ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Classification of Computer Viruses / Computer Virus

Updated on December 1, 2016
Stop Malware
Stop Malware | Source

Methods of Infection

Computer Virus Classification is easy when you understand the different types.

A Computer Virus is a term used to generically identify a number of types of malicious software programs. These malicious software programs can be classified based on their method of infection. Malicious programs can be identified by their intent to steal information and damage a computer system or network. Computer Viruses belong into two categories Viruses, and Worms. These have then been divided into sub-categories


A virus is a small snippet of code that has no ability to function on its own and needs a host executable or document in order to function, thrive, propagate, and ultimately deliver its payload.

Executable Virus

A virus is a self-replicating program that injects itself into software programs. Once the virus has infected a host program it waits till a pre-determined time to deliver its payload, meanwhile replicating itself throughout the computer or network that it is has penetrated. Executable viruses are no longer as prevalent in current operating system as they once were; though they are still found in the wild on rare occasions.

Macro Virus

A macro virus is a class of infection that infects Microsoft office based products utilizing the embedded functionality of Visual Basic in order to transmit itself throughout a company’s network and e-mail system. This category of virus was seen in the wild during the late 90’s before finally being brought under control through a combination of security updates in Microsoft products, and by enhanced detection methods by anti-virus vendors.

Boot-Sector Virus

Boot sector viruses were notorious in the late 80’s through the late 90’s for being the most difficult to detect, and clean. Their ability to load and then camouflage themselves in order to hide themselves from sophisticated detection techniques allowed them to flourish longer than other types of viruses. In the last 2 years a resurgence of this style of attack has been seen in the wild and often isn’t detected by even the highest rated anti-virus vendors.


A computer worm is a class of computer virus that can propagate itself not only on intranets, but also through external networks such as the internet. A worm can be a stand-alone program that functions independently of a host executable.

Trojan horse

A Trojan horse virus is so named due to the fact that the actual malicious software is programmed inside of an innocent piece of software, browser toolbar's being one of many techniques. Once the carrier software has installed the virus on the host system the virus will then deliver its payload. Trojan viruses don’t always replicate, they often simply wait for the end-user to initiate an action that allows them to install themselves.


Malware falls into a category of viruses that came about in the first decade of the 21st century with the advent of social networking and daily computer use the harm that could be spread and inflicted through the internet grew at an exponential rate. This prompted malicious coders to create sophisticated programs that would take over your computer flooding systems with ads and other nefarious programs in order to create mayhem. This morphed into another version of malware sometimes referred to as ransom-ware, these sophisticated programs would mimic legitimate anti-virus programs and security programs in an attempt to extort money from the computer user. (Sanders, 2010)

Browser redirects

Browser redirects are malicious code embedded into websites that adjust your internet browsers home page and search defaults to websites that were not selected by the end user, this in turn generates search revenue for the entity responsible for the malicious code.

Malicous software is widely disseminated and the previous threats indicated are just the tip of the iceberg, there are many variants on the previous themes prevalent in the wild. Authors of malicious software often use a variety of techniques that involves multiple categories in order to spread their viruses.

Was the article useful?

Did my article help you?

See results


    0 of 8192 characters used
    Post Comment
    • nwapchelp profile imageAUTHOR

      Michael Reid 

      2 years ago from Farmington, AR

      @bharti, explain what you mean? when you say all names of viruses?

      ex: Spectre, Meltdown etc?

      If that is the type of names you mean, that would go way beyond the scope of this article.

    • profile image


      2 years ago

      pleaase tell about all names of viruses

    • ib radmasters profile image

      ib radmasters 

      8 years ago from Southern California

      Great job on describing the distinctions between computer intrusions.

      My opinion is that it has been weak programming of the OS that allows the bulk of these viruses to exist.

      Many of these poor coding practices began when hardware was very expensive and memory was even more expansive. Coding became limited to the amount of memory available. So many of the protections and checks were not implemented because they either took too much memory or they slowed down the program.

      This went on even though processors got extremely fast, and memory got cheaper and more abundant.

      The stack overflow failures was a problem that could have been protected by making a range check for the program so that it wouldn't jump into another program causing damage.

      There is no reason for a computer to try to divide by zero, yet if the variable or constant is not checked for zero, the divide will cause problems.

      These are just a few of the examples of poor coding.

      Although UNIX and its derivatives have been successfully attacked by hackers, the basic OS with its protected Kernel is far superior to Windows.

      The remote execution feature found in windows is a great feature but it is also a mechanism to be used by hackers.

      The pecuniary interest in hacker versus protector might be questioned as an intentional escalation as both sides have a goal. Although their functions are different they both are rewarded for the hack.

      Hack is also a term for Cab or Taxi and they have their meters running when you are in it. lol



    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)