Your SlideShare is downloading. ×
0
All about viruses
All about viruses
All about viruses
All about viruses
All about viruses
All about viruses
All about viruses
All about viruses
All about viruses
All about viruses
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

All about viruses

968

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
968
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
51
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Table of content Introduction Trojan horses Malware Spyware Worms Adware Resources
  • 2. Introduction <ul><li>Viruses are programs that cause damage to computers Trojan Horse is a program which is used to gain access to a computer by installing a program on infected PC to open some backdoor. [Trojans are -also known as Backdoors]. </li></ul><ul><li>Worm is a program which infects the computers which are connected by some network. Worms slow down the network. </li></ul><ul><li>Spywares are the program which are used to monitor/Log the activity performed on a computer. These are used to spy on some one either for legal or illegal purpose. Example: Key logger applications. </li></ul><ul><li>Adware are the programs which delivers ads to your computer (generally in POP-UP's form). They consume your network. </li></ul><ul><li>Malwares are the program with malicious intention. It can be damaging your computer, spying on you or any other malicious task . </li></ul><ul><li>Home </li></ul>
  • 3. Viruses <ul><li>Viruses are programs that can replicate itself and it can spread from one computer to another. </li></ul><ul><li>The first virus was called “The Creeper Virus” (TCV). </li></ul><ul><li>The Creeper virus was created by Bob Thomas as BBN technology </li></ul><ul><li> Home </li></ul>
  • 4. Trojan horses <ul><li>Are programs that pretend to be something else such as recycle bin </li></ul><ul><li>It can be received as a perfectly legal E-mail </li></ul><ul><li>It can be a photo or a game </li></ul><ul><li>A fourth type can be a file that delete an important system file and replace it and this slows the computer </li></ul><ul><li>Famous example is the “Slavebot” </li></ul><ul><li>Trojan horses this type of viruses has a relationship with worms and it help it traveling from one computer to another </li></ul><ul><li>This type of viruses allow hackers to remotely access computers (back door it) </li></ul><ul><ul><ul><ul><ul><li> Home </li></ul></ul></ul></ul></ul>
  • 5. Worms <ul><li>It computer self replicated program (differ than Viruses that they need internet access </li></ul><ul><li>It send a copy of it self to other nods ( computer networks </li></ul><ul><li>One of the famous anti- worms programs is “Lion strong security” </li></ul><ul><li>Worms slow computers by replicating it self in the memory and creating junk files that are similar to windows files </li></ul><ul><ul><ul><ul><ul><li>Home </li></ul></ul></ul></ul></ul>
  • 6. Spyware <ul><li>Spyware  is a type of  malware  that can be installed on computers, and which collects small pieces of information about users without their knowledge. </li></ul><ul><li>The first use of spyware was on Oct/16 th /1995 when Microsoft had a presentation of a business model, on that day newspapers announce that Microsoft failed in protecting there work </li></ul><ul><li>Spyware wasn’t known and it was considered as a virus until 2005 when it attacked again. </li></ul><ul><li>Norton anti-virus created there first products to protect users from this type of viruses </li></ul><ul><li>Commonly used in survey as a data collector </li></ul><ul><li> Home </li></ul>
  • 7. Adware <ul><li>Adware or Advertising supporting software is a program that automatically plays an advertisement or download another program without being asked to </li></ul><ul><li>Some adware can be classified as a spywares or malware </li></ul><ul><li>Programs have been developed to detect, quarantine, and remove spyware, including Ad-Aware, Malware bytes Anti-Malware, Spyware Doctor and Spybot - Search & Destroy In addition, almost all commercial Anti viruses software currently detect adware and spyware, or offer a separate spyware detection package </li></ul><ul><li>Best anti adware is Bitdefender </li></ul><ul><li>Home </li></ul>
  • 8. Malware <ul><li>Malware is short for malicious software </li></ul><ul><li>Malware was designed in 1996 </li></ul><ul><li>Malware is designed basically to deny operations </li></ul><ul><li>All of Trojan horse, Worms, Adware, Spyware are all Malwares </li></ul><ul><li>Malwares examples are key gens and hacking programs such as (Beast and Sub 7) </li></ul><ul><li>Some malwares contains routines to defend itself against removal this known as root kits </li></ul><ul><li>Malwares are advance way of hacking and breaking codes it can be solved using Malware bytes Anti-Malware PRO </li></ul><ul><li>Microsoft claims that it encrypted there files to prevent rapid format because of malwares but they didn’t, what they did is renaming “system32” and “system64” files to “WINDOWSx86” and “WINDOWSx64” Home </li></ul>
  • 9. Resources <ul><li>http://en.wikipedia.org/wiki/Malware </li></ul><ul><li>http://www.webopedia.com/TERM/A/adware.html </li></ul><ul><li>http://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htm </li></ul><ul><li>http://en.wikipedia.org/wiki/Spyware </li></ul><ul><li>http://searchsecurity.techtarget.com/definition/Trojan-horse </li></ul><ul><li>http://en.wikipedia.org/wiki/Virus </li></ul><ul><li> Home </li></ul>
  • 10. Done by: Just buy an apple

×