Presentation

167 views
113 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
167
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Presentation

  1. 1. Virus And HackingGujarat Vidyapith, Ahmedabad Nishant A. Barot
  2. 2. What Is Virus? Virus is miscellaneous Application or code that can be used for damage your system or hack your system. Work accordingly as on their property .
  3. 3. Types of Virus Worm Trojan Application Virus
  4. 4. Worm The entire virus works on their own property. Property of the worm is as simple as its name it generates or Duplicate itself and slow down or crash your system.
  5. 5. Types of Worm Worm Boot Sector Command Based Macro Worm
  6. 6. Boot Sector Worm A boot sector virus is one that infects the first sector, i.e. the boot sector, of a floppy disk or hard drive. Boot sector viruses can also infect the MBR.
  7. 7. Command Based Worm Command Base Worm means execute the system command misplaced and Harm the system.
  8. 8. Macro worm A Macro virus infects the data file created by software such as Microsoft Word and Microsoft Excel. This is a newer type of virus, and its incidence is increasing. A Macro virus will only begin to cause problems when the file containing that Macro is opened.
  9. 9. Trojan Virus A Trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort.
  10. 10. Sub7 Trojan
  11. 11. How It Works?
  12. 12. Application Virus Virus which is treated as application or behave as an application is called Application Virus. Its Very Difficult to Detect application virus in the system. Application virus is very harmful for Operating System.
  13. 13. Types of Application Virus Polymorphic virus Logic Bomb Root kits
  14. 14. Polymorphic virus Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
  15. 15. LOGIC BOMBS They are not considered viruses because they do not replicate. They are not even programs in their own right but rather secret segments of other programs.
  16. 16. Rootkit Virus A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the Linux administrator root user.
  17. 17. Hacking Hacking means bypass the computer security and enter into the system for a malicious intent. Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works.
  18. 18. Types of Hacker by Application Phrackers Crackers Hacker
  19. 19. Phreckers The Persons who hack the phone and make long distance call or message for Free is Called Phreckers. John Draper John Draper makes a long- distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line.
  20. 20. Crackers The persons who get into your system and crash your data or system is called crackers .Crackers are not interested in your data. They are interested in just crashing your system.
  21. 21. HackersThe person who takeover your system without your system and steal your data is called Hacker. In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center. Late 1990s Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.
  22. 22. Types of Hacker White hat hacker Black hat hacker Grey hat hacker
  23. 23. White hat hacker The Hacker which use Its knowledge for the providing security to Others and saves their system and Data from Hacker and Cracker is Called White hat Hacker. They are paid For their services.
  24. 24. Black hat hacker The person who hack the system for the purpose of steal the data from system and creak the system. They do it for Fun sometimes this type of persons are called Black Hat Hacker.
  25. 25. Grey hat hacker The persons who does not about system and by mistake enters in unauthorized sector or File is called grey hat Hacker.
  26. 26. ConclusionImportant: Hackers Or Virus can not harm you if you are aware about your system. hacker or Virus must need any user event to activate in System.
  27. 27. Thank you Any Questions ??

×