SlideShare une entreprise Scribd logo
1  sur  17
Computer
Viruses
What is a Computer Virus?
 A computer virus is a computer program that
can copy itself and infect a computer without the
permission or knowledge of the owner.
 One of the first detected virus was the Creeper
virus in the early 70’s
 Before computer networks became widespread,
most viruses spread on removable media,
particularly floppy disk.
Basic Computer Viruses
 Trojan Horses
 appears as interesting program file but when
installed it allows intruders to access and read your
files
 Worms
 virus that copies and multiplies itself by
using computer networks and security
flaws
 E-mail Viruses
 use e-mail messages to spread which allow it to
automatically forward itself to thousands of people
Types of Viruses
 Boot Sector Virus
 Infects the boot or Master Boot record (MBR) , contains info
about the drive and the bootstrap loader of diskettes and hard
drives through the sharing of infected disks and pirated software
applications
 Once your hard drive is infected all diskettes that you use in your
computer will be infected
 Program Virus
 Becomes active when the program file (usually with extensions
.BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened
 It then makes copies of itself and will infect other programs on
the computer
 Multipartite Virus
 Hybrid of a Boot Sector and Program viruses
 It infects program files and when the infected program is active it
will affect the boot record
Types of Viruses
 Stealth Virus
 Disguises itself to prevent from being detected by antivirus
software
 It alters its file size or conceals itself in memory
 Polymorphic Virus
 Act like a chameleon, changing its virus signature (binary
pattern) every time it multiples and infects a new file
 Macro Virus
 Programmed as a macro embedded in a document, usually
found in Microsoft Word and Excel
 Once it gets in to your computer, every document you produce
will become infected
 Relatively new type of virus and may slip by your antivirus
software if you don't have the most recent version installed
Signs Your Computer is Infected
 Functions slower than
normal
 Responds slowly and
freezes often
 Restarts itself often
 See uncommon error
messages, distorted
menus, and dialog boxes
 Notice applications fail to
work correctly
 Fail to print correctly
 First half of the 70'Late 60,s, early 70,s- "Rabbits" cloned
themselves occupied system resources, slowing down the productivity.
 -"The Creeper" capable of entering a network by itself and transferring a
copy of itself to the system.
 Early 80,s-Increasing number of programs written by individuals not by
software companies. Programs caused miner viruses called "Trojan horses".
 1986'Brain virus' - by Amjad and Basit Farooq Alvi.
- spread through floppy disks,
- infected boot records and not computer hard drives
 Lahore, Pakistani Brain, Brain-A and UIUC virus
-took over free space on the floppy disk and hid from detection
”disguised itself by displaying the uninfected boot sector on the disk.”
 1987-Lehigh virus
- the first memory resident file infector that attacked executable files and
took control when a file was opened
 The Jerusalem Virus
-had bugs that re-infected programs that were already infected
 1988: Robert Morris made a worm that invaded ARPANET computers
- disabled 6,000 computers on the network by overflowing their memory banks
with copies of itself
 1991: Norton Anti-Virus software
 1999: "Melissa" virus
-infected thousands of computers very fast by sending copies of itself to 50
names in the address book on Outlook e-mail
- Led to an estimated $80 million in damage and record sales of anti-virus
products.
 2000: "I Love You" virus
-was sent by email and infected 10 % of computers in only one day
-created by a young Filipino computer student who did not get punished
because then the Philippines had no laws against hacking which led to the
European Union's global Cybercrime Treaty.
 2001: "Nimda" virus (days after 9/11)
-had 5 ways of infecting systems
 2004
 MyDoom spreads through emails and file-sharing software faster
than any previous virus or worm.
 Allows hackers to access the hard drive of the infected computer.
 An estimated one million computers running Windows are
affected by the fast-spreading Sasser computer worm.
 The worm does not cause irreparable harm to computers or data,
but it does slow computers and cause some to quit or reboot without
explanation.
 2006
 Discovery of the first-ever malware trojan horse for Mac OS X
 2008
 Torpig is a Trojan horse which affects Windows, turning off anti-
virus applications.
 It allows others to access the computer, modifies data, steals
confidential information and installs malware on the victim's
computer.
 2009
 Conficker infects anywhere from 9 to 15 million Microsoft server
systems.
 French air force, Royal Navy warships and submarines,
Sheffield Hospital network, UK Ministry of Defence, German
Bundeswehr and Norwegian Police were all affected.
Total Number of Viruses by year
January 1985 1
January 1985 1
January 1987 3
January 1989 6
January 1990 142
January 1991 357
January 1992 1,161
January 1993 2,482
January 1994 3,687
January 1995 5,626
January 1996 7,764
January 1997 11,037
January 1998 16,726
January 1999 40,850
January 2000 44,000
January 2001 48,000
January 2002 55,000
January 2003 62,000
Melissa
 Another virus that fired up the media was Melissa, a Word macro
virus.
 When people received the host Word document via email and
opened it, the virus sent a copy of itself to the first 50 people in the
victim's address book.
 Named after a topless dancer in Florida, the Melissa virus crashed
the email servers of corporations and governments in different
spots around the world.
 The Computer Emergency Response Team, set up after Robert
Morris mucked up the Internet with his worm in 1988, estimated that
the virus hit 100,000 computers in its first weekend.
 David L. Smith posted the infected file to an alt.sex usenet group
using a stolen AOL account. Initially he entered a plea of
innocence, but after being confronted with a maximum sentence of
40 years in prison, he eventually pled guilty and received a much-
reduced sentence.
Love You, Love Bug
 By almost any measure, the so-called Love Bug was the most
damaging and costly virus ever. I don't know who comes up
with these whack figures, but according to Reuters the bug
cost the world $15 billion in lost productivity.
 The Love Bug spread far faster than Melissa. Unlike Melissa,
it would mail itself to everyone in your Outlook address book
-- most of whom would probably be delighted to read about
how you love them -- not just the first fifty. Moreover, it would
gobble up certain media files stored on your hard drive.
Did you know?
 One German newspaper
tragically lost 2,000
pictures from its archive.
 The perpetrator turned out
to be a 23-year-old Filipino
computer science student
who more or less
plagiarized all of his code.
 The lack of laws in the
Philippines covering
computer crimes, he pretty
much got away with his
crime.
Prevention
 Upload and use antivirus
software
 Be aware of the e-mails
and attachments you
open
 Check for updates on
antivirus software
regularly
 Make sure antivirus
software is installed
correctly
Sources
http://www.tech-faq.com/history-of-computer-viruses.shtml
http://spamlaws.com/history.html
http://en.wikipedia.org/wiki/Computer_virus#History
http://www.infoplease.com/ipa/A0872842.html
References
http://www.spamlaws.com/protect.html
http://www.spamlaws.com/virus-types.html
http://www.spamlaws.com/virus-comtypes.html
http://www.spamlaws.com/federal/index.shtml
http://www.spamlaws.com/virus-types.html
Wikipedia
www.suggestafix.com
www.microsoft.com

Contenu connexe

Tendances

Computer viruses
Computer virusesComputer viruses
Computer viruses
shopnil786
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
qwertyf
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
nasya
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
drewz lin
 
Computer worm
Computer wormComputer worm
Computer worm
zelkan19
 

Tendances (20)

Virus
Virus  Virus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Melissa Virus
Melissa VirusMelissa Virus
Melissa Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Melissa Virus
Melissa VirusMelissa Virus
Melissa Virus
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
 
Viruses
VirusesViruses
Viruses
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
εργασια
εργασιαεργασια
εργασια
 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
 
Computer worm
Computer wormComputer worm
Computer worm
 
Viruses
VirusesViruses
Viruses
 

Similaire à computer virus with full detail

10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
 

Similaire à computer virus with full detail (20)

Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Ransomware
RansomwareRansomware
Ransomware
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
The 15 deadliest computer viruses
The 15 deadliest computer virusesThe 15 deadliest computer viruses
The 15 deadliest computer viruses
 

Plus de sonykhan3

Plus de sonykhan3 (14)

Algorithms and Data Structures
Algorithms and Data StructuresAlgorithms and Data Structures
Algorithms and Data Structures
 
computer visions with full detail
computer visions with full detail computer visions with full detail
computer visions with full detail
 
Deep learning-smaller neural network
Deep learning-smaller neural networkDeep learning-smaller neural network
Deep learning-smaller neural network
 
introduction to deep Learning with full detail
introduction to deep Learning with full detailintroduction to deep Learning with full detail
introduction to deep Learning with full detail
 
Input output devices
Input output devicesInput output devices
Input output devices
 
Information system and its types
Information system and its typesInformation system and its types
Information system and its types
 
Generation of computers
Generation of computersGeneration of computers
Generation of computers
 
Database management system
Database management systemDatabase management system
Database management system
 
Computer software and operating system
Computer software and operating systemComputer software and operating system
Computer software and operating system
 
computer language with full detail
computer language with full detail computer language with full detail
computer language with full detail
 
computer networking slides with full detail
computer  networking slides with full detailcomputer  networking slides with full detail
computer networking slides with full detail
 
common computer terminology
common computer terminologycommon computer terminology
common computer terminology
 
Introduction to Computer System
Introduction to Computer System Introduction to Computer System
Introduction to Computer System
 
Information Security
Information SecurityInformation Security
Information Security
 

Dernier

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Dernier (20)

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 

computer virus with full detail

  • 2. What is a Computer Virus?  A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner.  One of the first detected virus was the Creeper virus in the early 70’s  Before computer networks became widespread, most viruses spread on removable media, particularly floppy disk.
  • 3. Basic Computer Viruses  Trojan Horses  appears as interesting program file but when installed it allows intruders to access and read your files  Worms  virus that copies and multiplies itself by using computer networks and security flaws  E-mail Viruses  use e-mail messages to spread which allow it to automatically forward itself to thousands of people
  • 4. Types of Viruses  Boot Sector Virus  Infects the boot or Master Boot record (MBR) , contains info about the drive and the bootstrap loader of diskettes and hard drives through the sharing of infected disks and pirated software applications  Once your hard drive is infected all diskettes that you use in your computer will be infected  Program Virus  Becomes active when the program file (usually with extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened  It then makes copies of itself and will infect other programs on the computer  Multipartite Virus  Hybrid of a Boot Sector and Program viruses  It infects program files and when the infected program is active it will affect the boot record
  • 5. Types of Viruses  Stealth Virus  Disguises itself to prevent from being detected by antivirus software  It alters its file size or conceals itself in memory  Polymorphic Virus  Act like a chameleon, changing its virus signature (binary pattern) every time it multiples and infects a new file  Macro Virus  Programmed as a macro embedded in a document, usually found in Microsoft Word and Excel  Once it gets in to your computer, every document you produce will become infected  Relatively new type of virus and may slip by your antivirus software if you don't have the most recent version installed
  • 6. Signs Your Computer is Infected  Functions slower than normal  Responds slowly and freezes often  Restarts itself often  See uncommon error messages, distorted menus, and dialog boxes  Notice applications fail to work correctly  Fail to print correctly
  • 7.
  • 8.  First half of the 70'Late 60,s, early 70,s- "Rabbits" cloned themselves occupied system resources, slowing down the productivity.  -"The Creeper" capable of entering a network by itself and transferring a copy of itself to the system.  Early 80,s-Increasing number of programs written by individuals not by software companies. Programs caused miner viruses called "Trojan horses".  1986'Brain virus' - by Amjad and Basit Farooq Alvi. - spread through floppy disks, - infected boot records and not computer hard drives  Lahore, Pakistani Brain, Brain-A and UIUC virus -took over free space on the floppy disk and hid from detection ”disguised itself by displaying the uninfected boot sector on the disk.”  1987-Lehigh virus - the first memory resident file infector that attacked executable files and took control when a file was opened  The Jerusalem Virus -had bugs that re-infected programs that were already infected
  • 9.  1988: Robert Morris made a worm that invaded ARPANET computers - disabled 6,000 computers on the network by overflowing their memory banks with copies of itself  1991: Norton Anti-Virus software  1999: "Melissa" virus -infected thousands of computers very fast by sending copies of itself to 50 names in the address book on Outlook e-mail - Led to an estimated $80 million in damage and record sales of anti-virus products.  2000: "I Love You" virus -was sent by email and infected 10 % of computers in only one day -created by a young Filipino computer student who did not get punished because then the Philippines had no laws against hacking which led to the European Union's global Cybercrime Treaty.  2001: "Nimda" virus (days after 9/11) -had 5 ways of infecting systems
  • 10.  2004  MyDoom spreads through emails and file-sharing software faster than any previous virus or worm.  Allows hackers to access the hard drive of the infected computer.  An estimated one million computers running Windows are affected by the fast-spreading Sasser computer worm.  The worm does not cause irreparable harm to computers or data, but it does slow computers and cause some to quit or reboot without explanation.  2006  Discovery of the first-ever malware trojan horse for Mac OS X  2008  Torpig is a Trojan horse which affects Windows, turning off anti- virus applications.  It allows others to access the computer, modifies data, steals confidential information and installs malware on the victim's computer.  2009  Conficker infects anywhere from 9 to 15 million Microsoft server systems.  French air force, Royal Navy warships and submarines, Sheffield Hospital network, UK Ministry of Defence, German Bundeswehr and Norwegian Police were all affected.
  • 11. Total Number of Viruses by year January 1985 1 January 1985 1 January 1987 3 January 1989 6 January 1990 142 January 1991 357 January 1992 1,161 January 1993 2,482 January 1994 3,687 January 1995 5,626 January 1996 7,764 January 1997 11,037 January 1998 16,726 January 1999 40,850 January 2000 44,000 January 2001 48,000 January 2002 55,000 January 2003 62,000
  • 12. Melissa  Another virus that fired up the media was Melissa, a Word macro virus.  When people received the host Word document via email and opened it, the virus sent a copy of itself to the first 50 people in the victim's address book.  Named after a topless dancer in Florida, the Melissa virus crashed the email servers of corporations and governments in different spots around the world.  The Computer Emergency Response Team, set up after Robert Morris mucked up the Internet with his worm in 1988, estimated that the virus hit 100,000 computers in its first weekend.  David L. Smith posted the infected file to an alt.sex usenet group using a stolen AOL account. Initially he entered a plea of innocence, but after being confronted with a maximum sentence of 40 years in prison, he eventually pled guilty and received a much- reduced sentence.
  • 13. Love You, Love Bug  By almost any measure, the so-called Love Bug was the most damaging and costly virus ever. I don't know who comes up with these whack figures, but according to Reuters the bug cost the world $15 billion in lost productivity.  The Love Bug spread far faster than Melissa. Unlike Melissa, it would mail itself to everyone in your Outlook address book -- most of whom would probably be delighted to read about how you love them -- not just the first fifty. Moreover, it would gobble up certain media files stored on your hard drive.
  • 14. Did you know?  One German newspaper tragically lost 2,000 pictures from its archive.  The perpetrator turned out to be a 23-year-old Filipino computer science student who more or less plagiarized all of his code.  The lack of laws in the Philippines covering computer crimes, he pretty much got away with his crime.
  • 15. Prevention  Upload and use antivirus software  Be aware of the e-mails and attachments you open  Check for updates on antivirus software regularly  Make sure antivirus software is installed correctly