SlideShare une entreprise Scribd logo
1  sur  23
• Viruses, Worms and Trojan
horse can cause damage
to computer.
What they are?
Viruses
• Code written with the express intention of
replicating itself.
• A virus attempts to spread from computer to
computer by attaching itself to a host programs.
• It may damage the hardware, software or the
information.
Worms
• A subclass of virus. A worm generally
spread without user action and distributes
complete copies (possibly modified) of itself
across networks.
• Can consume memory or networks
bandwidth thus causing a computer stop
responding.
- Because worms don’t need to travel via a
“host” program or file, they can also tunnel
into your system and allow somebody else
to take control of your computer remotely.
Trojan horse
• Is a program which a user or
administrator install on the computer.
• Are impostor files that claim to be
something desirable but, in fact are
malicious.
• often acts as a backdoor, contacting a
controller which can then have
unauthorized access to the affected
computer.
Viruses
How does a virus work?
• Virus is a dropped in a program using a dropper.
• Software installer onto a computer infecting
target files.
• Virus lies dormant until it is triggered by the
user and event or timer; therefore executing its
payload.
• Crashing the computer, e.g. with "blue screen of death"
(BSOD)
• Data corruption,
• Formatting disks, destroying all contents
• Use of the machine as part of a boot net (e.g. to perform
automated spamming or to distribute Denial-of-service
attacks).
• Electronic money theft
• Modification or deletion of files
• Using computer resources for mining crypto currency.
• Linking computer to Boot net
• Using infected computer as proxy for illegal activities and
attacks on other computers.
Viruses
How it does effect to the computer?
•The main signs are:
* The start up and the responses of your computer become slower
than before.
* The Control Panel or the My Document folder opens
automatically especially after the start-up of the computer.
* While changing the background of your desktop, the color
changes to default color blue (for Xp) or anything else which you
didn't want.
* Very often some of your running programs will be non-
responsive. If you are able to open the Task Manager, then it will
show you that the CPU or RAM usage is very high.
* In many times, computer will show windows telling that some of
the files are missing from the system files (Generally C drive) and
some fatal error may occur.
Viruses
Viruses
7 Kinds of Viruses
• Companion
• Executable Program
• Memory Resident
• Boot Sector
• Dives Driver
• Macro
• Source code
Viruses
Companions Viruses
• Not actually a virus.
• Understand Execution
-Program.com
- Program.exe
- Program.bat
• Most program today have a extension
.exe.
• difficult to detect, as anti-virus software
tends to use changes in files as clue..
Viruses
Executable Program Viruses
• Overwriting
- Overwrites executable program with itself.
• Parasitic
- Attaches itself to others programs, but allow
original function.
• Cavity
- Hides itself in unused portion of segment
(512), exploits internal fragmentation.
• a non resident computer virus that stores itself
in an executable file and infects other files
each time the file is run.
Viruses
Memory Resident Viruses
• A virus that stays in memory after it executes
and after its host program is terminated. In
contrast, non-memory-resident viruses only are
activated when an infected application runs.
• Hides
- At the top of memory.
- Among interrupt vectors.
• Can alter RAM bitmap to avoid overwritten.
• Captures trap or interrupt vectors.
• Saves address to scratch variable.
• Executes its own address.
• Invokes real system by jumping to saved trap
address.
Viruses
Boot Sector Viruses
• Is a computer virus that infects a storage
device's master boot record (MBR). It is
not mandatory that a boot sector virus
successfully boot the victim's PC to infect
it.
• These viruses copy their infected code
either to the floppy disk's boot sector or to
the hard disk's partition table. During
start-up, the virus gets loaded to the
computer's memory.
• Such viruses are very common.
Viruses
Device Driver Viruses
• A virus which infiltrates a computer
via the device driver software.
• The software used to control
peripherals such as the keyboard.
• Happily only early operating systems
such as MSDOS were susceptible to
this type of virus.
• If a drive is infected, the virus will be
run every time the computer restart.
Viruses
Macro Viruses
• Is a computer virus that "infects“
a Microsoft Word or similar
application and causes a sequence
of actions to be performed
automatically when the application
is started or something else
triggers it.
• Used to group several commands
to a keystroke.
• Attach to menu items..
Viruses
Source Code Viruses
• Are a subset of computer
viruses that make modifications
to source code located on an
infected machine.
• A source file can be overwritten
such that it includes a call to
some malicious code.
• Can be very portable.
• Are rare, partly due to the
difficulty of parsing source code
programmatically, but have
been reported.
DifferencesVirus
- attempts to spread from computer to computer by attaching itself.
Worm
- generally spread without user action and distributes complete copies
(possibly modified) of itself across networks.
Trojan
- may give a hacker remote access to a targeted computer system,
operations that could be performed by a hacker.
 Some people call any type of malicious software a “computer virus,” but
that isn’t accurate. Viruses, Worms, and Trojans horse are different
types of malicious software with different behaviors. In particular, they
spread themselves in very different way. Malicious software in general
is referred to as “malware.” If you want a catch-all term for bad
computer software, malware is the word to use.
Examples of Viruses
• Name: CIH
• Aliases : Chernobyl, Space filler
• Isolation date: June 1998
• Types: Windows 95/98/Me
• Origin: Taiwan
• Author: Chen ing - Hau
• Note: Activates on April 26, in which it
destroys partition tables, and tries
to overwrite the BIOS.
• Name: Code Red
• Aliases: Heart bleed and CRv1 & CRv2
• Types: Server Jamming Worm
• Isolation date: January, 2001
• Note: This worm allows the hackers to hack
your complete network from the
location. The Heart Bleed virus allows
hackers to steal data like credit card.
Examples of Worms
Examples of Trojan horse
• Name: Trojan.Flame.A
• Aliases: sky Wiper
• Types: Windows 7/2000/XP/2003/ME
•Isolation date: May 2012
• Note: Can spread to other system over
a local network (LAN) or via USB
stick and Bluetooth, in which grab screen
shot down.
Be Careful from the Viruses
• Keep your system and software to up date.
• Use Anti-virus, firewall and Antispyware solution.
• Do not open unsafe attachment.
• Keep away from chain letters, spam and
‘too good to be true’ offers.
• keep away from dubious web sites.
• Beware of receiving files from people in chat
rooms.
• beware of Hoaxes (do a search for them
if suspicious).
• Beware of unsafe file sharing programs.
Kinds of Viruses

Contenu connexe

Tendances

Tendances (20)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Viruses
VirusesViruses
Viruses
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer virus
Computer virusComputer virus
Computer virus
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virus
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Virus presentation1
Virus presentation1Virus presentation1
Virus presentation1
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Malware
MalwareMalware
Malware
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
What is malware
What is malwareWhat is malware
What is malware
 

En vedette

Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมChainarong Maharak
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
Computer virus
Computer virusComputer virus
Computer virusviji_tgce
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Virusesmartingarcia300
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computerlmadison10
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 

En vedette (20)

Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Virus
VirusVirus
Virus
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Computer virus
Computer virusComputer virus
Computer virus
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Malware
Malware Malware
Malware
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 

Similaire à Kinds of Viruses

6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their typesNeha Kurale
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Pranjal Vyas
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus workschinmay kelkar
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 

Similaire à Kinds of Viruses (20)

6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Virus vs worms vs trojans
Virus vs worms vs trojansVirus vs worms vs trojans
Virus vs worms vs trojans
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Malicious
MaliciousMalicious
Malicious
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Kinds of Viruses

  • 1.
  • 2. • Viruses, Worms and Trojan horse can cause damage to computer.
  • 4. Viruses • Code written with the express intention of replicating itself. • A virus attempts to spread from computer to computer by attaching itself to a host programs. • It may damage the hardware, software or the information.
  • 5. Worms • A subclass of virus. A worm generally spread without user action and distributes complete copies (possibly modified) of itself across networks. • Can consume memory or networks bandwidth thus causing a computer stop responding. - Because worms don’t need to travel via a “host” program or file, they can also tunnel into your system and allow somebody else to take control of your computer remotely.
  • 6. Trojan horse • Is a program which a user or administrator install on the computer. • Are impostor files that claim to be something desirable but, in fact are malicious. • often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.
  • 7. Viruses How does a virus work? • Virus is a dropped in a program using a dropper. • Software installer onto a computer infecting target files. • Virus lies dormant until it is triggered by the user and event or timer; therefore executing its payload.
  • 8. • Crashing the computer, e.g. with "blue screen of death" (BSOD) • Data corruption, • Formatting disks, destroying all contents • Use of the machine as part of a boot net (e.g. to perform automated spamming or to distribute Denial-of-service attacks). • Electronic money theft • Modification or deletion of files • Using computer resources for mining crypto currency. • Linking computer to Boot net • Using infected computer as proxy for illegal activities and attacks on other computers. Viruses How it does effect to the computer?
  • 9. •The main signs are: * The start up and the responses of your computer become slower than before. * The Control Panel or the My Document folder opens automatically especially after the start-up of the computer. * While changing the background of your desktop, the color changes to default color blue (for Xp) or anything else which you didn't want. * Very often some of your running programs will be non- responsive. If you are able to open the Task Manager, then it will show you that the CPU or RAM usage is very high. * In many times, computer will show windows telling that some of the files are missing from the system files (Generally C drive) and some fatal error may occur. Viruses
  • 10. Viruses 7 Kinds of Viruses • Companion • Executable Program • Memory Resident • Boot Sector • Dives Driver • Macro • Source code
  • 11. Viruses Companions Viruses • Not actually a virus. • Understand Execution -Program.com - Program.exe - Program.bat • Most program today have a extension .exe. • difficult to detect, as anti-virus software tends to use changes in files as clue..
  • 12. Viruses Executable Program Viruses • Overwriting - Overwrites executable program with itself. • Parasitic - Attaches itself to others programs, but allow original function. • Cavity - Hides itself in unused portion of segment (512), exploits internal fragmentation. • a non resident computer virus that stores itself in an executable file and infects other files each time the file is run.
  • 13. Viruses Memory Resident Viruses • A virus that stays in memory after it executes and after its host program is terminated. In contrast, non-memory-resident viruses only are activated when an infected application runs. • Hides - At the top of memory. - Among interrupt vectors. • Can alter RAM bitmap to avoid overwritten. • Captures trap or interrupt vectors. • Saves address to scratch variable. • Executes its own address. • Invokes real system by jumping to saved trap address.
  • 14. Viruses Boot Sector Viruses • Is a computer virus that infects a storage device's master boot record (MBR). It is not mandatory that a boot sector virus successfully boot the victim's PC to infect it. • These viruses copy their infected code either to the floppy disk's boot sector or to the hard disk's partition table. During start-up, the virus gets loaded to the computer's memory. • Such viruses are very common.
  • 15. Viruses Device Driver Viruses • A virus which infiltrates a computer via the device driver software. • The software used to control peripherals such as the keyboard. • Happily only early operating systems such as MSDOS were susceptible to this type of virus. • If a drive is infected, the virus will be run every time the computer restart.
  • 16. Viruses Macro Viruses • Is a computer virus that "infects“ a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. • Used to group several commands to a keystroke. • Attach to menu items..
  • 17. Viruses Source Code Viruses • Are a subset of computer viruses that make modifications to source code located on an infected machine. • A source file can be overwritten such that it includes a call to some malicious code. • Can be very portable. • Are rare, partly due to the difficulty of parsing source code programmatically, but have been reported.
  • 18. DifferencesVirus - attempts to spread from computer to computer by attaching itself. Worm - generally spread without user action and distributes complete copies (possibly modified) of itself across networks. Trojan - may give a hacker remote access to a targeted computer system, operations that could be performed by a hacker.  Some people call any type of malicious software a “computer virus,” but that isn’t accurate. Viruses, Worms, and Trojans horse are different types of malicious software with different behaviors. In particular, they spread themselves in very different way. Malicious software in general is referred to as “malware.” If you want a catch-all term for bad computer software, malware is the word to use.
  • 19. Examples of Viruses • Name: CIH • Aliases : Chernobyl, Space filler • Isolation date: June 1998 • Types: Windows 95/98/Me • Origin: Taiwan • Author: Chen ing - Hau • Note: Activates on April 26, in which it destroys partition tables, and tries to overwrite the BIOS.
  • 20. • Name: Code Red • Aliases: Heart bleed and CRv1 & CRv2 • Types: Server Jamming Worm • Isolation date: January, 2001 • Note: This worm allows the hackers to hack your complete network from the location. The Heart Bleed virus allows hackers to steal data like credit card. Examples of Worms
  • 21. Examples of Trojan horse • Name: Trojan.Flame.A • Aliases: sky Wiper • Types: Windows 7/2000/XP/2003/ME •Isolation date: May 2012 • Note: Can spread to other system over a local network (LAN) or via USB stick and Bluetooth, in which grab screen shot down.
  • 22. Be Careful from the Viruses • Keep your system and software to up date. • Use Anti-virus, firewall and Antispyware solution. • Do not open unsafe attachment. • Keep away from chain letters, spam and ‘too good to be true’ offers. • keep away from dubious web sites. • Beware of receiving files from people in chat rooms. • beware of Hoaxes (do a search for them if suspicious). • Beware of unsafe file sharing programs.