Software  >   Malware  >  

Software Viruses

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Viruses, Hoaxes, IM Virus, PC Viruses, Internet Chain Letters, Email Viruses, IM Viruses, Computer Viruses, Boot Viruses, Viruses, Variants, Mytob, File Infecting Viruses, e-Mail Virus, Encrypted Viruses, Virus Hoaxes, Zotob, Self-replicating Viruses, Netsky
DEFINITION: Discovered in the fall of 1999, the Kriz virus (known more formally as W32.Kriz, W32.Kriz.dr, or PE_KRIZ) infects files on Windows 9x and Windows NT and 2000 systems. It has a potentially devastating payload that triggers on December 25th of any year once an infected file is run. When this happen the virus overwrites files on the floppy disk drive, hard drive, RAM drive, and network drives. It also  … 
Definition continues below.
Software Viruses Reports
15 Matches

There are currently no reports cataloged under the topic:
Software Viruses

Please conduct a new search.

15 Matches
SOFTWARE VIRUSES DEFINITION (continued): …  erases the information stored on the computer's basic input/output system ( BIOS ). Although this can only happen on certain types of BIOS systems, a successful attempt could prevent the computer from booting up - even if a floppy disk is used. This behavior is similar to that caused by the CIH virus . In some cases, the Kriz virus will corrupt the file it infects and cleaning may not be possible.W32.Kriz is known as a polymorphic virus, meaning it will reside in computer memory until the next time the system is rebooted. This virus encrypts its code, leaving only a small random decryptor. This … 
Software Viruses definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement