SlideShare a Scribd company logo
1 of 22
By Mr UV




Computer Viruses and Worms
Definition of Virus
Computer Virus Timeline
Worms
History of Worms
   The first worm to attract wide attention, the
    Morris worm, was written by Robert Tappan
    Morris, who at the time was a graduate
    student at Cornell University.
   It was released on November 2, 1988
   Morris himself was convicted under the US
    Computer Crime and Abuse Act and received
    three years probation, community service and
    a fine in excess of $10,000.
Worms…
   Worms – is a small piece of software that
    uses computer networks and security holes to
    replicate itself. A copy of the worm scans the
    network for another machine that has a
    specific security hole. It copies itself to the
    new machine using the security hole, and
    then starts replicating from there, as well.
   They are often designed to exploit the file
    transmission capabilities found on many
    computers.
Zombies






Typical things that some current
Personal Computer (PC) viruses do
Typical things that some current
Personal Computer (PC) viruses do
Distributed Denial of
       Service
How it works?
MyDoom
   27 January: SCO Group offers a US $250,000
    reward for information leading to the arrest of the
    worm's creator.
   1 February: An estimated one million computers
    around the world infected with MyDoom begin
    the virus's massive distributed denial of service
    attack—the largest such attack to date.
   2 February: The SCO Group moves its site to
    www.thescogroup.com.
 Traditional Viruses
 pieces of code attached to a legitimate
  program
 run when the legitimate program gets
  executed
 loads itself into memory and looks around
  to see if it can find any other programs on
  the disk
 Traditional Virus
 infect the boot sector on floppy disks and
  hard disks
 By putting its code in the boot sector, a
  virus can guarantee it gets executed
 load itself into memory immediately, and it
  is able to run whenever the computer is on
Decline of traditional viruses
   Reasons:
    – Huge size of today’s programs storing on a
      compact disk
    – Operating systems now protect the boot
      sector
E-mail Viruses
 Moves around in e-mail messages
 Replicates itself by automatically mailing
  itself to dozens of people in the victim’s e-mail
  address book
 Example: Melissa virus, ILOVEYOU virus
   March 1999
   the Melissa virus was the fastest-spreading virus
    ever seen
   Someone created the virus as a Word document
    uploaded to an Internet newsgroup
   People who downloaded the document and opened
    it would trigger the virus
   The virus would then send the document in an e-
    mail message to the first 50 people in the person's
    address book
Melissa virus
   Took advantage of the programming
    language built into Microsoft Word called
    VBA (Visual Basic for Applications)
Prevention
 Updates
 Anti-Viruses
 More secure operating systems
  e.g. UNIX
Reference
   http://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gif
   http://www.factmonster.com/ipka/A0872842.html
    http://www.faqs.org/faqs/computer-virus/new-users/
   http://www.mines.edu/academic/computer/viri-sysadmin.htm

More Related Content

What's hot

Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingmentcheauyih
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and preventionCholo Legisma
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and preventionCholo Legisma
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spreadwenxin
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Spreading virus
Spreading virusSpreading virus
Spreading virusdixitas
 
Guarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.SivakumarGuarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.SivakumarSivakumar R D .
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 

What's hot (20)

Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and prevention
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and prevention
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 
Guarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.SivakumarGuarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.Sivakumar
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 

Viewers also liked

Viewers also liked (6)

Virus and worms analysis
Virus and worms analysisVirus and worms analysis
Virus and worms analysis
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 

Similar to Viruses (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Virus09
Virus09Virus09
Virus09
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Virus
Virus  Virus
Virus
 

More from yuvan80

Angles and shapes
Angles and shapesAngles and shapes
Angles and shapesyuvan80
 
Area and perimeter_10_r5
Area and perimeter_10_r5Area and perimeter_10_r5
Area and perimeter_10_r5yuvan80
 
Presentation guide
Presentation guidePresentation guide
Presentation guideyuvan80
 
Impact of ict
Impact of ictImpact of ict
Impact of ictyuvan80
 
Antivirus
AntivirusAntivirus
Antivirusyuvan80
 
Network topology year 9 week 6
Network topology year 9 week 6Network topology year 9 week 6
Network topology year 9 week 6yuvan80
 
Network yr 7 week 6
Network yr 7 week 6Network yr 7 week 6
Network yr 7 week 6yuvan80
 
Social networking
Social networkingSocial networking
Social networkingyuvan80
 
Starting graph
Starting graphStarting graph
Starting graphyuvan80
 

More from yuvan80 (11)

Angles and shapes
Angles and shapesAngles and shapes
Angles and shapes
 
Area and perimeter_10_r5
Area and perimeter_10_r5Area and perimeter_10_r5
Area and perimeter_10_r5
 
Network
NetworkNetwork
Network
 
Presentation guide
Presentation guidePresentation guide
Presentation guide
 
Impact of ict
Impact of ictImpact of ict
Impact of ict
 
Antivirus
AntivirusAntivirus
Antivirus
 
Network topology year 9 week 6
Network topology year 9 week 6Network topology year 9 week 6
Network topology year 9 week 6
 
Network yr 7 week 6
Network yr 7 week 6Network yr 7 week 6
Network yr 7 week 6
 
Social networking
Social networkingSocial networking
Social networking
 
Basic 2
Basic 2Basic 2
Basic 2
 
Starting graph
Starting graphStarting graph
Starting graph
 

Recently uploaded

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Recently uploaded (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Viruses

  • 1. By Mr UV Computer Viruses and Worms
  • 4.
  • 6. History of Worms  The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University.  It was released on November 2, 1988  Morris himself was convicted under the US Computer Crime and Abuse Act and received three years probation, community service and a fine in excess of $10,000.
  • 7. Worms…  Worms – is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.  They are often designed to exploit the file transmission capabilities found on many computers.
  • 9. Typical things that some current Personal Computer (PC) viruses do
  • 10. Typical things that some current Personal Computer (PC) viruses do
  • 14. 27 January: SCO Group offers a US $250,000 reward for information leading to the arrest of the worm's creator.  1 February: An estimated one million computers around the world infected with MyDoom begin the virus's massive distributed denial of service attack—the largest such attack to date.  2 February: The SCO Group moves its site to www.thescogroup.com.
  • 15.  Traditional Viruses  pieces of code attached to a legitimate program  run when the legitimate program gets executed  loads itself into memory and looks around to see if it can find any other programs on the disk
  • 16.  Traditional Virus  infect the boot sector on floppy disks and hard disks  By putting its code in the boot sector, a virus can guarantee it gets executed  load itself into memory immediately, and it is able to run whenever the computer is on
  • 17. Decline of traditional viruses  Reasons: – Huge size of today’s programs storing on a compact disk – Operating systems now protect the boot sector
  • 18. E-mail Viruses  Moves around in e-mail messages  Replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail address book  Example: Melissa virus, ILOVEYOU virus
  • 19. March 1999  the Melissa virus was the fastest-spreading virus ever seen  Someone created the virus as a Word document uploaded to an Internet newsgroup  People who downloaded the document and opened it would trigger the virus  The virus would then send the document in an e- mail message to the first 50 people in the person's address book
  • 20. Melissa virus  Took advantage of the programming language built into Microsoft Word called VBA (Visual Basic for Applications)
  • 21. Prevention  Updates  Anti-Viruses  More secure operating systems e.g. UNIX
  • 22. Reference  http://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gif  http://www.factmonster.com/ipka/A0872842.html http://www.faqs.org/faqs/computer-virus/new-users/  http://www.mines.edu/academic/computer/viri-sysadmin.htm