Every day computer viruses are created to annoy us and to wreak havoc on our computer systems. Here are ten viruses currently cited as being the most common form of being seen the most or in their ability to cause harm. New viruses are created every day. This is not an exhaustive list. The best you can do is be vigilant, keep your antivirus software updated and be aware of current computer virus threats.
Virus: W32/Mytob-GH
 
mass-mailing viruses, worms and IRC backdoor for the Windows platform. Messages sent to this worm is a topic chosen at random from a list of names, such as: Notice of account limitation Email Account Suspension, Security measures, Members Support, Important Notice.

Virus: W32/Mytob-EX

A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH. W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to access and control over the computer via IRC channels. This virus propagates by sending attachments from harvested email addresses.


Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER

This family of worm variations possesses similar characteristics in terms of what they can do. They are mass-mailing worm with backdoor functionality that can be controlled via Internet Relay Chat (IRC) network. In addition, they can spread by email and through various operating system vulnerabilities such as LSASS (MS04-011).

Virus: Zafi-D

A mass-mailing worm and a worm p2p that is copied to the Windows System folder with the filename Norton Update.exe. You can then create a series of files in the Windows system folder with names consisting of 8 random characters and a DLL extension. W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!. exe or winamp 5.7 new!. exe. W32/Zafi-D also display an error message with the wrong title: "Error in compressed file" 04F6Bh CRC "and the text.
 
Virus: W32/Netsky-D
 
mass-mailing worms, IRC backdoor functionality that can be transmitted to computers vulnerable to the LSASS (MS04-011) to exploit.

Virus: W32/Zafi-B


A peer-to-peer (P2P) and email worm that copies itself to the Windows system folder as a randomly named executable file. This worm will test for the presence of an Internet connection, try to connect to http://www.google.com/ or http://www.microsoft.com/. A worm bilingual, with a text box attached Hungarian political message which translates to "We demand that the government accommodates the homeless, tightens the penal code and VOTES FOR THE DEATH PENALTY to reduce the increase in crime. June 2004, Pécs (SNAF Team) "

Virus: Trojan.Lodear

A Trojan horse that attempts to download remote files. It will inject a. Dll in Explorer.exe process causing system instability.

Virus: W32.Beagle.CO@mm

Mass-mailing worm that lowers security settings. E 'possible to eliminate some security-related registry keys and may block access to sites related to security.

Virus: Backdoor.Zagaban

The Trojan horse that allows a computer to use a hidden proxy compromise and that can degrade network performance.

Virus: W32/Netsky-P

A mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.

3 comments:

  1. I have systematic antivirus and after running a scan it found two worm viruses. I wouldn’t quarantine or delete these and I need them removed by my computer. Any ideas on anything I can do to delete them, any free software that can do this? I'd really appreciate it. Thanks.

    ReplyDelete
  2. You charge to aces based on your requirement. You have to apperceive that not one of the a lot of breitling replica big-ticket but about the a lot of acceptable appearance is the best. Alone the closing one accurate can absolutely pop out your personality. Besides, the archetypal you called should aural your budgetary capability. Thirdly, do access from accounted retailers to ensure the excellent. Therefore, you ability be asked to aggregate as decidedly advice about the banker as you can. One of the a lot of able and acceptable way is to analysis the customer satisfaction. You can accredit appear the feedbacks of its dealt customers, both the absolute and abrogating ones. What is more, the reliable retailers commonly appear with accommodating applicant account too as money-back guarantee. As alone as you'll be able to buck these account mentioned above, that you are destined to appear beyond one that can altogether clothing you! Before affairs a Gucci artefact or any added custom fabricated handbags, it is best to absolute exercise caution, aswell to hawkeye eyes. There assuredly are a few methods to louis vuitton replica actuate behindhand of whether or not you are in crisis of affairs an 18-carat Gucci backpack fake. First, the bond of the custom fabricated backpack is instead telling, abnormally abreast to the edges. If your abeyant acquirement is amidst the altered admirable 18-carat Gucci handbags abreast to the market, it will appearance high-quality, acceptable bond through the accomplished physique in the bag. Affected custom fabricated handbags commonly advertise asperous or ailing accomplished stitching. The anatomy of 18-carat Gucci handbags may be aswell important. The akin of superior of apparatus will active you to actually the absoluteness of your abeyant purchase. acquiesce it to replica watches be advised a addiction to attending at the leather, canvas, or added details. Cheap-looking or awkward adroitness is admired accepting a specific adumbration which you are searching at a affected Gucci handbag. amidst the about absolute methods to ensure you are affairs 18-carat Gucci handbags can be to abundance or browse accepted analysis food and internet sites.If you accept bamboozled into affairs a replica of the Gucci backpack you will not be award any of this. Instead, you can possibly be affairs a beating abroad that does not accept about as altered benefits. it is best to apperceive as essentially if you can apropos simple methods to break abroad from affairs a replica of the Gucci backpack as against to an original.

    ReplyDelete

Powered by Blogger.