Error opening template: advertisement/zones/468x60_generic.tplError opening template: advertisement/zones/728x90_leaderboard.tplError opening template: advertisement/zones/728x90_bottom_ad.tplError opening template: advertisement/zones/300x250_right_ros_up.tplError opening template: advertisement/zones/300x250_right_ros_down.tplError opening template: advertisement/zones/160x600_left_nav.tplError opening template: advertisement/zones/160x600_right_nav.tpl Direct Action Virus

Understanding the Direct Action Virus

Any user who has ever been infected can tell you that computer viruses are very real.  These programs are typically distributed from host to host via email or a website that has been compromised.  Some are even attached to legitimate files and unknowingly executed by a user when they launch a particular program.   A virus is much more than the commonly perceived malicious code that functions with the intent to destroy.  They are classified by type, origin, location, files infected and degree of damage.  These common attributes are relative to most and all can have an adverse effect on your operating system.

While there are many different types of viruses, many of them are generally classified as file infectors.  This type of virus is known for attaching itself to specific files in an operating system.  It usually infects files with EXE. (execution) or COM. (command) extensions, though some may corrupt extensions used for interpretation such as SYS, OBJ, SYS, PRG and BAT files.  More sophisticated variants are able to infect source code files by inserting a malicious code into a system's C language file, replicating the infected function in any execution produced from the corrupt source files. 

Direct Action 

A file infector can be either a resident virus or direct action virus.  A resident virus will install itself and hide somewhere in the memory of your computer.  Upon execution, it seeks out other files or programs to infect.  The direct action virus is considered to be "non-resident" and functions by selecting one or more files to infect each time the code is executed.             

The primary intentions of a direct action virus is replication and to spread infection whenever the code is executed.  When certain conditions have been met, the virus is set into action and begins to infect files in the directory or folder it's located in.  It also infects those in directories attached with the AUTOEXEC.BAT file path.   This extension represents a batch file which is always found in the root directory of your hard drive, responsible for performing certain operations when the computer is booted up.      

One of the earliest detections of a direct action virus was the Rugrat, more commonly known as Win64.Rugrat.  This virus was said to the first infection written in the Intel Itanium instruction set.  This limited the infection to only run on Itanium-based computers as it was only capable of infecting Itanium executable files.  Upon execution, the virus attempted to infect all 64-bit executables in the directory from which it launched and any subdirectories. 

Disinfection

In most cases, a direct action virus will not delete your system files or falter the overall performance of your computer.  It can however, prevent access to particular applications and files.  Because this type of infection has minimal impact on the victim, most viruses these days are of a resident nature and capable of inflicting much more damage. 

The best defense against any type of infection is a virus scanner that will not only detect a threat, but eradicate it as well.  Direct action viruses are easy to spot and the infected files can be fully restored to their original condition. 

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.

With the advent of wireless Internet, more and more computer users are entering the world of cyber space.

Yet, while these users are well aware of the importance of the protection of their computer when hooked up to regular internet providers, they are often oblivious to the fact that the same cyber dangers, and in fact even more, exist in the world of WiFi.

What you may not know is that same Internet connection that makes it possible to check your email from the comfort of your bed also makes it easier for hackers to access your personal information.

It is for this reason, the sharing of the wireless Internet connection, that protecting your computer when wireless is even more important than ever before.