Dec 062012
 

C (Brain) Virus:


C (Brain) virus was created by Pakistani brothers Amjad and Basit Alvi in the year 1985 A.D. at Lahore. Originally, it was created and designed to prevent unauthorized use of software sold by ‘Alvis’ Brain computer shop at Lahore, Pakistan. It was put into programs like Lotus 123 and WordStar and sold at heavy discounts to foreign tourists. Once the host used the infected disk, it became the carrier of the virus and copied itself quickly to

uninfected computers and diskettes. The virus, hiding in the boot sector replicated quickly and within months it spread throughout the world of personal computers. Later, various strains of this computer virus appeared which were fatal and malicious.

The Stone: The Stone affects the boot sector computers. It affects the Master Boot Record containing partition table, in hard disks. This virus is written in two sections – the resident portion and the installation portion.

The Vienna-648 Virus: The Vienna-648 virus is probably the simplest file infector virus ever created. It is not very efficient and can be written in far less number of instructions. It infects COM files, increasing their size by 648 bytes by appending its code at the end of the file. It doesn’t infect files having size less than 10 bytes. It is also known as the 1-in-8 virus, since on every eighth infection, it creates an instruction for rebooting the computer. Due to this, the file becomes unexecutable and the computer reboots. In case this happens with COMMAND.COM, the computer never boots because every time COMMAND.COM gets recalled and tries to reboot the computer.

The 8290 (Print Screen) Virus: This virus is a boot sector infector. This virus checks for the word, ‘8290 hex’ at a certain place in the boot record. If the word is not present, it won’t be able to affect the computer and its data and instruction. Due to this reason, it is called the 8290 virus. It moves the original boot record to the 11th sector on the floppies and 114th sector on 20 MB hard disks and then transfers its own programs as the boot record.

The Joshi Virus: The Joshi virus is one of the intelligent types of viruses which use stealth techniques in order to baffle affected hackers. This virus affects the Master Boot Record which contains the partition table in hard disks. On 5th January of every year, the virus gets activated. Due to its activation, the whole computer system gets hanged and a message is displayed as “type Happy Birthday Joshi”. The computer can be saved from hanging and it can be used again if the use types the message “Happy Birthday Joshi” in his hanged computer.

The Bloody Virus: The Bloody Virus is also taken as the reincarnation of the Stone virus. This virus affects the Master Boot Record of hard disks which contains the partition table. It was modeled after the Stone virus.

The Ping-Pong Virus: The Ping-Pong virus affects the boot sector of hard disks. The virus gets activated in every 30 minutes and displays a bouncing dot on the monitor of the computer. The dot passes through any text that is displayed on the screen. This virus has no other major effect rather than the creation of 1 KB bad sector where it places the original boot sector.

The Dark Avenger: The Dark Avenger is one of the most dangerous and infectious viruses. Once it infects a disk, it becomes too much difficult to remove it from the disk. It affects the EXE and COM files by attaching itself to the end of the file and puts a JMP instruction at the start of the file. It is a memory resident virus and becomes a resident when an infected file is run. The message “Program too big to fit in memory” is displayed on the screen and the computer gets hanged. The size of the infected files are increased in size by 1800 bytes.