Steps have been infected when

Detection and specify where about whether the source of the virus on the diskette,
network, email etc.. If you are connected to the network then it's good you isolate your computer first (either the cable or remove the mendisable
Internet connection from the control panel)
Identification and classifying the type of virus that attack your PC, by:
Menganali symptoms that arise, eg messages, files, a corrupt or missing etc.
Scan with your antivirus, if you are affected when running the auto-protect means
virus definition in your computer does not have a virus of this data, try
update manually or download a virus and then to definitionnya
you install. If the virus to block your efforts to update, then
strived to use other media (computer) with the anti -
have the latest update.
Clean virus. After you successfully detects and recognizes
then try to find the immediate removal or how to
destroy the sites that provide information development
virus. This needs to be done when the antivirus with the latest update
you do not succeed destroy it.
The worst. If all the above is not successful format
back to your computer

OVERCOME

Steps for Prevention
For prevention you can do some of the following steps:
1) Use anti-virus that you believe the latest update. No matter
provided that any merknya always updated, and auto-protect enabled the
your computer protected.
2) Always scanning all external storage media that will be used,
This may be making a bit but if the auto-protect your antivirus
work then this procedure can be missed.
3) If you are directly connected to the Internet try to combine
your antivirus with Firewall, Anti-spamming, etc..
4) Always be wary of the FLE-file suspicious, for example: a file with 2
exstension fruit or executable file that looks suspicious.
5) To + shareware software freeware, it's good to take from you
authorized site.
6) Semampunya avoid buying pirated goods, use a software-software
open source.

SOME HOW spreading of virus

The withdrawal of virus biological virus must have spread to the media,
computer viruses can spread to a variety of computer / machine also through other
various media, including:

1. Floppy disks, storage media R / W, flash disk
External storage media can be a soft target for the virus to
be the media. Well as a place to live or as a media distribution.
Media bias operation R / W (Read and Write) is possible
infected for the virus and serve as the distribution media.

2. Network (LAN, WAN, etc.)
Relationships between some computer directly is very feasible
virus took a move occurs when the exchange / pengeksekusian file that
contain viruses.

3. Internet
Site may be a very deliberate planted a "virus" that will
infectedcomputers that access it.

4. Software Freeware, Shareware or even pirated
Many viruses are deliberately planted in a program that
distributed either free, or trial version.

5. Attachment on the email, Transferring files
Almost all of the spread of the virus, the use email
attachment because of all Internet users use email surely
to communicate, these files are made intentionally light / attract attention, even
double often have the extension on the file naming.

Multi Partition Virus

This virus is a combination of boot sector viruses and file viruses. This means working
the result in two, namely he can infected files or *. EXE
*. COM and infected boot sector.

Virus File / Program

This virus menginfeksi files that can be executed directly from the system
operation, whether the files *. EXE, *. COM and also usually results from infection of this virus
may be changing with the size of the file that attack.

Polymorphic Virus

This virus is designed for lead on antivirus program, it means the virus is always 
trying to avoid being identified by antivirus is always changing with the change 
structure each time the file is complete menginfeksi / other programs. 
Examples of viruses: 
- Necropolis A / B, 
infect file *. EXE and *. COM; 
The length of the file 1963 bytes; 
Characteristics: live in the memory, the size and hidden virus, encrypted, and can 
changed the structure change 
- Nightfall,Menginfeksi file *. EXE; 
The length of the file 4554 bytes; 
Characteristics: live in the memory, the size and hidden virus, has triggered, 
encrypted and can change the structure

Stealth Virus

This virus will be the table on the DOS interrupt that often we know 
with the "interrupt interceptor". capable this virus to control 
instructions DOS level and are usually hidden according to their good name 
or full size. 
Examples of viruses: 
- Yankee.XPEH.4928, 
infect file *. COM and *. EXE; 
Length of 4298 bytes; 
Characteristics: live in the memory, the size of hidden, have triggered 
- WXYC (a category including the boot record is also due to enter stealth kategri 
also included here), an infect Floopy motherboot record; 
Length of 520 bytes; 
Characteristics: live in the memory; size and hidden viruses. 
- Vmem (s): 
Menginfeksi files *. EXE, *. SYS and *. COM; 
Fie 3275 bytes long; 
Characteristics: live in the memory, the size of hidden, in the encryption.

Boot Sector Virus

 
Boot sector virus is spread is a common one. This virus in 
reproduce itself, will have to move or replace the original boot sector 
podići program with the virus. So when the virus occurs podići akan loaded 
to memory and then the virus will have the ability to control 
standard hardware (eg monitor, printer etc.) and also from the memory of this virus akan 
spread to all who have the drive and connected to the computer (for example: 
Floopy, drive other than drive c:). 
Examples of viruses: 
- Variant virus wyx 
ex: wyx.C (B) menginfeksi boot record and Floopy; 
Length: 520 bytes; 
Characteristics: Memory resident and encrypted. 
- Variant V-sign: 
attack: Master Boot Record; 
Length of 520 bytes; 
Characteristics: live in the memory (memory resident), encrypted, and polymorphic) 
- Stoned.june 4th / bloody!: 
infect: Master Boot Record and Floopy; 
Length of 520 bytes;

Macro virus

 
This type of virus is certainly very often we hear. This virus was written with 
programming language of an application is not the programming language of an Operating System. This virus can be run when the application can creating it self 
running well. For example, if the computer is run mac application 
Word, the macro virus that is made from the Word macro language can be worked on 
system Mac computer is operating. 
Examples of viruses: 
- Variant W97M, eg W97M.Panther 
Length of 1234 bytes, will infect NORMAL.DOT and infect document 
when opened. 
- WM.Twno.A; TW 
The length of 41,984 bytes, will infect document using Ms.Word 
macro language, usually extention: . . DOC and DOT

Life cycle VIRUS

Life cycle of viruses in general, through the 4 stages: 
Dormant phase (Phase Rest / Sleep) 
At this phase the virus is not active. Virus will be activated by a condition 
particular, such as: the date specified, the presence of other programs / be executed 
other programs, etc.. Not all of the virus through this phase. 
Propagation phase (phase distribution) 
At this phase the virus will copy it self to a program or to a 
place of storage media (both hard drives, RAM etc.). Each program is infected 
will be the result of "cloning" the virus (depending on how the virus 
menginfeksinya). 
Trigerring phase (active phase) 
In this phase the virus is active and this is also the trigger conditions by some 
as in the Dormant Phase. 
Execution phase (execution phase) 
At this phase the virus is active before akan perform its function. Like 
delete files, display messages, etc.

Hide ability of self

Hide this capability must be owned by a virus that 
all work well from the beginning until the successful transmission can be realized. 
The steps that are usually made: 
- Program the virus stored in the form of machine code and combined with the program 

others that are considered useful by the user 

- Program Boot virus placed on the record or track on the disk that is rarely 

observed by the computer itself 
- Program viruses sependek may be made, and the resulting file is not too diinfeksi 
change in size 
- The virus does not change the description / information within a file 
- Etc.

The ability to manipulate

Routine (routine) owned a virus will be run after the virus 
infect a file. The contents of a routine this can vary from that is not 
dangerous to do the demolition. This routine is generally used for 
manipulate files or popularize the author! This routine utilizes 
ability of an operating system (Operating System), that have 
the same ability with the operating system. For example: 
a. Create an image or message on the monitor 
b. Change / change-change the label of each file, directory, or the label of the drive in your PC 
c. Manipulate files that be infected 
d. Damage to the file 
e. Disrupt work printer, etc.

The ability to reproduce themselves

The core of the virus is the ability reproduce infect themselves with the file 
another. A virus has been found when the potential victims he akan 
check with them. If not then infected with the virus akan 
aksinya start with the writing of a byte in the file, 
and so copy/ write virus code objects above the target file. Some 
general way by the virus to infect / reproduce themselves is: 
a. File a ditulari akan deleted or renamed. Then created 
a file containing the virus program itself using the file name of the original. 
b. Virus program that is executed / loaded to memory akan directly infect 
files with other ways infected all the files you have.

  
  

The ability to check a program

A virus must also be able to check a file that will ditulari, for example, 
he served infect program extention: . doc, he has to check whether 
document file has been infected or not, because if it is, akan 
useless invected again. This is very useful to improve the ability of a 
virus in the case of speed invected a file / program. The public be 
by viruses is to have / give alert in the file / program that has been infected so easy to recognize by the virus. Sample designation is for example, provides a unique bytes in each file that was infected.

Ability to obtain information

In general, a virus requires a list of names of the files that have 
in a directory. For what? So that he can get a list of files that can be 
he tulari. For example, a macro virus akan menginfeksi all data files MS Word, 
akan find a list of files berekstensi *. doc. Is the ability to gather 
information is required so that the virus can make a list / data files, and 
memilahnya with the search for files that can be ditulari. Usually this data are now 
file a contagious / virus infected files or virus program itself was opened by the user. 
The virus will soon make the collection of data and put it (usually) in the 
RAM, so that when the computer is turned off all the data lost. But this data 
akan created again each time the virus is activated. Typically data is stored 
also as a hidden file by the virus.

CRITERIA VIRUS

A program can be referred to as a virus when meet a minimum of 5 
following criteria: 
1. Ability to obtain information 
2. The ability to check a file 
3. The ability to reproduce themselves and transmit themselves 
4. The ability to manipulate 
5. The ability to hide themselves. 
Now it will try to explain what is short of tiaptiap 
ability, and why this is necessary.

The VIRUS

"A program that can infect other programs by modifying them to include a slighty 
altered copy of itself. A virus can spread throughout a computer system or network 
using the authorization of every user using it to infect their programs. Every programs 
that gets infected can also act as a viral infection that grows " 
(Fred Cohen) 
The first time the term "virus" is used by Fred Cohen in 1984 in 
United States. Computer virus called "virus" because it has some 
fundamental similarities with the virus in the medical term (biological viruses). 
Computer viruses can be defined as a normal computer program. But 
have a fundamental difference with other programs, the virus 
made to infect other programs, change, manipulate 
even merusaknya. There is a need to note here, the virus will only infect 
triggered when the program or programs that have been infected earlier executed, disinilah 
differences with the "worm". This study will not be because the worm will 
divert us from the discussion on this virus.

The Legend of Virus

1949, John von Neumann, said"self altering automata theory" 
which is the result of the research mathematician. 1960, Bell Lab (AT & T), the 
experts in the lab Bell (AT & T)-try to try the theory expressed by John von 
Neumann, with a type of game / game. They create a program 
that can reproduce themselves and the program can be made in the opponent. 
The program is capable of enduring and destroy all other programs, akan 
considered to be the winner. This game eventually became the favorite game in the 
each computer lab. However, the longer the program that created the 
dangerous, so they do control and strict security 
of this game. 1980, these programs are finally known 
with a "virus" is spread out successful laboratory environment, and 
began circulating in the general public.