1. π° Polymorphic viruses π°
These viruses conceal themselves through varying cycles of encryption and decryption.The encrypted virus and an associated mutation engine are initially decrypted by a decryption program.The virus proceeds to infect an area of code.The mutation engine then develops a new decryption routine and the virus encrypts the mutation engine and a copy of the virus with an algorithm corresponding to the new decryption routine.The encrypted package of mutation engine and virus is attached to new code,and the process repeats.Such viruses are difficult to detect but have a high level of entropy because of the many modifications of their source code.Anti-virus software or free tools like Process Hacker can use this feature to detect them.
2.π°Virtual Memory (VM)π°
Virtualmemory (VM)is a feature developed for the kernel of an operating system (OS)that simulates additional main memory such as RAM (randomaccess memory)or disc storage.This technique involves the manipulation and management of memory by allowing the loading and execution of larger programs or multiple programs simultaneously.It also allows each program to operate as if it had infinite memory,and is often considered more cost effective than purchasing additional RAM
3.π° THRASHING π°
Thrashing in computing is an issue caused when virtual memory is in use.It occurs when the virtual memory of a computer is rapidly exchanging data for data on hard disk,to the exclusion of most application-level processing.As the main memory gets filled,additional pages need to be swapped in and out of virtual memory.The swapping causes a very high rate of hard disk access.Thrashing can continue for a long duration until the underlying issue is addressed.Thrashing can potentially result in total collapse of the hard drive of the computer
4. π° ALGORITHM π°
An algorithm is a step by step method of solving a problem.It is commonly used for data processing,calculation and other related computer and mathematical operations.
Analgorithm is also used to manipulate data in various ways,such as inserting a new data item,searching for a particular item or sorting an item.
5. π°Memory Allocationπ°
Memory allocation is primarily a computer hardware operation but is managed through operating system and software applications.Memory allocation process is quite similar in physical and virtual memory management.Programs and services are assigned with a specific memory as per their requirements when they are executed.Once the program has finished its operation or is idle,the memory is released and allocated to another program or merged within the primary memory.
These viruses conceal themselves through varying cycles of encryption and decryption.The encrypted virus and an associated mutation engine are initially decrypted by a decryption program.The virus proceeds to infect an area of code.The mutation engine then develops a new decryption routine and the virus encrypts the mutation engine and a copy of the virus with an algorithm corresponding to the new decryption routine.The encrypted package of mutation engine and virus is attached to new code,and the process repeats.Such viruses are difficult to detect but have a high level of entropy because of the many modifications of their source code.Anti-virus software or free tools like Process Hacker can use this feature to detect them.
2.π°Virtual Memory (VM)π°
Virtualmemory (VM)is a feature developed for the kernel of an operating system (OS)that simulates additional main memory such as RAM (randomaccess memory)or disc storage.This technique involves the manipulation and management of memory by allowing the loading and execution of larger programs or multiple programs simultaneously.It also allows each program to operate as if it had infinite memory,and is often considered more cost effective than purchasing additional RAM
3.π° THRASHING π°
Thrashing in computing is an issue caused when virtual memory is in use.It occurs when the virtual memory of a computer is rapidly exchanging data for data on hard disk,to the exclusion of most application-level processing.As the main memory gets filled,additional pages need to be swapped in and out of virtual memory.The swapping causes a very high rate of hard disk access.Thrashing can continue for a long duration until the underlying issue is addressed.Thrashing can potentially result in total collapse of the hard drive of the computer
4. π° ALGORITHM π°
An algorithm is a step by step method of solving a problem.It is commonly used for data processing,calculation and other related computer and mathematical operations.
Analgorithm is also used to manipulate data in various ways,such as inserting a new data item,searching for a particular item or sorting an item.
5. π°Memory Allocationπ°
Memory allocation is primarily a computer hardware operation but is managed through operating system and software applications.Memory allocation process is quite similar in physical and virtual memory management.Programs and services are assigned with a specific memory as per their requirements when they are executed.Once the program has finished its operation or is idle,the memory is released and allocated to another program or merged within the primary memory.