Solved

Can somebody tell me?

Posted on 2003-10-24
3
219 Views
Last Modified: 2010-05-18
Hallo experts...

Can somebody tell my what are and how works those types of viruses?

1/bomb virus
2/warhead virus
3/stealth virus

thanks a lot !!!!
0
Comment
Question by:Luxana
  • 2
3 Comments
 
LVL 3

Accepted Solution

by:
FlamingSword earned 30 total points
ID: 9615107
Somebody is pulling your leg, I think. For an initial introduction, I think #2 is off. To give real simple answer to real simple question, here goes:

1) A bomb is a program that periodically "wakes up", checks the clock, and if the time is right, the fuse is set, and it executes something really nefarious.  It does not have to be a virus, and usually is not, for the one who creates them is more often some disgruntled employee who is so angry at a company that he (masculine) leaves them such a program as a going away present.

3) Stealthing does apply more to viruses.  It is an attribute some of them have, like the stealth planes do, of having some features that help it to hide from radar, or in computerese, to hide from users and programs, up to and including anti-virus programs.  Think of them as programs that are hidden from you, where even if you tell explorer to unhide all programs, they will still be hidden from you. That is why they've been given that extra description of being stealthed. Like a Romulan. And like a Romulan, it eventually comes to pass that the good guys learn how to see even the steatlh-hidden ones.
0
 
LVL 3

Expert Comment

by:FlamingSword
ID: 9615133
I just googled your #2, in curiousity, and only got two hits. I think this is more like the Iraqi wargames, and has nothing to do with computers at all. Best guess:

2) Warhead Virus == WMD
0
 
LVL 10

Author Comment

by:Luxana
ID: 9618061
Thank for your answer.....

What do you mean with tis?
Warhead Virus == WMD

Thanks
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This is a video that shows how the OnPage alerts system integrates into ConnectWise, how a trigger is set, how a page is sent via the trigger, and how the SENT, DELIVERED, READ & REPLIED receipts get entered into the internal tab of the ConnectWise …

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now