Skip to main content
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Articles
lp_course
lp_lesson
Back
HomeFreeKnow-how for types of Viruses

Know-how for types of Viruses

Last Updated: August 16, 2025
6 min read
65

Adware
Adware is software that presents banner ads or in pop-up windows through a bar that appears on a computer screen. Those advertising spots usually can’t be removed and are consequently always visible. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security.

Backdoors
A backdoor can gain access to a computer by going around the computer access security mechanisms.

A program that is being executed in the background generally enables the attacker almost unlimited rights. User’s personal data can be spied with the backdoor’s help, but are mainly used to install further computer viruses or worms on the relevant system.

Boot viruses
The boot or master boot sector of hard drives is mainly infected by boot sector viruses. They overwrite important information necessary for the system execution. One of the awkward consequences: the computer system cannot be loaded any more…

Bot-Net
A Bot-Net is collection of softwarre bots, which run autonomously. A Bot-Net can comprise a collection of cracked machines running programs (usually referred to as worms, Trojans) under a common command and control infrastructure. Boot-Nets server various purposes, including Denial-of-service attacks, etc., partly without the affected PC user’s knowledge. The main potential of Bot-Nets is that the networks can achieve dimensions on thousands of computers and its bandwidth sum bursts most conventional Internet accesses.

Dialer
A dialer is a computer programm that establishes a connection to the Internet or to another computer network through the telephone line or the digital ISDN network. Fraudsters use dialers to charge users high rates when dialing up to the Internet without their knowledge.

EICAR test file
The EICAR test file is a test pattern that was developed at the European Institute for Computer Antivirus Research for the purpose to test the functions of anti-virus programs. It is a text file which is 68 characters long and its file extension is “.COM” all virus scanners should recognize as virus.

Exploit
An exploit (security gap) is a computer program or script that takes advantage of a bug, glitch or vulnerability leading to privilege escalation or denial of service on a computer system. A form of an exploit for example are attacks from the Internet with the help of manipulated data packages. Programs can be infiltrated in order to obtain higher access.

Grayware
Grayware operates in a way similar to malware, but it is not spread to harm the users directly. It does not affect the system functionality as such. Mostly, information on the patterns of use is collected in order to either sell these data or to place advertisements systematically.

Hoaxes
The users have obtained virus alerts from the Internet for a few years and alerts against viruses in other networks that are supposed to spread via email. These alerts are spread per email with the request that they should be sent to the highest possible number of colleagues and to other users, in order to warn everyone against the “danger”.

Honeypot
A honeypot is a service (program or server), which is installed in a network.

It has the function to monitor a network and to protocol attacks. This service is unknown to the legitime user – because of this reason he is never addressed. If an attacker examines a network for the weak points and uses the services which are offered by a Honeypot, it is protocolled and an alert sets off.

Continue Reading This Article

Sign in with a free account to unlock the full article and access the complete MapYourTech knowledge base.

778+ Technical Articles
47+ Professional Courses
20+ Engineering Tools
47K+ Professionals
100% Free Access
No Credit Card Required
Instant Full Access
Share:

Leave A Reply

You May Also Like

25 min read 17 0 Like Data Center Interconnect: Architectures, Pluggables, Hyperscale Skip to main content MapYourTech | InDepth Series...
  • Free
  • April 27, 2026
20 min read 13 0 Like 0dBm Transceivers: Key Takeaways Skip to main content 0dBm Transceivers: Key Takeaways Why launch...
  • Free
  • April 27, 2026
33 min read 16 0 Like Hyperscaler Optical Network Automation Skip to main content MapYourTech | InDepth Series Hyperscaler Optical...
  • Free
  • April 26, 2026
Stay Ahead of the Curve
Get new articles, courses & exclusive offers first

Follow MapYourTech on LinkedIn for exclusive updates — new technical articles, course launches, member discounts, tool releases, and industry insights straight to your feed.

New Articles
Course Launches
Member Discounts
Tool Releases
Industry Insights
Be the first to know when our mobile app launches.

Course Title

Course description and key highlights

Course Content

Course Details