Eliza (computer virus)
Encyclopedia

Overview

Eliza is a computer virus
Computer virus
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability...

 which infects COM
COM file
In many computer operating systems, a COM file is a type of executable file; the name is derived from the file name extension .COM. Originally, the term stood for "Command file", a text file containing commands to be issued to the operating system , on many of the Digital Equipment Corporation mini...

 files including Command.com
COMMAND.COM
COMMAND.COM is the filename of the default operating system shell for DOS operating systems and the default command line interpreter on Windows 95, Windows 98 and Windows Me...

. It has been reported that it is defective, yet destroys the .EXE files it creates. The .COM files do not get deleted. The date of the file will not be altered by the infection to avoid detection, infected files increase in length by 1,193 or 1,194 bytes. Eliza is also found in later versions of Windows.

DOS Strain

One of the forms of Eliza attacks the MS-DOS operating system
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...

 by reproducing itself into COM
COM file
In many computer operating systems, a COM file is a type of executable file; the name is derived from the file name extension .COM. Originally, the term stood for "Command file", a text file containing commands to be issued to the operating system , on many of the Digital Equipment Corporation mini...

 and .EXE files. However, the virus has a bug in it which does not allow it to behave properly. It only attacks .EXE files. Because it is defective and easy to track, Eliza has been considered a minimal threat.

Windows NT/2000/XP/Vista/7 Strain

It is not known whether the Windows strain was developed by the same person, but the particular strain targeting Windows is much more damaging and is considered a legitimate threat. One site reports that it does the following:

  • Remotely controls your computer
  • Wastes system resources and clogs CPU usage
  • Tracks internet and keystrokes, allowing the hacker to record/steal passwords, credit card numbers, etc.


You can remove the virus from your computer with an antivirus program or by going into safe mode to remove the infected files manually.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK