Your SlideShare is downloading. ×
The most notorious computer viruses
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

The most notorious computer viruses


Published on

You'll be glad that antivirus programs can combat these viruses now. Pray that no other viruses come out as destructive as these.

You'll be glad that antivirus programs can combat these viruses now. Pray that no other viruses come out as destructive as these.

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. The Most NotoriousComputer Viruses
  • 2. 1. MelissaIn 1999, a computer virus began spreading likewildfire via email messages. Called "Melissa,"creator David L. Smith said he named it after aFlorida exotic dancer. And in the same way that adancer can allure you with a striptease, the Melissavirus tempted people to open these emails with themessage "Here is that document that you askedfor, dont show it to anybody else." Once opened,the virus then replicates itself by going after the topfifty people in the recipients address book.
  • 3. MELISSA EMAIL1. It may be from someone you know. But they dont know they sent it.2. The subject line will read,"Important Message From" and thename may be someone you know.3. The body of the mail will read,"Here is that document you askedfor dont show anyone else ;-)"4. The attachment, where this nastylittle bug lives, has the name oflist.doc.
  • 4. 2. I Love YouA year later, another heavy-hitter emerged, this timefrom the Philippines. Among other things, it couldcopy itself several times and hide the replicants invarious separate folders; add new files to registrykeys; replace several important system files withcopies of itself; and download a file called WIN-BUGSFIX.EXE (a password-stealing program) andrun it.
  • 5. 3. KlezIn 2001, a year after I LoveYou hit, a far more sinister onecame out of the woodwork.Klez, when activated,multiplied itself through avictims email list much likeMelissa, and rendered desktopand laptop parts themselves tobe inoperable. Before it wastotally eradicated, its creatorseven fine-tuned it so that itwould be intelligent enough tocopy the email address it wascoming from.
  • 6. 4. Code Red and Code Red IIAlso in the same year as Klez, the Code Red and Code Red IIviruses appeared. These viruses exploited a weakness in theprogramming of the Windows 2000 and Windows NToperating systems. The weakness in question was the OSesbuffer overflow problem. This problem occurs when acomputer receives more information than the systems bufferscan process and starts to overwrite adjacent memory.
  • 7. • The first Code Red infamously attacked web servers at the White House by implementing a Distributed Denial of Service (DDoS) attack. This attack caused every infected computer to contact the White Houses servers, thereby overloading them.• Meanwhile, Code Red II- infected computers were no longer operable by their owners because the virus created a backdoor program in their computers systems, allowing a remote user to gain control of their machines.
  • 8. 5. NimdaStill in 2001, a virus named Nimda (thats "admin"spelled backwards) spread throughout the internet.Nimda was notorious for being the fastest-spreading virus then, taking only 22 minutes to getfrom initial release to the top list of reportedattacks.
  • 9. 5. NimdaDespite being able to infecthome PCs just as well, itsmain target was internetservers, with the intention ofslowing these downsignificantly. It travelledthrough the internetemploying various methods,not the least of which wasemail propagation. Thisadeptness was what allowedit to multiply itself acrossthousands of servers inrecord time.
  • 10. THANK YOUORIGINAL POST:• Viruses&id=7244021RELATED LINKS:••• 106842529120453547172/posts•