What type of virus can corrupt hardware




















Hard Drive Killer? Many BIOSes store a recovery copy in the read-only boot block for rollback. For the typical modern computer, the answer is "no". Mark Mark Haven't you heard?!

Big difference between a virus exploiting the peripherals connected to your PC and a virus that can physically harm your computer's components — Ulkoma.

Ulkoma But both are covered by your question. Nowhere do you scope it specifically to the affected computer's internal components. Jens Erat I guess someone already mentioned Stuxnet. Yes, it is a very real thing. All it needs to do is know a target, its hardware and software, and then be designed to launch an attack via the programmable logic controllers. As much as I despise these programs, ya gotta give the coders credit.

Some of em are works of art. Conundrum Conundrum 29 3 3 bronze badges. Serge Ballesta Serge Ballesta Hard drive trashing - constantly moving that arm until death Over voltage - with software based Overclocking, it's not hard to up voltage until ram or CPU damage occurs. Motherboards step voltage down to work with these components.

Many modern boards with overclocking functions allow for this to be manipulated from the OS. Pushing 2. The CPUs can be damaged the same way. I assume some Video cards can also be damaged this way. Fan speed manipulation - stopping or slowing fans until over heating occurs. This can be coupled with disabling temperature fail safes. I haven't heard of a situation that you can over spin a fan.

Unless your cranking the voltage up higher than what the PSU puts out, I don't see it as a possibility. Specialized hardware would need to be implemented to over volt beyond the max input voltage. I also haven't seen any fans not rated for the same voltage the PSU puts out.

I'm sure there is some higher voltage server equipment out there, but even then, I expect that voltage to be throttled down before it ever hit the hardware in a system. Consistent overloading a PSU with stress. A under rated PSU will run hotter under a heavy load, eventually leading the internal components to fail This is typically capacitors.

It's also possible to flash a bios and force a thermal shutdown by stopping the fans. This would leave the bios in a half flashed or corrupted state, making the board useless until repaired. Gerb Gerb 11 1 1 bronze badge. Steve Steve 11 1 1 bronze badge. Chris G Chris G 1 1 bronze badge. I think it's implied that the damage is to the computing mechanism itself.

The Overflow Blog. Does ES6 make JavaScript frameworks obsolete? Podcast Do polyglots have an edge when it comes to mastering programming Featured on Meta. Now live: A fully responsive profile. Linked 5. Related 8. Hot Network Questions. Secure yourself against unauthorized access, email compromise, and document tampering with our enterprise tested, cloud-based PKI. All legacy Symantec account portals have moved to CertCentral. If not, contact our sales or support teams here. They will send you an email with a unique link to access your account.

Malware is designed to cause damage to a stand-alone computer or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan.

A virus might corrupt or delete data on your computer. Viruses can also replicate themselves. Viruses also enters through downloads on the Internet. So before you download anything from the internet, be sure about it first.

Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.

It is important to note that a virus cannot be spread without a human action, such as running an infected program to keep it going. Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

It also can download other malicious programs from internet and install it on the computer. Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware type program or application. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application.

Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojan horses are broken down in classification based on how they infect the systems and the damage caused by them.

The seven main types of Trojan horses are:. Worms are malicious programs that make copies of themselves again and again on the local drive, network shares, etc. The only purpose of the worm is to reproduce itself again and again. Unlike a virus, it does not need to attach itself to an existing program. Worms spread by exploiting vulnerabilities in operating systems.

Due to its replication nature it takes a lot of space in the hard drive and consumes more CPU uses which in turn makes the pc too slow also consumes more network bandwidth. Macro Virus: These type of virus infects word, excel, PowerPoint, access and other data files.

Once infected repairing of these files is very much difficult. Master boot record files: MBR viruses are memory-resident viruses and copy itself to the first sector of a storage device which is used for partition tables or OS loading programs. A MBR virus will infect this particular area of Storage device instead of normal files. These are also memory resident in nature. As soon as the computer starts it gets infected from the boot sector.

Most inboxes tell you what the file extension is. Be especially careful with files named things like. The only part of the extension that matters is the very last part, so in the. To keep your computer running at full capacity and free of any malware, check out our antivirus software options here.

To keep up-to-speed with all things tech and online security, follow us on Facebook and Twitter. Internet Security Centre. Security Center Malware Myth-busting the 10 most ridiculous malware myths. Viruses are worse than malware Nope. Truth: Viruses are a type of malware. Truth: Macs can get viruses too 3. Malware is created by antimalware companies. Wait …what?

Truth: No one believes you! Pop-ups are malware. Exit out to the screen you were on before. How to uninstall a program on a Mac 1. Drag the program to the trash. Empty your trash! How to uninstall a program on Windows 1. Click the Start Button, then Control Panel. Click Programs, then Programs and Features. Select or right-click a program and then click Uninstall. Firewalls will protect you from malware.

Truth: Firewalls will only keep you safe from a type of malware called worms.



0コメント

  • 1000 / 1000