List involving Computer Viruses A-D
As computer system lovers one of the main stuff we are worried about tend to be viruses. A software virus can be a type of laptop or computer course in which copies per se in addition to infects a computer. A computer virus spreads coming from one computer for you to an additional once the viruses' host is used into the focus on computer; samples of this is how a user sends genital herpes in the Internet, any time it really is shifted implementing easily-removed device like a floppy disk, CD, DVD, or USB drive. The word "virus" is commonly used to summarize for you to other designs of Malware, Adware, and also Spyware plans that will don't have the reproductive flexibility that your "true" trojan has. The chance of dispersing of viruses in order to different personal computers increases as soon as infected files for a system archive system or a report system will be seen through one more computer.
Here is usually a set of typical Viruses from A-D:
A: A plus A, A-403, Abraxas, Acid, Acme, ABC, Actifed, Ada, Agena, AGI-Plan, Ah, AI,AIDS, AIDSII, AirCop, Ajax, Alabama, Alcon, Alien, Ambulance, Amstrad,Ancient, Andre, Andre2, Andromeda, Angelina, Anna, Anna Kournikova, Anninja, ANT, Ant-Cow, Anthrax - Boot, Anthrax, - File, ANTI, AntiCMOS, Anti-D, Anti-Daf, Anti-MIT, Anti-Pascal II, Anti-Pascal, Anti-Tel, Anti-Telefonica, Arab, Aragon, Aragorn, ARCV-n
B: B Ugly, B3, B-52, BA101, Back Time, Bad Boy, Bad Brains, Bad Command, Bad Guy, Bad Sectors 1.2, Bad-389, Bak, Bamestra, Banana, Bandit, Baobab 731, Barcelona, Barrotes 2, Barrotes, Basil, Bat, Beaches, Beast, BeBe, Beeper, Beer, Benoit, Real PvP, Flava, Berlin, Best Wishes, Beta, Beva-32, Beva-33, Beva-96, Beware, BFD, Big 2000, Bit Addict, Black Knight, Black Monday, Blackjack, Blaze, Bljec, Blood Lust, Blood Rage, Blood, Blood-2, Bob, Bomber, Boot Killer, Bouncing Dot, Bow, Boys, Brainy,BrO_AcT, Brotherhood, Brothers, Browser, Bryansk, Bubbles 2, Bubbles, Bubonic, Budo, Burger, Burghofer, Busted, Butterfly, Butthole, Byte Bandit, Byte Warrior(c), Brain
C: Cabanas, Caco-Daemon, CAD Kill, C-A-D, Cannabis, Cansu, Capital, Cara, Caribe,Carioca, CaroEvil, Cartuja, Casc1621, Casc-2, Cascade, Cascade/170x, Casino, Casper,Casteggio, Catman, Catphish, Caz, CB-1530, CD, CDEF, CDFL Mac, CD-10, Century,Cerburus, CFSK, Chad, Chang, Chaos, Chaser, Chcc, Cheeba, Cheesy, Chemist, Chemnitz, Chernobyl, Chile Mediera, Chinese Blood, Chr-869, Chrisj13, Christmas Tree,Christmas Violator, CIH,,Cinderella, Civil Service, Civil War II, Civil War III, Civil War IV, Civil War V, Civil War, CkSum, Clagger, Clint, Clonewar 2, Clonewar, Clust, Coahuila, CODE 1, CODE 252, Code Zero, Coffee Shop, Collor de Mello, Color, Com16850, Com2S, Comdex, Commentator, Commwarrior, Como, Compiler2, Comspec, Conficker, Cop-Mpl, Copyright, Copyr-ug, Coruna, Coruna3, Cossiga No, Grazie, Cossiga, Costeau, CPXK, Cracker Jack, Cracky, Crash, Crasher, Crazy Eddie, Crazy Imp, CrazyI B, CRF, Cross Over, CSL, CV4
D: D1, DKid, Dada, Damage, Danny,Dark Apocalypse, Dark Avenger, Dark End, DataLock, Datos, Davis, D-Day, Death,Deceide 2, Dedicated, Deicide, Demolition, Demon, Den Zuk, Dennis, Deranged, Diablo, Dial, Dima, Disk Killer, Dismember, Dodgy 1024, Dodo 2456, Dodo, Doodle, Dorn, Dose-A, Druid, Dudley, Dutch Tiny, Dutch
As it is possible to see, may be germs will be huge along with differs from a range of obvious and unnoticeable names. Keeping your personal machine safe is critical within this day in addition to age, specially once you own a business. With your IT video tutorials your own unit can certainly be sure that will probably receive a fantastic education and learning upon the right way to prevent and/or work with these kind of viruses. Don't drop all your info as a result of your trojan from a time frame information integrity plus all round protection is usually a continuous matter - take a stand with your situation.
No comments:
Post a Comment