malicious code. The user is announced that a file has been corrupted, that this and that driver is
missing or that she or he does not have the actual version of programs used and so on. In the
meantime the dangerous program is being installed. The user thinks that some other software
has initiated a defect that cannot be easily influenced and discards it.
Viruses with a special exhibition
Some malicious codes exhibit in a special way that shows evidence of their authors' sense of
humor. For example, there are programs that force the system clock to go counterclockwise.
Funny? Not so much when thinking of the problem to decide which data backup is the older and
which is the newer.
According to the way of spread:
Computer viruses
Trojan horses
Backdoors
Net worms
We can say that they are computer viruses that use services of any network (both local and
global) for their spread. But it is not as simple as that. While a computer virus needs host
applications for its spread (with the exception of so called accompanying viruses, which adopt
the name of exe files, but they have the com extension and presume on the fact that this
extension is preferred by operating systems), a worm is generally malicious by itself.
According to exhibition time:
Viruses activated immediately
The times when rules like "do not start your computer that particular day" were held are gone.
The most contemporary malicious codes are being activated right after entering the computer.
This is because contemporary antivirus methods are able to react to the virus occurrence in a
few hours. Just these few hours are the only time when the code can do what it wants. After
this period, the antivirus protection begins to win.
Viruses activated on a certain date
"Attention, do not start your computer tomorrow! Danger of losing all your data, a malicious
virus is going to strike!" We used to meet such or similar prognoses quite regularly in the
beginning of the nineties. The antivirus protection was still in swaddling clothes (if ever) and it
took months to react to a virus occurrence - on the other hand it took many months before the
virus could spread all over the world in the time before the presence of e-mail and the Internet.
If the programmer wanted to start a real global epidemic, it was enough to set a suitable date.
Not too early in order to enable the virus spread, and not too far to let the antivirus companies
eradicate it.
Viruses activated on a certain act
Special kind of viruses are those that are activated on some interesting act - for example on
every eighth reboot or on every pressing a certain key (or a key combination). Especially some
macroviruses, which used to add their comments to the politicians' names written by the user,
were extremely interesting...
According to the seriousness:
Nondestructive viruses
Most of contemporary viruses belong to this category. The main reasons are two. Firstly,
classical computer viruses (using a host file for their spread) are almost moribund; present
codes create their own files. Secondly, programmers do their best to hide their work, because
not hiding it would mean a cleanup by the attacked user. Data destruction in the whole
computer means a retreat from the seized control.
Destructive viruses
This category should be split into two subcategories: purposely destructive viruses and
inadvertently destructive viruses. For purposely destructive viruses it is their job specification to
destroy: they delete files, damage data etc. Viruses destructive inadvertently do harm as a side
effect: due to an error in the program code or due to some other defect. But from the user's
view, the result is the same in both cases: the loss of data.
Manual
View the manual for the TrustPort Internet Security 2015 here, for free. This manual comes under the category photo/video software and has been rated by 1 people with an average of a 7.4. This manual is available in the following languages: English. Do you have a question about the TrustPort Internet Security 2015 or do you need help? Ask your question here
Can't find the answer to your question in the manual? You may find the answer to your question in the FAQs about the TrustPort Internet Security 2015 below.
Is the manual of the TrustPort Internet Security 2015 available in English?
Yes, the manual of the TrustPort Internet Security 2015 is available in English .
Need help?
Do you have a question about the TrustPort and is the answer not in the manual?
Question and answer
Number of questions: 0