This is the section that will help you out by strongly teaching you on how to avoid viruses there is some links with the lists of virus names (see bottom).
A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user.
The term "virus" is also commonly but erroneously used to refer to other types of malware, adware and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another when its host (some form of executable code) is taken to the target computer, for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, or USB drive.
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs.
If a user tries to start an infected program, the virus' code may be executed first. Viruses can be divided into two types, on the basis of their behavior when they are executed. Nonresident viruses immediately search for other hosts that can be infected, infect these targets, and finally transfer control to the application program they infected.
Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.
In order to avoid detection by users, some viruses employ different kinds of deception. Some old viruses, especially on the MS-DOS platform, make sure that the "last modified" date of a host file stays the same when the file is infected by the virus. This approach does not fool anti-virus software, however, especially those which maintain and date Cyclic redundancy checks on file changes.
Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example the CIH virus, or Chernobyl Virus, infects Portable Executable files. Because those files have many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file.
Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them.
As computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced. Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access.
A virus needs to infect hosts in order to spread further. In some cases, it might be a bad idea to infect a host program. For example, many anti-virus programs perform an integrity check of their own code. Infecting such programs will therefore increase the likelihood that the virus is detected. For this reason, some viruses are programmed not to infect programs that are known to be part of anti-virus software. Another type of host that viruses sometimes avoid is bait files. Bait files (or goat files) are files that are specially created by anti-virus software, or by anti-virus professionals themselves, to be infected by a virus. These files can be created for various reasons, all of which are related to the detection of the virus:
Anti-virus professionals can use bait files to take a sample of a virus (i.e. a copy of a program file that is infected by the virus). It is more practical to store and exchange a small, infected bait file, than to exchange a large application program that has been infected by the virus.
Anti-virus professionals can use bait files to study the behavior of a virus and evaluate detection methods. This is especially useful when the virus is polymorphic. In this case, the virus can be made to infect a large number of bait files. The infected files can be used to test whether a virus scanner detects all versions of the virus.
Some anti-virus software employs bait files that are accessed regularly. When these files are modified, the anti-virus software warns the user that a virus is probably active on the system. Since bait files are used to detect the virus, or to make detection possible, a virus can benefit from not infecting them. Viruses typically do this by avoiding suspicious programs, such as small program files or programs that contain certain patterns of 'garbage instructions'.
A related strategy to make baiting difficult is sparse infection. Sometimes, sparse infectors do not infect a host file that would be a suitable candidate for infection in other circumstances. For example, a virus can decide on a random basis whether to infect a file or not, or a virus can only infect host files on particular days of the week.
Some viruses try to trick anti-virus software by intercepting its requests to the operating system. A virus can hide itself by intercepting the anti-virus software’s request to read the file and passing the request to the virus, instead of the OS.
The virus can then return an uninfected version of the file to the anti-virus software, so that it seems that the file is "clean". Modern anti-virus software employs various techniques to counter stealth mechanisms of viruses. The only completely reliable method to avoid stealth is to boot from a medium that is known to be clean.
One possibility on Windows Me, Windows XP and Windows Vista is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files or also exists in previous restore points . Some viruses, however, disable system restore and other important tools such as Task Manager and Command Prompt. An example of a virus that does this is CiaDoor.
Administrators have the option to disable such tools from limited users for various reasons. The virus modifies the registry to do the same, except, when the Administrator is controlling the computer, it blocks all users from accessing the tools. When an infected tool activates it gives the message "Task Manager has been disabled by your administrator.", even if the user trying to open the program is the administrator.
Users running a Microsoft operating system can access Microsoft's website to run a free scan, provided they have their 20-digit registration number.
I am going to show some virus code to look out for they are real codes but unless you know how to use them they are no good to you and no worries noobs they cannot infect you computer the way that i show them to you. I will also give you some tips on how to recognize virus files and links.
Computer viruses have impacted a significant number of computers worldwide over the past few years. There are over 10,000 known computer viruses. Over 200 new viruses are being discovered every month. A computer virus is a (hidden) program, which invades your computer. A computer virus contains code that has the potential to cause damage and/or perform unwanted/unauthorized functions.
Example 1: of a virus code a simple one
Ok that is a very simple Trojan virus script there are more stronger and more complex than that. What that script does it it slowly eats away at your C:\ - C driver your C drive holds most of your important files for instance Program files - Windows - Documents & Settings there are many many more but i will never finish if i listed them all lol. I will give you one more example this one is going to be more complex.
This one is a little more complex but still not cool to have on your computer i tested it out and what it does
This next part is about how to recognize Virus Files & Virus Links. Ok i will not lie to you i am not 100% accurate on this part and it is impossible to be 100% correct. Viruses can be sent in files if they are very small chances are they are virus files but you cant always be sure people will jam other crap in the file to make it bigger where they will try and trick you into opening the infected file thus infecting your computer.
Now virus links these are very tricky to identify virus links can be found almost everywheres on the internet these links are very dangerous for the simple fact that when you enter the page your computer immediately gets infected and that sucks because they can have a very strong virus for instance a TROJAN DOWNLOADER or a BACKDOOR VIRUS on the link you went to.
Another way for you to get infected is by going on a site that be prone to getting hacked you will enter the page and you will get redirected to a virus linked page and there you have it another virus on your computer.
Most of the time once a site has been found with a virus active on it the F.B.I. will shutdown the site and call it a reported attack site and will not let you go on the site.
Well i think I have gave you some knowledge on understanding how they spread and what the codes look like. I hope this section helped you understand a bit more about viruses.