of the coding
computers. Although most of these viruses did not have
by itself. It is mostly transmitted or spread via Internet as
the ability to send infected email messages, those viruses
well as intranet and also through Removable storage
which did take advantage of the Microsoft Outlook
devices. Based on the attacking parts of our computer,
Component Object Model (COM) interface Some old
these viruses are classified into three namely
versions of Microsoft Word allow macros to replicate
 Resident and Non- resident virus themselves with additional blank lines. If two macro
 Boot viruses simultaneously infect a document, the
 Macro combination of the two, if also self-replicating, can appear
 E-mail Viruses as a "mating" of the two and would likely be detected as a
virus unique from the "parents".
 Stealth Virus
Ex: Many Windows apps such as Word and Outlook
TYPES OF VIRUSES: allows macro programs to embed in e-mails and other
medium.
Resident and Non- Resident:
E-Mail Virus:
A resident virus is a software which installs as a
part of Operating System. This types of Viruses remains Email virus – A virus that intentionally, rather
in RAM after rebooting of system while shutting down than accidentally, uses the email system to spread. While
PC. Since this type of viruses are present in Memory, it is virus infected files may be accidentally sent as e-mail
also said to be Memory-Resident Virus. This type of attachments, email viruses are aware of email system
Viruses overwrite interrupt handling or code or other functions. They generally target a specific type of email
functions, and when the operating system attempts to system (Microsoft's Outlook is the most commonly used),
access the target file or disk sector, the virus code harvest email addresses from various sources, and may
intercepts the request and redirects the Control flow to the append copies of themselves to all email sent, or may
replication module, infecting the target.

1|Page
generate email messages containing copies of themselves compression virus was an example of a virus which was
as attachments. not malicious software (malware), but was putatively
benevolent (well-intentioned). However, antivirus
Stealth Virus: professionals do not accept the concept of "benevolent
viruses", as any desired function can be implemented
In order to avoid detection by users, some without involving a virus (automatic compression, for
viruses employ different kinds of deception. Some old instance, is available under the Windows operating system
viruses, especially on the DOS platform, make sure that at the choice of the user). Any virus will by definition
the "last modified" date of a host file stays the same when make unauthorised changes to a computer, which is
the file is infected by the virus. This approach does not undesirable even if no damage is done or intended. On
fool antivirus software, however, especially those which page one of Dr Solomon's Virus Encyclopaedia, the
maintain and date cyclic redundancy checks on file undesirability of viruses, even those that do nothing but
changes. Some viruses can infect files without increasing reproduce, is thoroughly explained.
their sizes or damaging the files. They accomplish this by
overwriting unused areas of executable files. These are The MacMag virus 'Universal Peace',
called cavity viruses. For example, the CIH virus, or as displayed on a Mac in March 1988
Chernobyl Virus, infects Portable Executable files.
Because those files have many empty gaps, the virus, The Creeper virus was first detected
which was 1 KB in length, did not add to the size of the on ARPANET, the forerunner of the Internet, in the early
file. Some viruses try to avoid detection by killing the 1970s Creeper was an experimental self-replicating
tasks associated with antivirus software before it can program written by Bob Thomas at BBN Technologies in
detect them (for example, Conficker). In the 2010s, as 1971. Creeper used the ARPANET to infect DEC PDP-10
computers and operating systems grow larger and more computers running the TENEX operating system. Creeper
complex, old hiding techniques need to be updated or gained access via the ARPANET and copied itself to the
replaced. Defending a computer against viruses may remote system where the message, "I'm the creeper, catch
demand that a file system migrate towards detailed and me if you can!" was displayed. The Reaper program was
explicit permission for every kind of file access, but need created to delete Creeper. In fiction, the 1973 Michael
Citation. Crichton sciBoot Viruses specifically targets the boot
sector. The host for this type of viruses is the Secondary
The only reliable method to avoid "stealth" viruses is to storage devices such as Hard Disk Drive (HDD), Solid
"reboot" from a medium that is known to be "clear". State Drive (SSD), and other external storage devices.
Security software can then be used to check the dormant
operating system files. Most security software relies on A macro virus is a special type of computer virus which
virus signatures, or they employ heuristics Security was specially written in Macro languages and embedded
software may also use a database of file "hashes" for in documents so that when the users open the file, the virus
Windows OS files, so the security software can identify code will get executed.
altered files, and request Windows installation media to Macro viruses have become common since the
replace them with authentic versions. In older versions of mid-1990s. Most of these viruses are written in the
Windows, file cryptographic hash functions of Windows scripting languages for Microsoft programs such as
OS files stored in Windows—to allow file Microsoft Word and Microsoft Excel and spread
integrity/authenticity to be checked—could be overwritten throughout Microsoft Office by infecting documents and
so that the System File Checker would report that altered spreadsheets. Since Word and Excel were also available
system files are authentic, so using file hashes to scan for for Mac OS, most could also spread to Macintosh
altered files would not always guarantee finding an computers. Although most of these viruses did not have
infection. the ability to send infected email messages, those viruses
which did take advantage of the Microsoft Outlook
HISTORY OF COMPUTER VIRUS: Component Object Model (COM) interface Some old
In 1982, a program called "Elk versions of Microsoft Word allow macros to replicate
Cloner" was the first personal computer virus to appear "in themselves with additional blank lines. If two macro
the wild" that is, outside the single computer or [computer] viruses simultaneously infect a document, the
lab where it was created. Written in 1981 by Richard combination of the two, if also self-replicating, can appear
Skrenta while in the ninth grade at Mount Lebanon High as a "mating" of the two and would likely be detected as a
School near Pittsburgh, it attached itself to the Apple DOS virus unique from the "parents".
3.3 operating system and spread via floppy disk. This Ex: Many Windows apps such as Word and Outlook
virus, created as a practical joke when Skrenta was still in which allows macro programs to embed in e-mails and
high school, was injected in a game on a floppy disk. On other medium.
its 50th use the Elk Cloner virus would be activated,
infecting the personal computer and displaying a short Email virus – A virus that intentionally, rather than
poem beginning "Elk Cloner: The program with a accidentally, uses the email system to spread. While virus
personality.". In 1987, Fred Cohen published a infected files may be accidentally sent as e-mail
demonstration that there is no algorithm that can perfectly attachments, email viruses are aware of email system
detect all possible viruses. Fred Cohen's theoretical functions. They generally target a specific type of email

2|Page
system (Microsoft's Outlook is the most commonly used), published a demonstration that there is no algorithm that
harvest email addresses from various sources, and may can perfectly detect all possible viruses. Fred Cohen's
append copies of themselves to all email sent, or may theoretical compression virus was an example of a virus
generate email messages containing copies of themselves which was not malicious software (malware), but was
as attachments. putatively benevolent (well-intentioned). However,
antivirus professionals do not accept the concept of
In order to avoid detection by users, some viruses employ "benevolent viruses", as any desired function can be
different kinds of deception. Some old viruses, especially implemented without involving a virus (automatic
on the DOS platform, make sure that the "last modified" compression, for instance, is available under the Windows
date of a host file stays the same when the file is infected operating system at the choice of the user). Any virus will
by the virus. This approach does not fool antivirus by definition make unauthorised changes to a computer,
software, however, especially those which maintain and which is undesirable even if no damage is done or
date cyclic redundancy checks on file changes. Some intended. On page one of Dr Solomon's Virus
viruses can infect files without increasing their sizes or Encyclopaedia, the undesirability of viruses, even those
damaging the files. They accomplish this by overwriting that do nothing but reproduce, is thoroughly explained.
unused areas of executable files. These are called cavity
viruses. For example, the CIH virus, or Chernobyl Virus, The MacMag virus 'Universal Peace',
infects Portable Executable files. Because those files have as displayed on a Mac in March 1988
many empty gaps, the virus, which was 1 KB in length,
did not add to the size of the file. Some viruses try to avoid The Creeper virus was first detected
detection by killing the tasks associated with antivirus on ARPANET, the forerunner of the Internet, in the early
software before it can detect them (for example, 1970s Creeper was an experimental self-replicating
Conficker). In the 2010s, as computers and operating program written by Bob Thomas at BBN Technologies in
systems grow larger and more complex, old hiding 1971. Creeper used the ARPANET to infect DEC PDP-10
techniques need to be updated or replaced. Defending a computers running the TENEX operating system. Creeper
computer against viruses may demand that a file system gained access via the ARPANET and copied itself to the
migrate towards detailed and explicit permission for every remote system where the message, "I'm the creeper, catch
kind of file access, but need Citation. me if you can!" was displayed. The Reaper program was
created to delete Creeper. In fiction, the 1973 Michael
The only reliable method to avoid "stealth" viruses is to Crichton sci
"reboot" from a medium that is known to be "clear".
Security software can then be used to check the dormant -fi movie Westworld made an early mention of the concept
operating system files. Most security software relies on of a computer virus, being a central plot theme that causes
virus signatures, or they employ heuristics Security androids to run amok. Alan Oppenheimer's character
software may also use a database of file "hashes" for summarizes the problem by stating that "...there's a clear
Windows OS files, so the security software can identify pattern here which suggests an analogy to an infectious
altered files, and request Windows installation media to disease process, spreading from one...area to the next." To
replace them with authentic versions. In older versions of which the replies are stated: "Perhaps there are superficial
Windows, file cryptographic hash functions of Windows similarities to disease" and, "I must confess I find it
OS files stored in Windows—to allow file difficult to believe in a disease of machinery."
integrity/authenticity to be checked—could be overwritten
The first IBM PC
so that the System File Checker would report that altered
compatible "in the wild" computer virus, and one of the
system files are authentic, so using file hashes to scan for
first real widespread infections, was "Brain" in 1986.
altered files would not always guarantee finding an
From then, the number of viruses has grown
infection.
exponentially. Most of the computer viruses written in the
In 1982, a program called "Elk Cloner" was the first early and mid-1980s were limited to self-reproduction and
personal computer virus to appear "in the wild" that is, had no specific damage routine built into the code. That
outside the single computer or [computer] lab where it was changed when more and more programmers became
created. Written in 1981 by Richard Skrenta while in the acquainted with computer virus programming and created
ninth grade at Mount Lebanon High School near viruses that manipulated or even destroyed data on
Pittsburgh, it attached itself to the Apple DOS 3.3 infected computers.
operating system and spread via floppy disk. This virus,
created as a practical joke when Skrenta was still in high
school, was injected in a game on a floppy disk. On its
50th use the Elk Cloner virus would be activated, infecting INFECTION MECHANISM:
the personal computer and displaying a short poem
We all know that there are some Steps
beginning "Elk Cloner: The program with a personality."
or Life cycle of micro-organism which causes disease.
In 1984 Fred Cohen from the University of Southern
Likewise, there are some steps or mechanism that infects
California wrote his paper "Computer Viruses – Theory
Computer also. The steps include
and Experiments". It was the first paper to explicitly call a
self-reproducing program a "virus", a term introduced by  Dormant Phase
Cohen's mentor Leonard Adleman. In 1987, Fred Cohen  Propagation Phase

3|Page
 Triggering Phase that the exclusive-or operation had only to be repeated for
 Execution Phase decryption. It is suspicious for a code to modify itself, so
the code to do the encryption/decryption may be part of
Dormant Phase: The virus program is idle the signature in many virus definitions.[citation needed] A
during this stage. The virus program has managed to simpler older approach did not use a key, where the
access the target user's computer or software, but during encryption consisted only of operations with no
this stage, the virus does not take any action. The virus will parameters, like incrementing and decrementing, bitwise
eventually be activated by the "trigger" which states which rotation, arithmetic negation, and logical NOT. Some
event will execute the virus, such as a date, the presence viruses, called polymorphic viruses, will employ a means
of another program or file, the capacity of the disk of encryption inside an executable in which the virus is
exceeding some limit or the user taking a certain action encrypted under certain events, such as the virus scanner
(e.g., double-clicking on a certain icon, opening an e-mail, being disabled for updates or the computer being rebooted.
etc.). Not all viruses have this stage. This is called cryptovirology. At said times, the executable
will decrypt the virus and execute its hidden runtimes,
Propagation Phase: The virus starts infecting the computer and sometimes disabling the
propagating, that is multiplying and replicating itself. The antivirus software.
virus places a copy of itself into other programs or into
certain system areas on the disk. The copy may not be Polymorphic Code:
identical to the propagating version; viruses often "morph"
or change to evade detection by IT professionals and anti- Some viruses employ polymorphic
virus software. Each infected program will now contain a code in a way that constrains the mutation rate of the virus
clone of the virus, which will itself enter a propagation significantly. For example, a virus can be programmed to
phase. mutate only slightly over time, or it can be programmed to
refrain from mutating when it infects a file on a computer
Triggering Phase : A dormant virus moves into that already contains copies of the virus. The advantage of
this phase when it is activated, and will now perform the using such slow polymorphic code is that it makes it more
function for which it was intended. The triggering phase difficult for antivirus professionals and investigators to
can be caused by a variety of system events, including a obtain representative samples of the virus, because "bait"
count of the number of times that this copy of the virus has files that are infected in one run will typically contain
made copies of itself. identical or similar samples of the virus. This will make it
more likely that the detection by the virus scanner will be
Execution Phase: This is the actual unreliable, and that some instances of the virus may be
work of the virus, where the "payload" will be released. It able to avoid detection.
can be destructive such as deleting files on disk, crashing
the system, or corrupting files or relatively harmless such Metamorphic Code :
as popping up humorous or political messages on screen.
To avoid being detected by emulation,
OTHER TYPES OF VIRUSES: some viruses rewrite themselves completely each time
they are to infect new executables. Viruses that utilize this
Encrypted Virus: technique are said to be in metamorphic code. To enable
metamorphism, a "metamorphic engine" is needed. A
One method of evading signature metamorphic virus is usually very large and complex. For
detection is to use simple encryption to encipher (encode) example, W32/Simile consisted of over 14,000 lines of
the body of the virus, leaving only the encryption module assembly language code, 90% of which is part of the
and a static cryptographic key in cleartext which does not metamorphic engine.
change from one infection to the next. In this case, the
virus consists of a small decrypting module and an
Malware Case:
encrypted copy of the virus code. If the virus is encrypted
with a different key for each infected file, the only part of Tribune Publishing said Saturday night that malware
the virus that remains constant is the decrypting module, affected its ability to print newspapers across its chain of
which would (for example) be appended to the end. In this outlets, including the Chicago Tribune, the New York
case, a virus scanner cannot directly detect the virus using Daily News, the Baltimore Sun and the Orlando Sentinel.
signatures, but it can still detect the decrypting module,
which still makes indirect detection of the virus possible. Many subscribers to the Los Angeles Times and San
Since these would be symmetric keys, stored on the Diego Union-Tribune, which were previously owned by
infected host, it is entirely possible to decrypt the final Tribune Publishing and still share some production
virus, but this is probably not required, since self- technology with the company, stepped into a chilly sunny
modifying code is such a rarity that it may be reason for morning Saturday only to find empty doorsteps.
virus scanners to at least "flag" the file as
suspicious.[citation needed] An old but compact way will The computer malware was detected Friday and "impacted
be the use of arithmetic operation like addition or some back-office systems which are primarily used to
subtraction and the use of logical conditions such as publish and produce newspapers across our properties,"
XORing, where each byte in a virus is with a constant, so

4|Page
said Marisa Kollias, Tribune communications vice In addition, Windows XP’s autorun feature
president, in a statement. automatically ran applications on media devices
connected to the computer. This allowed Sony to install a
"There is no evidence that customer credit card rootkit on Windows systems by adding it to their audio
information or personally identifiable information has CDs, and savvy criminals began leaving infected USB
been compromised," she said. "The personal data of our drives lying around near companies they wanted to
subscribers, online users, and advertising clients has not compromise. If an employee picked up the USB drive and
been compromised." plugged it into a company computer, it would infect the
computer. And, because most users logged in as
The Los Angeles Times, citing an anonymous source,
Administrator users, the malware would run with
described the malware as part of a cyberattack with
administrative privileges and have complete access to the
foreign origins. The Times and the Union-Tribune were
computer.
sold by Tribune Publishing to Los Angeles biotech
billionaire Patrick Soon-Shiong in June.

Kollias said Tribune Publishing was putting a


"workaround" in place. ANTI-VIRUS SOFTWARE:
WHY ONLY WINDOWS?: In the era of Computer viruses , Some
failed software deleted some suspicious files accidently.
Windows is a big target because it Like the evolution of Virus, anti- virus is also evolved.
powers the vast majority of the world’s desktop computers Years between 1945-1980s, are said to be Pre-Antivirus
and laptops. If you’re writing malware and you want to Days. Now a days, there is no Windows device without
infect average computers users – perhaps you want to rendered Anti-Virus Software containing Activation
install a key logger on their systems and steal their credit duration. Anti-Virus is like a Windows Firewall System in
card numbers and other financial data – you would target which firewall operates online whereas Anti-virus does
Windows because that’s where the most users are. offline.

Sad Security System in Windows: HISTORY:


Historically, Windows was not The Creeper virus was eventually
designed for security. While Linux and Apple’s Mac OS deleted by a program created by Ray Tomlinson and
X (based on Unix) were built from the ground-up to be known as "The Reaper". Some people consider "The
multi-user operating systems that allowed users to log in Reaper" the first antivirus software ever written – it may
with limited user accounts, the original versions of be the case, but it is important to note that the Reaper was
Windows never were. actually a virus itself specifically designed to remove the
Creeper virus. In 1987, Andreas Luning and Kai
DOS was a single-user operating
Figge, who founded G Data Software in 1985, released
system, and the initial versions of Windows were built on
their first antivirus product for the Atari ST platform. In
top of DOS. Windows 3.1, 95, 98, and Me may have 1987, the Ultimate Virus Killer (UVK) was also released.
looked like advanced operating systems at the time, but This was the de facto industry standard virus killer for the
they were actually running on top of the single-user DOS.
Atari ST and Atari Falcon, the last version of which
DOS didn’t have proper user accounts, file permissions, or
(version 9.0) was released in April 2004.[citation needed]
other security restrictions.
In 1987, in the United States, John McAfee founded the
Windows NT – the core of Windows McAfee company (was part of Intel Security) and, at the
2000, XP, Vista, 7, and now 8 – is a modern, multi-user end of that year, he released the first version of Virus Scan.
operating system that supports all the essential security Also in 1987 (in Czechoslovakia), Peter Paško, Rudolf
settings, including the ability to restrict user account Hrubý, and Miroslav Trnka created the first version of
permissions. However, Microsoft never really designed NOD antivirus. Finally, at the end of 1987, the first two
consumer versions of Windows for security until heuristic antivirus utilities were released: Flushot Plus by
Windows XP SP2. Windows XP supported multiple user Ross Greenberg and Anti4us by Erwin Lanting. In his
accounts with limited privileges, but most people just O'Reilly book, Malicious Mobile Code: Virus Protection
logged into their Windows XP systems as the for Windows, Roger Grimes described Flushot Plus as
Administrator user. Much software wouldn’t work if you "the first holistic program to fight malicious mobile code
did use a limited user account, anyway. Windows XP (MMC)." In 1988, the growth of antivirus companies
shipped without a firewall enabled and network services continued. In Germany, Tjark Auerbach founded Avira
were exposed directly to the Internet, which made it an (H+BEDV at the time) and released the first version of
easy target for worms. At one point, the SANS Internet AntiVir (named "Luke Filewalker" at the time). In
Storm Center estimated an unpatched Windows XP Bulgaria, Dr. Vesselin Bontchev released his first
system would be infected within four minutes of freeware antivirus program (he later joined FRISK
connecting it directly to the Internet, due to worms like Software). Also Frans Veldman released the first version
Blaster. of ThunderByte Antivirus, also known as TBAV (he sold
his company to Norman Safeground in 1998). In

5|Page
Czechoslovakia, Pavel Baudis and Eduard Kucera started This is essentially the first method
avast! (at the time ALWIL Software) and released their conventional antivirus software utilize to identify
first version of avast! antivirus. In June 1988, in South virus.The programs look for signatures to detect new
Korea, Dr. Ahn Cheol-Soo released its first antivirus malware. The antivirus companies analyze and extract an
software, called V1 (he founded AhnLab later in 1995). exact signature of the file and keep them in a database to
Finally, in the Autumn 1988, in United Kingdom, Alan which threats are compared and devices are then protected
Solomon founded S&S International and created his Dr. in case the signatures match.
Solomon's Anti-Virus Toolkit (although he launched it
commercially only in 1991 – in 1998 Dr. Solomon’s Behavior based Detection:
company was acquired by McAfee). In November 1988 a
professor at the Panamerican University in Mexico City Behavior detection is a signatureless
named Alejandro E. Carriles copyrighted the first approach to detection that helps the program build a full
antivirus software in Mexico under the name "Byte context around every process execution path in real time,
Matabichos" (Byte Bugkiller) to help solve the rampant and identify the stealthier, more advanced malware
virus infestation among students. threats.Suspicious behavior includes unpacking of
malicious code, modifying the host files, or observing key
strokes. Noticing actions like these allows an antivirus
program to detect previously unseen malware on a system.
Algorithms used in Anti-Virus Software:
Sandbox Detection:
Since Virus is getting updated This is a behavioral based detection
because of updated Software, Anti-Virus is also getting technique that executes the programs in a virtual situation,
updated. There are Several Types of mechanisms in Virus as opposed to detecting its fingerprint at run time.
detection, namely Antivirus software that come with this type of detection
capabilities execute programs in a separate, virtual
 Heuristic Based Detection environment, and log the actions it performs to determine
 Signature detection whether the programs are malicious or not. If found safe,
 Virus Definitions a given program is then executed in the real environment.
 Behaviour based Detection As you can imagine, this technique is both heavy and slow,
 Sand Box Detection and its resource intensive nature means that it is rarely
 Data Mining used in consumer antivirus solutions. End users may not
always have the need for sandbox detection, but
Heuristic Based Detection: enterprises do, and antivirus solutions designed for
corporate and network use offer this.
This is the most common form of
detection that uses an algorithm to compare the signature Data Mining:
of known viruses against a potential threat. An antivirus This is one of the latest approaches in
packed with this type of detection can also detect viruses malware detection that security vendors now provide with
that have not yet been discovered and released as a new their antivirus and antimalware products.
virus but it can also generate false positive matches which
means an antivirus scanner may report an uninfected file A series of features of files are extracted from files, and
as an infected one. then data mining and machine learning algorithms are
used to classify the behavior of a file and detect whether it
Signature Based Detection: has malicious intent or not. This is particularly helpful in
detecting and defeating the newest forms of malware in
Signature detection is a method by the wild.
which antivirus keenly scans files that are brought into a
system to analyze more likely hazardous files.In essence,
antivirus applications come with a directory of already
VIRUS SCANNING MECHANISMS:
Though the searching algorithms are
checked-viruses and match the codes and patterns in files good as well as efficient, they also need scanning
and web pages to unique bits and patterns that make up the mechanism with less time complexity. There are three
code of a virus. If they match, the file is quarantined, main types of scanning, namely
means that it is moved to a new and safe location so that it  On- Demand Scanning
does not infect any other files on the system.Antivirus  Real-Time Protection
programs also checks for any malicious behaviour on a  Start-up Scan and
system such as suspicious registry entries or executing an  Smart Scan
unknown program automatically upon system start up thus
protecting our computer against encrypted viruses or On-Demand:
viruses that are still unidentified. A conventional scan is either run when the user requests
it, or at a scheduled instance that the antivirus sets up. This
Virus Definitions: type of scan searches the contents of the disks, directories
and files, as well as boot sectors and system components.

6|Page
Conventional disk scans are used either as a preventive From this detailed paper, the reader can have the
maintenance activity, or when a virus is suspected. consciousness. It is a well-known fact that “If there are
any good things in this world of a type exist, there must
Real Time Protection: This type of scanning refers also be the bad things in the same type”. “Virus is also
to the automatic protection that almost all modern Evolving itself since it has no life”. It is notable that virus
antivirus programs offer. It basically monitors the system like Malware is also used for the purpose of Hacking and
for any suspicious activity in real time, while data is stealing others’ personal data which could be misused. In
loaded into the active memory. For example, when a USB this era, all details including aadhar, PAN, Voter details
drive is inserted, a browser is opened, or a downloaded file are linked in our mobile phone. A virus called “Universal
is executed. The price of this type of scanning is Cross-Site Scripting(UXSS)” is threatening all Android
performance, but it offers increased protection, and more users. In India, Android mobile is dominating other
chances of catching malware before it does damage. devices. In this situation, this malware is used by hackers
for hacking mobile phone and data. Anti-virus in mobile
Start-Up: Antivirus software often come with a phone should be mandatory in this stage. Antivirus gives
special program that is designed to run every time the PC cent percent protection anytime and anywhere.!
is booted up. It does a quick scan of the boot sectors and
critical system files, instead of a full disk scan that takes a
long time to finish. This comes in particularly handy to
catch boot sector viruses, before they get a chance to REFERENCE:
spread.
Smart Scan: These refer to an approach where https://www.geeksforgeeks.org/how-an-
an antivirus only scans selected files, that are more antivirus-works
suspicious to be altered or infected. Smart scanning lowers
the need of system resources, while protecting against the
more common types of viruses, threats and risks. https://www.engineersgarage.com/mygara
Applications: Anti-Virus are mostly used by ge/how-antivirus-works
all Individuals who have Personal Computers which is
either default or rendered.Actually anti-virus is an
accidental invention which deletes Suspicious and
https://www.malwarefox.com/how-
malicious files, folders or any system applications antivirus-works
KNOWN ANTIVIRUS:
https://www.dnaindia.com/technology
 Avast!
 Windows Defender
https://www.nbcnews.com/news/us-
 Kaspersky
news/computer-virus-hits-southern-
 BitDefender
california-newspapers-n953001
 Norton
 McAfee
 SOPHOS https://en.wikipedia.org/wiki/Antivirus_so
 Avira ftware
 WebRoot
 Eset
https://en.wikipedia.org/wiki/Virus
 AVG

Online Anti-Virus:
Some antivirus vendors maintain websites with
free online scanning capability of the entire computer,
critical areas only, local disks, folders or files. Periodic
online scanning is a good idea for those that run antivirus
applications on their computers because those applications
are frequently slow to catch threats. One of the first things
that malicious software does in an attack is disable any
existing antivirus software and sometimes the only way to
know of an attack is by turning to an online resource that
is not installed on the infected computer. Total Anti-
Virus and PC Protect are the two best free anti-virus
softwares available either online or offline.

Conclusion:

7|Page

Você também pode gostar