SlideShare a Scribd company logo
1 of 22
Computer Viruses and
Worms
Types of Infection
VIRUSES
E-MAIL VIRUSES
WORMS
TROJAN
HORSES
What are Viruses?
A computer virus is a computer program that can
copy itself and infect a computer without
permission or knowledge of the user.
WORMS
Small piece of software that uses computer
networks and security holes to replicate itself.
Copy of the worm scans the network for another
machine that has a specific security hole.
Copy itself to the new machine using the security
hole and start replicating.
Example “CODE RED”, “Bubbleboy”.
Difference between Virus
and Worm
 The difference between a worm and a
virus is that a virus does not have a
propagation vector. i.e., it will only effect
one host and does not propagate to other
hosts.
 Worms propagate and infect other
computers. Majority of threats are actually
worms that propagate to other hosts.
E-mail Viruses
Moves around in e-mail messages
Usually replicate itself by automatically
mailing itself to dozens of people in the
victim’s email address book.
Example “MELISSA VIRUS”
Example “I LOVE YOU VIRUS”
Trojan Horse
A simple computer
program
It claim to be a game
Erase your hard disk
No way to replicate itself.
Types of Viruses
File infector virus
 Infect program files
Boot sector virus
 Infect the system area of a disk
Master boot record virus
 infect disks in the same manner as boot sector viruses. The difference between
these two virus types is where the viral code is located.
Multi-partite virus
 infect both boot records and program files
Macro virus
 infect data files. Examples: Microsoft Office Word, Excel,
PowerPoint and Access files
Melissa Virus (March 1999)
Melissa virus spread in Microsoft Word
documents sent via e-mail.
How it works ?
Created the virus as word document
Uploaded to an internet newsgroup
Anyone who download the document and
opened it would trigger the virus.
Send friendly email messages to first 50
people in person’s address book.
Melissa Virus
 Melissa Virus was the fastest spreading
virus ever seen.
Forced a number of large companies to
shut down their e-mail systems.
I Love You Virus
(May,2000)
Contained a piece of code as an
attachment.
Double Click on the attachment triggered
the code.
Sent copies of itself to everyone in the
victim’s address book
Started corrupting files on the victim’s
machine.
Code Red (Worm)
Code Red made huge headlines in 2001
It slowed down internet traffic when it
began to replicate itself.
Each copy of the worm scanned the
internet for Windows NT or Windows 2000
that don’t have security patch installed.
Each time it found an unsecured server,
the worm copied itself to that server.
Code Red Worm
Designed to do three things
 Replicate itself for the first 20 days of
each month.
 Replace web pages on infected servers
with a page that declares “Hacked by
Chinese”
 Launch a concreted attack on the White
House Web server
Worms
How Bubbleboy works
Bubbleboy is embedded within an email message of
HTML format.
a VbScript while the user views a HTML page
a file named “Update.hta” is placed in the start up
directory
upon reboot Bubbleboy executes
Symptoms of Virus Attack
Computer runs slower then usual
Computer no longer boots up
Screen sometimes flicker
PC speaker beeps periodically
System crashes for no reason
Files/directories sometimes disappear
Denial of Service (DoS)
•Internet
•Router
•Firewall
•Switches
•Servers
•Workstations
•Desktop
•Mobile
•Remote Access
•Dial-in
•VPN
•Internet
•Router
•Firewall
•Switches
•Servers
•Workstations
•Desktop
•Mobile
•Remote Access
•Dial-in
•VPN
•Vulnerable
Areas
Why do people do it ?
For some people creating viruses seems
to be thrill.
Thrill of watching things blow up.
To show how sophisticated and
interconnected human beings have
become.
To show loopholes in system.
Protection Measures
Always update your anti-virus software at
least weekly.
Back up your important files and ensure
that they can be restored.
Change the computer's boot sequence to
always start the PC from its hard drive
Don't share Drive C: without a password
and without read-only restrictions.
Protection Measures
Empty floppy drives of diskettes before
turning on computers, especially laptops.
Forget opening unexpected e-mail
attachments, even if they're from friends
Get trained on your computer's anti-virus
software and use it.
Have multiple backups of important files.
This lowers the chance that all are
infected.
Anti-Virus, The Conqueror
•Network
Associates/McAfee
•Symantec/Norton
•Trend Micro
• AVG
•Panda
•Sophos
Conclusion
You know know more about virus and how:
viruses work through your system
to make a better virus
Have seen how viruses show us a loophole in
popular software
Most viruses show that they can cause great
damage due to loopholes in programming
•PRIYANGI- 13
•SEJAL -21
•SALONI -51
•SHAGUN -52

More Related Content

What's hot

Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virusHuma Tariq
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Computer virus
Computer virusComputer virus
Computer viruskiran_a_c
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)itgsabc
 

What's hot (20)

Virus
Virus  Virus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Chapter iv computer virus
Chapter iv  computer virusChapter iv  computer virus
Chapter iv computer virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Malware programs
Malware programsMalware programs
Malware programs
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Viruses
VirusesViruses
Viruses
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer virus
Computer virusComputer virus
Computer virus
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
 
Virus
VirusVirus
Virus
 

Viewers also liked

Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)Tejas Kolge
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsVi Tính Hoàng Nam
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
OPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATIONOPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATIONRitwick Halder
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

Viewers also liked (12)

Virus and worms analysis
Virus and worms analysisVirus and worms analysis
Virus and worms analysis
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)
 
Viruses
VirusesViruses
Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
OPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATIONOPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATION
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 

Similar to VIRUSES AND ANTI-VIRUSES (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus.pptx
Computer Virus.pptxComputer Virus.pptx
Computer Virus.pptx
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus
VirusVirus
Virus
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 

Recently uploaded

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 

Recently uploaded (20)

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 

VIRUSES AND ANTI-VIRUSES

  • 2. Types of Infection VIRUSES E-MAIL VIRUSES WORMS TROJAN HORSES
  • 3. What are Viruses? A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.
  • 4. WORMS Small piece of software that uses computer networks and security holes to replicate itself. Copy of the worm scans the network for another machine that has a specific security hole. Copy itself to the new machine using the security hole and start replicating. Example “CODE RED”, “Bubbleboy”.
  • 5. Difference between Virus and Worm  The difference between a worm and a virus is that a virus does not have a propagation vector. i.e., it will only effect one host and does not propagate to other hosts.  Worms propagate and infect other computers. Majority of threats are actually worms that propagate to other hosts.
  • 6. E-mail Viruses Moves around in e-mail messages Usually replicate itself by automatically mailing itself to dozens of people in the victim’s email address book. Example “MELISSA VIRUS” Example “I LOVE YOU VIRUS”
  • 7. Trojan Horse A simple computer program It claim to be a game Erase your hard disk No way to replicate itself.
  • 8. Types of Viruses File infector virus  Infect program files Boot sector virus  Infect the system area of a disk Master boot record virus  infect disks in the same manner as boot sector viruses. The difference between these two virus types is where the viral code is located. Multi-partite virus  infect both boot records and program files Macro virus  infect data files. Examples: Microsoft Office Word, Excel, PowerPoint and Access files
  • 9. Melissa Virus (March 1999) Melissa virus spread in Microsoft Word documents sent via e-mail. How it works ? Created the virus as word document Uploaded to an internet newsgroup Anyone who download the document and opened it would trigger the virus. Send friendly email messages to first 50 people in person’s address book.
  • 10. Melissa Virus  Melissa Virus was the fastest spreading virus ever seen. Forced a number of large companies to shut down their e-mail systems.
  • 11. I Love You Virus (May,2000) Contained a piece of code as an attachment. Double Click on the attachment triggered the code. Sent copies of itself to everyone in the victim’s address book Started corrupting files on the victim’s machine.
  • 12. Code Red (Worm) Code Red made huge headlines in 2001 It slowed down internet traffic when it began to replicate itself. Each copy of the worm scanned the internet for Windows NT or Windows 2000 that don’t have security patch installed. Each time it found an unsecured server, the worm copied itself to that server.
  • 13. Code Red Worm Designed to do three things  Replicate itself for the first 20 days of each month.  Replace web pages on infected servers with a page that declares “Hacked by Chinese”  Launch a concreted attack on the White House Web server
  • 14. Worms How Bubbleboy works Bubbleboy is embedded within an email message of HTML format. a VbScript while the user views a HTML page a file named “Update.hta” is placed in the start up directory upon reboot Bubbleboy executes
  • 15. Symptoms of Virus Attack Computer runs slower then usual Computer no longer boots up Screen sometimes flicker PC speaker beeps periodically System crashes for no reason Files/directories sometimes disappear Denial of Service (DoS)
  • 17. Why do people do it ? For some people creating viruses seems to be thrill. Thrill of watching things blow up. To show how sophisticated and interconnected human beings have become. To show loopholes in system.
  • 18. Protection Measures Always update your anti-virus software at least weekly. Back up your important files and ensure that they can be restored. Change the computer's boot sequence to always start the PC from its hard drive Don't share Drive C: without a password and without read-only restrictions.
  • 19. Protection Measures Empty floppy drives of diskettes before turning on computers, especially laptops. Forget opening unexpected e-mail attachments, even if they're from friends Get trained on your computer's anti-virus software and use it. Have multiple backups of important files. This lowers the chance that all are infected.
  • 21. Conclusion You know know more about virus and how: viruses work through your system to make a better virus Have seen how viruses show us a loophole in popular software Most viruses show that they can cause great damage due to loopholes in programming