Common Viruses Explained

Feb 20, 2017 | IT Services

We’ve all been the victim of a computer virus, so to help you break through the technical jargon, here is a list of common computer viruses and what these viruses can do.

Virus BlogIt happens to everyone, no matter how careful you are or how you scrutinize a link before clicking it, we’ve all been the victim of a computer virus. One of the most frustrating aspects of getting a computer virus is trying to understand what exactly infected your computer. So to help you break through the technical jargon, here is a list of common computer viruses and what these viruses can do.

Resident Viruses

A virus that stores as part of the operating system and remains in the RAM while the computer is in use which allows it to infect other files long after deleting the original infected file.

Multipartite Viruses

A term that refers to a computer virus that infects and spreads in multiple ways allowing them to spread fast.

Direct Action Viruses

A virus that attacks or starts to work immediately with the primary purpose to replicate and take action when during execution.

Overwrite Viruses

A malicious program which, after infection, will effectively destroy the original program code, typically by overwriting data in the system’s memory.

Boot Viruses

A virus that infects a computer system by copying code either to the boot sector on a floppy disk or the partition table on a hard disk.

Macro Virus

A computer virus that infects a Microsoft Word or a similar application and causes a sequence of automated actions when the application is started or something else triggers it.

Directory Virus

A virus that changes the paths that indicate the location of a file.

Polymorphic Virus

A self-encrypted virus that affects data types and functions designed to avoid detection by a scanner and duplicates itself by creating usable, slightly modified, copies of itself.

File Infectors

A type of virus that infects programs or executable files (.exe or .com extensions).

Common Computer Threats

Browse Posts

By Archives

Want to Learn More?

Whether it’s physical or digital, we can provide a protected location to store all of your information including storage on our servers for off-site backups and provide you with secure access.


  • This field is for validation purposes and should be left unchanged.

Pin It on Pinterest

Share This