Online Security
Russian

Glossary

Resident Virus

A resident virus loads into memory and remains inactive until a trigger event. When the event occurs the virus activates, either infecting a file or disk, or causing other consequences. All boot viruses are resident viruses and so are the most common file viruses.

 

Print this page



- ZIP File

- Worm

- Windows Scripting

- Warm Boot

- Virus Hoaxes

- Virus

- Variant

- Vaccination

- VBS

- Tunneling

- Trojan Horse Program

- Triggered Event

- Timestamp

- Time Bomb

- TSR

- System Boot Record

- Stealth Virus

- Sparse Infector

- Sniffer

- Slow Infector

- Signature

- Shareware

- Shared Drive

- Self-garbling Viruses

- Self-extracting Files

- Self-encrypting Virus

- Sector Viruses

- Scanner

- SMTP

- Resident Virus

- Replication

- Redirect

- Real-time Scanner

- RTF File

- Program Infector

- Polymorphic Virus

- Piggyback

- Payload

- Password Sniffing

- Password Attacks

- PGP

- Overwriting Virus

- Operating System

- On-demand Scanner

- On-access Scanner

- Not In The Wild

- NTFS

- Mutating Virus

- Mutant

- Multipartite Virus

- Memory-resident Virus

- Master Boot Sector Virus

- Master Boot Sector

- Master Boot Record

- Malware

- Malicious Code

- Macro Virus

- Macro

- MS-DOS

- MP3 File

- MBR

- Logic Bomb

- Library File

- Key

- Joke Programs

- JavaScript

- Infection

- Host

- Hole

- Hijacking

- Heuristic Analysis

- Firewall

- File Viruses

- FAT

- Encryption

- Encrypted Virus

- EXE file

- Dropper

- Disinfection

- Direct Action Virus

- Denial Of Service (DoS)

- DOS

- Cookie

- Companion Virus

- Cold Boot

- Cluster Virus

- Checksum

- Boot Sector Infector

- Boot Sector

- Boot Record

- Boot

- Batch files

- Backup

- Background Task

- Background Scanning

- Back Door

- BIOS

- Antivirus Virus

- Anti-virus Software

 
 
© OnlineSecurity-ON, 2004-2024. All rights are reserved.