A computer virus is a special computer program that tries to replicate itself by modifying other computer programs and try to infect as much as it can. Computer viruses are unintended programs that generally run without user acceptance by hiding themselves.
计算机病毒是一种特殊的计算机程序,它试图通过修改其他计算机程序来复制自身,并尝试尽可能多地感染。 计算机病毒是意想不到的程序,通常会通过隐藏自身而在未经用户接受的情况下运行。
Computer viruses are created by hackers or Black Hat Hackers in order to gain admin control or use the target system resources in different ways to get gain. Viruses can be infected in different ways like social engineering, USB drives, downloading and running unknown apps from the internet, etc.
计算机病毒是由黑客或黑帽黑客创建的,目的是获得管理员控制权或以不同方式使用目标系统资源来获得收益。 病毒可以通过各种方式感染,例如社会工程学,USB驱动器,从互联网下载和运行未知应用程序等。
Computer viruses are created by the black hat hacker as a special program that is very different from regular programs or applications. But even they are specially created they try to imitate a regular application that can not be detected by the users and virus protection programs called antiviruses.
黑帽黑客将计算机病毒创建为特殊程序,与常规程序或应用程序完全不同。 但是,即使它们是特别创建的,它们也试图模仿用户无法检测到的常规应用程序以及称为防病毒程序的病毒保护程序。
A computer virus operates in two different styles. The first type of computer virus will try to replicate itself after infecting the target system. The second type of computer virus is more stealth where after infection it does not take action. It generally waits for some time or action to start.
计算机病毒以两种不同的方式运行。 第一种计算机病毒在感染目标系统后将尝试自我复制。 第二种计算机病毒是隐形的,在感染后它不起作用。 它通常等待一段时间或开始执行操作。
Even computer viruses created in the 1940s are not like today computer viruses. The first modern computer virus is named as Creeper and created on ARPANET in the early 1970s. It was a simple program that is self-replicated on TENEX operating system. Creeper virus also provided the message “I’m creeper, catch me if you can! “. The creeper virus is deleted with the Reeper
program which is also called first old-style antivirus.
即使是1940年代制造的计算机病毒也不像今天的计算机病毒。 第一个现代计算机病毒被称为Creeper,并于1970年代初在ARPANET上创建。 这是一个简单的程序,可以在TENEX操作系统上进行自我复制。 爬行者病毒还提供了以下信息:“我是爬行者,请赶快抓住我! ”。 爬虫病毒通过Reeper
程序删除,该程序也称为第一种老式防病毒软件。
The second popular computer virus is named as Elk Cloner
which is written in 1981 by Richard Skrenta
. This computer virus was infecting PC’s which has Apple DOS 3.3 operating systems and spread via floppy disk.
第二种流行的计算机病毒称为Elk Cloner
,该病毒由Richard Skrenta
于1981年编写。 该计算机病毒正在感染具有Apple DOS 3.3操作系统并通过软盘传播的PC。
The term Computer Virus
is first officially used by Fred Cohen
in 1984 in an academic paper named Computer Viruses - Theory and Experiments
.
“ Computer Virus
”一词于1984年由Fred Cohen
在名为“ Computer Viruses - Theory and Experiments
的学术论文中首次正式使用。
There are different types of computer viruses with different methods, actions, behaviors, etc. These are used to categorized computer viruses into different types.
有不同类型的计算机病毒,它们具有不同的方法,操作,行为等。这些病毒可用于将计算机病毒分类为不同类型。
Boot Sector Virus
mainly resides in the master boot record MBR of the computer system or operating system. This means they are loaded during OS start and this makes them very hard to detect and remove. They are generally spread through removable media, CDROM, USB Drive, Floppy Disk.
Boot Sector Virus
主要驻留在计算机系统或操作系统的主引导记录MBR中。 这意味着它们是在操作系统启动期间加载的,这使得它们很难检测和删除。 它们通常通过可移动媒体,CDROM,USB驱动器,软盘传播。
Direct Action Virus
is a computer virus type which is called a non-resident virus because it mainly runs on computer memory. This type of viruses generally store itself to the specific file types and starts itself after a computer reboot.
Direct Action Virus
是一种计算机病毒类型,称为非居民病毒,因为它主要运行在计算机内存上。 这种类型的病毒通常会将其自身存储为特定的文件类型,并在计算机重新启动后自行启动。
Resident Virus
is the opposite of the Direct Action Virus where it stores and hides into different paths. They are hard to find and remove.
Resident Virus
与直接操作病毒相反,后者直接存储并隐藏在不同路径中。 他们很难找到和删除。
Multipart Virus
is a virus that behaves in different ways like Boot Sector Virus, Direct Access Virus or Resident Virus.
Multipart Virus
是一种行为不同的病毒,例如引导扇区病毒,直接访问病毒或常驻病毒。
Polymorphic Virus
is like a biological virus that can change its structure and behavior. This type of computer virus is very different to detect and remove because of its multiple type views.
Polymorphic Virus
就像一种生物病毒,可以改变其结构和行为。 由于具有多种类型的视图,因此这种类型的计算机病毒在检测和清除方面有很大的不同。
Overwrite Virus
is a simple virus where it simply deletes or overwrites to the existing files. The destruction of this virus is very high because it will delete all data, files, and folders instantly without providing time to take against the action.
Overwrite Virus
是一种简单的病毒,它仅删除或覆盖现有文件。 该病毒的销毁率很高,因为它将立即删除所有数据,文件和文件夹,而没有时间采取相应措施。
Spacefiller Virus
is also called as Cavity Virus
where it will fill up empty disk spaces. This type of computer virus does not cause any damage to the system.
Spacefiller Virus
也称为Cavity Virus
,它将填充空磁盘空间。 这种类型的计算机病毒不会对系统造成任何损坏。
Macro Virus
is created with some scripting language to run on the target operating system. Macro Virus can also run on different applications like Word, Presentation and Excel tools.
Macro Virus
是使用某种脚本语言创建的,可以在目标操作系统上运行。 Macro Virus也可以在Word,Presentation和Excel工具等不同应用程序上运行。
Computer viruses can infect in different ways to other computers. Spreading way is also deciding the virus type and behavior.
计算机病毒可以通过其他方式感染其他计算机。 传播方式还决定了病毒的类型和行为。
Floppy Disk
is the oldest way to spread and infect other computers. By today as the floppy disk is not used anymore this way is absolute.
Floppy Disk
是传播和感染其他计算机的最古老的方法。 直到今天,由于不再使用软盘,这种方式才是绝对的。
Internet or Web Site
is the most popular way to spread a virus via a specially crafted and social engineering web page.
Internet or Web Site
是通过特制的社交工程网页传播病毒的最流行方法。
USB Drive
is another popular computer virus infection way that was popular in the 2000s and early 2010s.
USB Drive
是另一种流行的计算机病毒感染方式,在2000年代和2010年代初期很流行。
There is a lot of ways to protect computers from different types of viruses. Below we will list some of the most efficient and useful ways to prevent virus infection.
有很多方法可以保护计算机免受不同类型的病毒的侵害。 下面我们将列出一些预防病毒感染的最有效和有用的方法。
After detecting a computer virus we need to remove the computer virus without effecting or with less damage to the system. The most popular way is removing a computer virus is by using antivirus software. Antivirus software is capable of detecting and removing the antiviruses easily. But in some rare situations, the detection and removal can be tricky because of the computer virus complexity. In this case, formatting the system completely can be a more efficient way and restoring from the backups.
检测到计算机病毒后,我们需要在不影响系统或对系统造成较小损害的情况下删除计算机病毒。 最受欢迎的方法是使用防病毒软件删除计算机病毒。 防病毒软件能够轻松检测和删除防病毒软件。 但是在某些罕见的情况下,由于计算机病毒的复杂性,检测和清除可能很棘手。 在这种情况下,完全格式化系统可能是一种更有效的方法,并且可以从备份中还原。
With the advancement of the computer-related cyber attacks, the new attack types and threads are created and named. The virus is a very old thread where trojan and malware terms are a lot of newer terms used in cybersecurity. In this part, we will compare them for different aspects and show similarities and differences.
随着与计算机有关的网络攻击的发展,创建并命名了新的攻击类型和线程。 该病毒是一个非常古老的线程,其中木马和恶意软件术语是网络安全中使用的许多较新术语。 在这一部分中,我们将比较它们的不同方面,并显示出相似之处和不同之处。
Virus
is actually a type of the malware where Malware the term is a generic term used to define different type of threads like Spyware
, Worms
, Trojans
. So viruses and trojans are some types of malware.
Virus
实际上是一种恶意软件,其中“恶意软件”一词是一个通用术语,用于定义不同类型的线程,如Spyware
, Worms
, Trojans
。 因此,病毒和木马是某些类型的恶意软件。
Trojan
is similar to the viruses where it is more stealth and mainly created to steal personal and financial information without harm. Their main aim is being run without unnoticed for a long time by getting valuable information from the targets to the attackers. So a trojan will not show detectable signs or harm the target system which will make it visible.
Trojan
类似于病毒,它们更具有隐身性,主要是为了窃取个人和财务信息而不会造成伤害。 他们的主要目的是通过从目标到攻击者获取有价值的信息来长时间运行,而不会引起人们的注意。 因此,特洛伊木马程序不会显示可检测到的迹象或损害目标系统,从而使其可见。
翻译自: https://www.poftut.com/what-is-a-computer-virus/