Your SlideShare is downloading. ×
Virus trojanworm
Virus trojanworm
Virus trojanworm
Virus trojanworm
Virus trojanworm
Virus trojanworm
Virus trojanworm
Virus trojanworm
Virus trojanworm
Virus trojanworm
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Virus trojanworm

94

Published on

Virus Trojan Worm

Virus Trojan Worm

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
94
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need toattach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost alwayscorrupt or modify files on a targeted computer. Its Kind of like a virus, but not exactly.
  • 2. • Each day, worms are becoming a more common occurrence on the Internet. As the incidents increase, we must be thinking proactively in order to lessen the negative effects these worms have on the Internet community. It is important to remember that the livelihood of many businesses is based on an Internet presence. The monetary losses incurred by businesses relating to these worms are hard to measure. Some estimate losses for each occurrence to be around $1 billion. 1 The true value of damages may never be known.
  • 3. • Viruses can occur in games of all sort, people can find you username and search you on Google> or if you have an instagram!!!!!! if your following them, they can search you on Google and find out where you live, so dont put your location!!
  • 4. • A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses.
  • 5. • Viruses can cause computer "break downs" which can turn off your computer completely, this can be caused by people or random links that cause viruses! People can hack your computer when your logged on to FaceBook, Twitter etc.. and hack your account so they can your pictures if you keep it private, some people can stalk you until you leave so they can get to the computer and cause a virus so they "own" your computer!
  • 6. • Your system will suddenly slow down.• You will see activity on your screen that you did not cause.• Data files become corrupted or are missing.• Unexpected changes to the content of files.• The program doesn’t run or it functions incorrectly.• Certain features aren’t available anymore.
  • 7. • A Trojan horse, or Trojan, is a malicious application that masquerades as a legitimate file or helpful program but whose real purpose is, for example, to grant a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive-by-downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek Mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.
  • 8. • 1: Microsoft Process Explorer is an excellent way to determine it!!• 2: Trend Micro’s HiJackThis• 3: Kaspersky’s GetSystemInfo• 4:Microsoft Baseline Security Analyzer• 5: Secunia inspection scanners• 6: Antivirus Programs• 7: Microsoft’s malicious Software Removal Tool• 8: SUPERAntiSpyware• 9: Malwarebyte’s Anti- Malware• 10: GMER
  • 9. Definitions…• GMER: An application that detects and removes rootkits.• Masquerades: IPMASQ or MASQ are other names for this. allows one or more computers in a network without assigned IP addresses to communicate with the Internet using the Linux server’s assigned IP address.• IP: Internet protocol, the method by which information is sent between any two computers on the Internet.
  • 10. Definitions…• GMER: An application that detects and removes rootkits.• Masquerades: IPMASQ or MASQ are other names for this. allows one or more computers in a network without assigned IP addresses to communicate with the Internet using the Linux server’s assigned IP address.• IP: Internet protocol, the method by which information is sent between any two computers on the Internet.

×