SlideShare a Scribd company logo
1 of 22
By Mr UV




Computer Viruses and Worms
Definition of Virus
Computer Virus Timeline
Worms
History of Worms
   The first worm to attract wide attention, the
    Morris worm, was written by Robert Tappan
    Morris, who at the time was a graduate
    student at Cornell University.
   It was released on November 2, 1988
   Morris himself was convicted under the US
    Computer Crime and Abuse Act and received
    three years probation, community service and
    a fine in excess of $10,000.
Worms…
   Worms – is a small piece of software that
    uses computer networks and security holes to
    replicate itself. A copy of the worm scans the
    network for another machine that has a
    specific security hole. It copies itself to the
    new machine using the security hole, and
    then starts replicating from there, as well.
   They are often designed to exploit the file
    transmission capabilities found on many
    computers.
Zombies






Typical things that some current
Personal Computer (PC) viruses do
Typical things that some current
Personal Computer (PC) viruses do
Distributed Denial of
       Service
How it works?
MyDoom
   27 January: SCO Group offers a US $250,000
    reward for information leading to the arrest of the
    worm's creator.
   1 February: An estimated one million computers
    around the world infected with MyDoom begin
    the virus's massive distributed denial of service
    attack—the largest such attack to date.
   2 February: The SCO Group moves its site to
    www.thescogroup.com.
 Traditional Viruses
 pieces of code attached to a legitimate
  program
 run when the legitimate program gets
  executed
 loads itself into memory and looks around
  to see if it can find any other programs on
  the disk
 Traditional Virus
 infect the boot sector on floppy disks and
  hard disks
 By putting its code in the boot sector, a
  virus can guarantee it gets executed
 load itself into memory immediately, and it
  is able to run whenever the computer is on
Decline of traditional viruses
   Reasons:
    – Huge size of today’s programs storing on a
      compact disk
    – Operating systems now protect the boot
      sector
E-mail Viruses
 Moves around in e-mail messages
 Replicates itself by automatically mailing
  itself to dozens of people in the victim’s e-mail
  address book
 Example: Melissa virus, ILOVEYOU virus
   March 1999
   the Melissa virus was the fastest-spreading virus
    ever seen
   Someone created the virus as a Word document
    uploaded to an Internet newsgroup
   People who downloaded the document and opened
    it would trigger the virus
   The virus would then send the document in an e-
    mail message to the first 50 people in the person's
    address book
Melissa virus
   Took advantage of the programming
    language built into Microsoft Word called
    VBA (Visual Basic for Applications)
Prevention
 Updates
 Anti-Viruses
 More secure operating systems
  e.g. UNIX
Reference
   http://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gif
   http://www.factmonster.com/ipka/A0872842.html
    http://www.faqs.org/faqs/computer-virus/new-users/
   http://www.mines.edu/academic/computer/viri-sysadmin.htm

More Related Content

What's hot

Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingmentcheauyih
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and preventionCholo Legisma
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and preventionCholo Legisma
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spreadwenxin
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Spreading virus
Spreading virusSpreading virus
Spreading virusdixitas
 
Guarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.SivakumarGuarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.SivakumarSivakumar R D .
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 

What's hot (20)

Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and prevention
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and prevention
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 
Guarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.SivakumarGuarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.Sivakumar
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 

Viewers also liked

Viewers also liked (6)

Virus and worms analysis
Virus and worms analysisVirus and worms analysis
Virus and worms analysis
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 

Similar to Viruses (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Virus09
Virus09Virus09
Virus09
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Virus
Virus  Virus
Virus
 

More from yuvan80

Angles and shapes
Angles and shapesAngles and shapes
Angles and shapesyuvan80
 
Area and perimeter_10_r5
Area and perimeter_10_r5Area and perimeter_10_r5
Area and perimeter_10_r5yuvan80
 
Presentation guide
Presentation guidePresentation guide
Presentation guideyuvan80
 
Impact of ict
Impact of ictImpact of ict
Impact of ictyuvan80
 
Antivirus
AntivirusAntivirus
Antivirusyuvan80
 
Network topology year 9 week 6
Network topology year 9 week 6Network topology year 9 week 6
Network topology year 9 week 6yuvan80
 
Network yr 7 week 6
Network yr 7 week 6Network yr 7 week 6
Network yr 7 week 6yuvan80
 
Social networking
Social networkingSocial networking
Social networkingyuvan80
 
Starting graph
Starting graphStarting graph
Starting graphyuvan80
 

More from yuvan80 (11)

Angles and shapes
Angles and shapesAngles and shapes
Angles and shapes
 
Area and perimeter_10_r5
Area and perimeter_10_r5Area and perimeter_10_r5
Area and perimeter_10_r5
 
Network
NetworkNetwork
Network
 
Presentation guide
Presentation guidePresentation guide
Presentation guide
 
Impact of ict
Impact of ictImpact of ict
Impact of ict
 
Antivirus
AntivirusAntivirus
Antivirus
 
Network topology year 9 week 6
Network topology year 9 week 6Network topology year 9 week 6
Network topology year 9 week 6
 
Network yr 7 week 6
Network yr 7 week 6Network yr 7 week 6
Network yr 7 week 6
 
Social networking
Social networkingSocial networking
Social networking
 
Basic 2
Basic 2Basic 2
Basic 2
 
Starting graph
Starting graphStarting graph
Starting graph
 

Recently uploaded

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 

Recently uploaded (20)

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 

Viruses

  • 1. By Mr UV Computer Viruses and Worms
  • 4.
  • 6. History of Worms  The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University.  It was released on November 2, 1988  Morris himself was convicted under the US Computer Crime and Abuse Act and received three years probation, community service and a fine in excess of $10,000.
  • 7. Worms…  Worms – is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.  They are often designed to exploit the file transmission capabilities found on many computers.
  • 9. Typical things that some current Personal Computer (PC) viruses do
  • 10. Typical things that some current Personal Computer (PC) viruses do
  • 14. 27 January: SCO Group offers a US $250,000 reward for information leading to the arrest of the worm's creator.  1 February: An estimated one million computers around the world infected with MyDoom begin the virus's massive distributed denial of service attack—the largest such attack to date.  2 February: The SCO Group moves its site to www.thescogroup.com.
  • 15.  Traditional Viruses  pieces of code attached to a legitimate program  run when the legitimate program gets executed  loads itself into memory and looks around to see if it can find any other programs on the disk
  • 16.  Traditional Virus  infect the boot sector on floppy disks and hard disks  By putting its code in the boot sector, a virus can guarantee it gets executed  load itself into memory immediately, and it is able to run whenever the computer is on
  • 17. Decline of traditional viruses  Reasons: – Huge size of today’s programs storing on a compact disk – Operating systems now protect the boot sector
  • 18. E-mail Viruses  Moves around in e-mail messages  Replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail address book  Example: Melissa virus, ILOVEYOU virus
  • 19. March 1999  the Melissa virus was the fastest-spreading virus ever seen  Someone created the virus as a Word document uploaded to an Internet newsgroup  People who downloaded the document and opened it would trigger the virus  The virus would then send the document in an e- mail message to the first 50 people in the person's address book
  • 20. Melissa virus  Took advantage of the programming language built into Microsoft Word called VBA (Visual Basic for Applications)
  • 21. Prevention  Updates  Anti-Viruses  More secure operating systems e.g. UNIX
  • 22. Reference  http://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gif  http://www.factmonster.com/ipka/A0872842.html http://www.faqs.org/faqs/computer-virus/new-users/  http://www.mines.edu/academic/computer/viri-sysadmin.htm