{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":7681949,"author_id":3515862,"title":"VIRUS INFORMATICO","created_at":"2017-02-14T20:34:35Z","updated_at":"2017-02-14T21:00:41Z","sample":false,"description":"tipos de virus y sus carateristicas","alerts_enabled":true,"cached_tag_list":"¿que es in virus informatico, tipos de virus informatico, propagacion de los virus informaticos","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["¿que es in virus informatico","tipos de virus informatico","propagacion de los virus informaticos"],"admin_tag_list":[],"study_aid_type":"SlideSet","show_path":"/slide_sets/7681949","folder_id":6963362,"public_author":{"id":3515862,"profile":{"name":"JUAN PABLO LAZO ","about":null,"avatar_service":"google","locale":"es-ES","google_author_link":null,"user_type_id":234,"escaped_name":"JUAN PABLO LAZO BECERRIL","full_name":"JUAN PABLO LAZO BECERRIL","badge_classes":""}}},"width":300,"height":250,"rtype":"SlideSet","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Ciencia"},{"key":"rlevel","value":"TOEFL"},{"key":"env","value":"production"},{"key":"rtype","value":"SlideSet"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":7681949,"author_id":3515862,"title":"VIRUS INFORMATICO","created_at":"2017-02-14T20:34:35Z","updated_at":"2017-02-14T21:00:41Z","sample":false,"description":"tipos de virus y sus carateristicas","alerts_enabled":true,"cached_tag_list":"¿que es in virus informatico, tipos de virus informatico, propagacion de los virus informaticos","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["¿que es in virus informatico","tipos de virus informatico","propagacion de los virus informaticos"],"admin_tag_list":[],"study_aid_type":"SlideSet","show_path":"/slide_sets/7681949","folder_id":6963362,"public_author":{"id":3515862,"profile":{"name":"JUAN PABLO LAZO ","about":null,"avatar_service":"google","locale":"es-ES","google_author_link":null,"user_type_id":234,"escaped_name":"JUAN PABLO LAZO BECERRIL","full_name":"JUAN PABLO LAZO BECERRIL","badge_classes":""}}},"width":300,"height":250,"rtype":"SlideSet","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Ciencia"},{"key":"rlevel","value":"TOEFL"},{"key":"env","value":"production"},{"key":"rtype","value":"SlideSet"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Es un software que tiene por objetivo alterar el funcionamiento normal de la computadora, sin el permiso o el conocimiento del usuario. Los virus, habitualmente, remplazan archivos ejecutables con otros infectados con el código de este.
Slide 2
Slide 3
TIPOS DE VIRUS INFORMATICOS
Worm o gusano informático: Es un malware que reside en la memoria de la computadora y se caracteriza por duplicarse en ella , sin la asistencia de un usuarioCaballo de troya: Este virus se esconde en un programa legítimo que, al ejecutarlo ,comienza a dañar la computadora.De sobre escritura:Esta clase de virus genera la pedida del contenido de los archivos a los que ataca. Esto lo logra sobrescribiendo su interior