SlideShare a Scribd company logo
1 of 27
Introduction
Computer virus have become today’s headline
 news
With the increasing use of the Internet, it has
 become easier for virus to spread
Virus show us loopholes in software
Most virus are targeted at the MS Windows OS
Definition
 Virus : A true virus is capable of self replication
 on a machine. It may spread between files or
 disks, but the defining character is that it can
 recreate itself on it’s own with out traveling to a
 new host
Overview
Background
Symptoms
Classifying Viruses
Examples
Protection/Prevention
Conclusion
Background
There are estimated 30,000 computer
 viruses in existence
Over 300 new ones are created each
 month
First virus was created to show loopholes
 in software
Virus Languages
ANSI COBOL
C/C++
Pascal
VBA
Unix Shell Scripts
JavaScript
Basically any language that works on the system
 that is the target
Symptoms of Virus Attack
 Computer runs slower then usual
 Computer no longer boots up
 Screen sometimes flicker
 PC speaker beeps periodically
 System crashes for no reason
 Files/directories sometimes disappear
 Denial of Service (DoS)
Virus through the Internet
Today almost 87% of all viruses are spread
 through the internet (source: ZDNet)
Transmission time to a new host is relatively low,
 on the order of hours to days
“Latent virus”
Classifying Virus - General
Virus Information
     Discovery Date:
     Origin:
     Length:
     Type:
     SubType:
     Risk Assessment:
     Category:
Classifying Virus - Categories

Stealth
Polymorphic
Companion
Armored
Classifying Virus - Types
Trojan Horse
Worm
Macro
Trojan Horse
Covert
Leaks information
Usually does not reproduce
Trojan Horse
Back Orifice
    Discovery Date:      10/15/1998
    Origin:        Pro-hacker Website
    Length:        124,928
    Type: Trojan
    SubType:       Remote Access
    Risk Assessment: Low
    Category:      Stealth
Trojan Horse
About Back Orifice
  requires Windows to work
  distributed by “Cult of the Dead Cow”
  similar to PC Anywhere, Carbon Copy software
  allows remote access and control of other computers
  install a reference in the registry
  once infected, runs in the background
  by default uses UDP port 54320
                  TCP port 54321
  In Australia 72% of 92 ISP surveyed were infected with
   Back Orifice
Trojan Horse
 Features of Back Orifice
  pings and query servers
  reboot or lock up the system
  list cached and screen saver password
  display system information
  logs keystrokes
  edit registry
  server control
  receive and send files
  display a message box
Worms
Spread over network connection
Worms replicate
First worm released on the Internet was called
 Morris worm, it was released on Nov 2, 1988.
Worms
Bubbleboy
    Discovery Date:    11/8/1999
    Origin:     Argentina (?)
    Length:     4992
    Type:       Worm/Macro
    SubType:    VbScript
    Risk Assessment: Low
    Category:   Stealth/Companion
Worms
Bubbleboy
 requires WSL (windows scripting language), Outlook
   or Outlook Express, and IE5
 Does not work in Windows NT
 Effects Spanish and English version of Windows
 2 variants have been identified
 Is a “latent virus” on a Unix or Linux system
 May cause DoS
Worms
How Bubbleboy works
  Bubbleboy is embedded within an email message of
   HTML format.
  a VbScript while the user views a HTML page
  a file named “Update.hta” is placed in the start up
   directory
  upon reboot Bubbleboy executes
Worms
How Bubbleboy works
  changes the registered owner/organization
    HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentV
     ersionRegisteredOwner = “Bubble Boy”
    HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentV
     ersionRegisteredOrganization = “Vandalay Industry”
  using the Outlook MAPI address book it sends itself to
   each entry
  marks itself in the registry
       HKEY_LOCAL_MACHINESoftwareOutlook.bubbleboy =
        “OUTLOOK.Bubbleboy1.0 by Zulu”
Macro
Specific to certain applications
Comprise a high percentage of the viruses
Usually made in WordBasic and Visual
 Basic for Applications (VBA)
Microsoft shipped “Concept”, the first
 macro virus, on a CD ROM called "Windows
 95 Software Compatibility Test" in 1995
Macro
Melissa
    Discovery Date: 3/26/1999
    Origin:    Newsgroup Posting
    Length:     varies depending on variant
    Type:       Macro/Worm
    Subtype:    Macro
    Risk Assessment: High
    Category:   Companion
Macro
Melissa
  requires WSL, Outlook or Outlook Express Word
   97 SR1 or Office 2000
  105 lines of code (original variant)
  received either as an infected template or email
   attachment
  lowers computer defenses to future macro virus
   attacks
  may cause DoS
  infects template files with it’s own macro code
  80% of of the 150 Fortune 1000 companies
   were affected
Macro
How Melissa works
  the virus is activated through a MS word document
  document displays reference to pornographic websites
   while macro runs
  1st lowers the macro protection security setting for
   future attacks
  checks to see is it has run in current session before
       HKEY_LOCAL_MACHINESoftwareMicrosoftOfficeMelissa =
        “by Kwyjibo”
  propagates itself using the Outlook MAPI address
   book (emails sent to the first 50 addresses)
Macro
How Melissa works
  infects the Normal.dot template file with it’s own code
  Lastly if the minutes of the hour match up to the date
   the macro inserts a quote by Bart Simpson into the
   current document
       “Twenty two points, plus triple word score, plus fifty points for
        using all my letters. Game’s over. I’m outta here.”
Protection/Prevention
Knowledge
Proper configurations
Run only necessary programs
Anti-virus software
Conclusion
You know know more about virus and how:
  viruses work through your system
  to make a better virus
Have seen how viruses show us a loophole in
 popular software
Most viruses show that they can cause great
 damage due to loopholes in programming

More Related Content

What's hot

1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750bhagatsigh
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 
My Doom Worm
My Doom WormMy Doom Worm
My Doom WormJeradeB
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 

What's hot (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Virus slides
Virus slidesVirus slides
Virus slides
 
Virus and worms analysis
Virus and worms analysisVirus and worms analysis
Virus and worms analysis
 
My Doom Worm
My Doom WormMy Doom Worm
My Doom Worm
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Mydoom virus
Mydoom virusMydoom virus
Mydoom virus
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 

Similar to Computer virus (20)

Computer virus
Computer virusComputer virus
Computer virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
Types of viruses
Types of virusesTypes of viruses
Types of viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Data loss causes and its threats
Data loss causes and its threatsData loss causes and its threats
Data loss causes and its threats
 
Ransomware
RansomwareRansomware
Ransomware
 

Recently uploaded

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Recently uploaded (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Computer virus

  • 1.
  • 2. Introduction Computer virus have become today’s headline news With the increasing use of the Internet, it has become easier for virus to spread Virus show us loopholes in software Most virus are targeted at the MS Windows OS
  • 3. Definition Virus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own with out traveling to a new host
  • 5. Background There are estimated 30,000 computer viruses in existence Over 300 new ones are created each month First virus was created to show loopholes in software
  • 6. Virus Languages ANSI COBOL C/C++ Pascal VBA Unix Shell Scripts JavaScript Basically any language that works on the system that is the target
  • 7. Symptoms of Virus Attack  Computer runs slower then usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files/directories sometimes disappear  Denial of Service (DoS)
  • 8. Virus through the Internet Today almost 87% of all viruses are spread through the internet (source: ZDNet) Transmission time to a new host is relatively low, on the order of hours to days “Latent virus”
  • 9. Classifying Virus - General Virus Information Discovery Date: Origin: Length: Type: SubType: Risk Assessment: Category:
  • 10. Classifying Virus - Categories Stealth Polymorphic Companion Armored
  • 11. Classifying Virus - Types Trojan Horse Worm Macro
  • 13. Trojan Horse Back Orifice Discovery Date: 10/15/1998 Origin: Pro-hacker Website Length: 124,928 Type: Trojan SubType: Remote Access Risk Assessment: Low Category: Stealth
  • 14. Trojan Horse About Back Orifice requires Windows to work distributed by “Cult of the Dead Cow” similar to PC Anywhere, Carbon Copy software allows remote access and control of other computers install a reference in the registry once infected, runs in the background by default uses UDP port 54320 TCP port 54321 In Australia 72% of 92 ISP surveyed were infected with Back Orifice
  • 15. Trojan Horse  Features of Back Orifice pings and query servers reboot or lock up the system list cached and screen saver password display system information logs keystrokes edit registry server control receive and send files display a message box
  • 16. Worms Spread over network connection Worms replicate First worm released on the Internet was called Morris worm, it was released on Nov 2, 1988.
  • 17. Worms Bubbleboy Discovery Date: 11/8/1999 Origin: Argentina (?) Length: 4992 Type: Worm/Macro SubType: VbScript Risk Assessment: Low Category: Stealth/Companion
  • 18. Worms Bubbleboy requires WSL (windows scripting language), Outlook or Outlook Express, and IE5 Does not work in Windows NT Effects Spanish and English version of Windows 2 variants have been identified Is a “latent virus” on a Unix or Linux system May cause DoS
  • 19. Worms How Bubbleboy works Bubbleboy is embedded within an email message of HTML format. a VbScript while the user views a HTML page a file named “Update.hta” is placed in the start up directory upon reboot Bubbleboy executes
  • 20. Worms How Bubbleboy works changes the registered owner/organization  HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentV ersionRegisteredOwner = “Bubble Boy”  HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentV ersionRegisteredOrganization = “Vandalay Industry” using the Outlook MAPI address book it sends itself to each entry marks itself in the registry  HKEY_LOCAL_MACHINESoftwareOutlook.bubbleboy = “OUTLOOK.Bubbleboy1.0 by Zulu”
  • 21. Macro Specific to certain applications Comprise a high percentage of the viruses Usually made in WordBasic and Visual Basic for Applications (VBA) Microsoft shipped “Concept”, the first macro virus, on a CD ROM called "Windows 95 Software Compatibility Test" in 1995
  • 22. Macro Melissa Discovery Date: 3/26/1999 Origin: Newsgroup Posting Length: varies depending on variant Type: Macro/Worm Subtype: Macro Risk Assessment: High Category: Companion
  • 23. Macro Melissa requires WSL, Outlook or Outlook Express Word 97 SR1 or Office 2000 105 lines of code (original variant) received either as an infected template or email attachment lowers computer defenses to future macro virus attacks may cause DoS infects template files with it’s own macro code 80% of of the 150 Fortune 1000 companies were affected
  • 24. Macro How Melissa works the virus is activated through a MS word document document displays reference to pornographic websites while macro runs 1st lowers the macro protection security setting for future attacks checks to see is it has run in current session before  HKEY_LOCAL_MACHINESoftwareMicrosoftOfficeMelissa = “by Kwyjibo” propagates itself using the Outlook MAPI address book (emails sent to the first 50 addresses)
  • 25. Macro How Melissa works infects the Normal.dot template file with it’s own code Lastly if the minutes of the hour match up to the date the macro inserts a quote by Bart Simpson into the current document  “Twenty two points, plus triple word score, plus fifty points for using all my letters. Game’s over. I’m outta here.”
  • 27. Conclusion You know know more about virus and how: viruses work through your system to make a better virus Have seen how viruses show us a loophole in popular software Most viruses show that they can cause great damage due to loopholes in programming