and Bagle seemed to enter a war to determine who could capture the most email addresses <td

for example)

• Modify system file • Modify ordinary executable program

Conceal self • Intercept system calls that would reveal self and falsify result

• Classify self as “hidden” file Spread infection • Infect boot sector

• Infect systems program • Infect ordinary program • Infect data ordinary program reads to

control its execution Prevent deactivation • Activate before deactivating program and

block deactivation • Store copy to reinfect after deactivation

· Virus Effect

How It Is Caused

Attach to executable

program

· Modify file directory

· Write to executable program file

Attach to data or

control file

· Modify directory

· Rewrite data

· Append to data

· Append data to self

Remain in memory

· Intercept interrupt by modifying interrupt

handler address table

· Load self in non-transient memory area

Infect disks

· Intercept interrupt

· Intercept operating system call (to format

disk


Collepals.com Plagiarism Free Papers

Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Why Hire Collepals.com writers to do your paper?

Quality- We are experienced and have access to ample research materials.

We write plagiarism Free Content

Confidential- We never share or sell your personal information to third parties.

Support-Chat with us today! We are always waiting to answer all your questions.