Difference between revisions of "Viruses"
Jump to navigation
Jump to search
(Created page with "A virus is a piece of malicious code that replicates by attaching itself to another piece of executable code. When the other executable code is run, the virus also executes an...") |
|||
Line 1: | Line 1: | ||
A virus is a piece of malicious code that replicates by attaching itself to another piece of executable code. | A virus is a piece of malicious code that replicates by attaching itself to another piece of executable code. | ||
When the other executable code is run, the virus also executes and has the opportunity to infect other files and perform any other nefarious actions it was designed to do. | When the other executable code is run, the virus also executes and has the opportunity to infect other files and perform any other nefarious actions it was designed to do. | ||
+ | |||
+ | ===Armored virus=== | ||
+ | An '''Armored virus''' is a computer virus that contains a variety of mechanisms specifically coded to make its detection and decryption very difficult. | ||
==See also== | ==See also== | ||
*{{Security}} | *{{Security}} |
Revision as of 12:19, 13 April 2020
A virus is a piece of malicious code that replicates by attaching itself to another piece of executable code. When the other executable code is run, the virus also executes and has the opportunity to infect other files and perform any other nefarious actions it was designed to do.
Armored virus
An Armored virus is a computer virus that contains a variety of mechanisms specifically coded to make its detection and decryption very difficult.
See also
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: