How to Remove Hacking Edge, Virus -
How to Remove Hacking Edge 'Virus'
Author: Daisy Meghan
See Also
Computer viruses are diminutive software programs that can replicate and infect a computer without consent from the user. It may cause damage of the hard disk contents and interfere with computer operation. Since, most of personal computers are now linked to the internet; viruses can easily take advantage of network services like in World Wide Web, E-Mail and even Instant Messaging. Through file sharing systems it can simply spread because normally a computer virus is concealed inside another program. For instance, when the host program is running, it is also runs at the same time. It will start to infect other programs on the host computer. After the infection stage, there's a destructive stage. Meaning, the computer virus waits for a certain number of times that it has replicated itself before distributing its payload. Payloads commands to destruct the core operating system.

What will you do if your system was hacked? Awareness on ethical hacking is essential to know the hacking tips they are sharing and different types of computer virus for any prevention or immediate solutions, just in case that we encounter this problem.
Tips to Learn Computer Hacking
These days, an ethical hacker is known as expert and intelligent programmer. They are above from any average programmer. Most of them suggested that we need to follow these steps:

First, be curious and aware for the details of your system directories, file systems and inside of the computer. Next, read a lot of books or go through the tutorials concerning on your system files. Third, don't be afraid. Remember, for you to have much idea on the computer hardware and the operating system you must apply to work the idea that you’ve learned. Of course before doing it, don’t forget to have a backup ready. Then, you need to be familiar with popular operating systems and you should invest for tools like compilers, snoopers, APIs, desk editors etc. After that, pick some projects and work consistently because real time experience is better than reading. Lastly, try to start with the web. There is no source greater than the Internet..
Types of Viruses
Nowadays, there are numerous types of computer viruses on the internet. Fortunately, many can be prevented from spreading with the right tools and software protection ready.

  • Boot viruses - executed when your computer first boots up. Once loaded, the virus can then infect any other disk used by the computer and can also infect a PC’s hard disk.

  • Program viruses – this is a kind of virus that is active in the memory of your computer. It makes copies of itself and infects files on disk. It usually attacks executable program files.

  • Multipartite viruses – is a mixture of Boot and Program viruses. If the infected program files were open they will infect the boot record. And the next time you will open your computer multipartite virus will attack all the program files on disk.

  • Stealth viruses - self installing kind of virus, users are not aware that this virus is already attacking their files because it cannot be detected easily.

  • Polymorphic viruses – these types of viruses are difficult to detect since it can encrypt code in different ways so it may appear different in each infection.

  • Macro Viruses – can be consider a newbie in line of viruses, it usually infects the macros in a document or template. That is why when a template is open, the virus activates. The infection can be carried to other computers when the infected documents were loaded.

  • Active X – these viruses resides on the Active X file in your computer. It is usually carried by the files we down load from the internet.

  • Worms – are similar to virus and created to make a self replication that will lead to negative effects on the system.

  • Nonresident viruses – it has an ability to replicate your files, not knowing it is already a virus since the file name is both the same.

  • Resident viruses – most like the same with the nonresident viruses because of the replication ability. They are sometimes divided into two categories as “fast and slow infectors”. Fast Infectors infects as many files as possible while slow infectors are made to avoid detection by slowing down a computer performance.

  • File Infector Viruses – a kind of virus that hides within the code of all kinds of computer program as long as executable. And it will create an .EXE or .COM file extension.

  • Script Viruses - starting to be a common kind of virus and a very deadly one. It activates in programming languages like JAVA and some small programs.

  • E-Mail Viruses – obviously these are types of viruses that are attached in e-mail messages. These are also separate programs. Most common is the Trojan horse.

  • Chat and Instant Messaging Viruses – these are the so called instant viruses since it can proliferate thru chatting or inside public chat rooms.

  • Directory Virus – if your file had been infected it will impossible for you to locate the originals because directory virus changes the path that indicates the location of your files.

  • Polymorphic Virus – it has the ability to encrypt or encode in a different way every time they infect a system. Anti-viruses had a hard time finding them. They can also make great number of copies of themselves.

  • Direct Action Viruses – likes others are also replicates and do the action when executed to its root directory in the hard disk.

  • Overwrite Viruses – you can only eliminate this virus by deleting the original contaminated file but loosing it completely because the main job of these viruses is to delete the information in your files.

  • Companion Viruses – it accompanies other viruses in your system to carry over their activities, these viruses if there are no other virus to accompany can wait in the memory of a computer.

  • FAT Virus – this virus damages part of your disk like hard disk and storage memories like flash disk. They prevent you to access the said storage until you lose all your files.

  • Trojans or Trojan Horses – it doesn’t look like harmful but a total opposite. This virus is tough to delete. It also has an ability to self-replicate like worms and other viruses.

  • Logic Bombs – this is likely different that others, it doesn’t replicate and not even a program. They are at first camouflaged of other programs and waiting to destroy computer data once certain conditions are met. It is undetected unless already launched.

Operating System Reinstallation
The most effective way to eliminate viruses on your computer system is by reinstalling. It means that you have to reformat computer Operating System and partition. You also have to install other software’s that you needed including media files. You can also put back all your old files such as Word, Excel, PowerPoint and others provided that all files are free from viruses. And last but not least, do not forget to install effective and efficient anti-virus program on your computer.
See Also