A form of malicious software that can harm computer systems is called a computer virus. They can harm files, steal personal information, and even take over the system because they are built to spread from one computer to another. We’ll talk about the many naming conventions used for computer viruses here.
Although virus naming practices are not standardized, they typically receive a name that describes their activity or the harm they inflict. The names might also be based on where they came from or how they were propagated. Some viruses have names derived from plants or animals, while others have names derived from well-known figures or historical occasions. Those who find them, like as antivirus providers or security researchers, typically choose the names.
1. ILOVEYOU – Initially launched in 2000, this malware spread via email attachments. In addition to stealing passwords and other personal information, it damaged files.
2. Wannacry – Released in 2017, this virus spread by taking advantage of a flaw in Windows operating systems. It overtook the system and demanded a ransom to be paid to let it go. 3. Melissa – This virus, which was first discovered in 1999, spread via email attachments. It slowed down computer systems and corrupted files.
5. Code Red – This malware, which was first discovered in 2001, targeted computers using the Microsoft IIS web server. It damaged websites and brought down servers.
Computer viruses do, in fact, have names. Their naming makes them easier to recognize and monitor for researchers and antivirus vendors. Additionally, it makes it simpler for people to look up information on them and discover defense strategies.
Trojan is a form of malware, not a virus. Its name comes from the Trojan Horse of Greek mythology because it masquerades as trustworthy software while harboring harmful code. Trojans are frequently employed by cybercriminals to gain remote access to a system or to steal personal data.
1. Viruses that propagate through executable files are known as file infectors. When an infected file is launched, the virus multiplies.
3. Macros in other files are infected by viruses called macro viruses, which then propagate when the infected file is opened.
In conclusion, computer viruses are given names based on their characteristics, harm they do, place of origin, or means of transmission. Their naming makes them easier to recognize and monitor for researchers and antivirus vendors. Trojans are a subset of malware; they are not viruses. Computer viruses can be divided into four categories: worms, boot sector viruses, macro viruses, and file infector viruses. Understanding how viruses are named and categorized can help you learn how they operate and how to defend your computer against them.
These are the top ten computer viruses: Resident virus, Direct action virus, overwrite virus, boot sector virus, macro virus, directory virus, polymorphic virus, multipartite virus, web scripting virus are just a few of the viruses that can infect your computer. Fileless Virus No. 10