Virus&malware

5,151 views

Published on

Published in: Education
1 Comment
3 Likes
Statistics
Notes
No Downloads
Views
Total views
5,151
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
574
Comments
1
Likes
3
Embeds 0
No embeds

No notes for slide

Virus&malware

  1. 1. Viruses & Malware
  2. 2. What is malware? Mal icious soft ware . - A software program designed to cause harm to a computer without the knowledge of the user.
  3. 3. Types of malware <ul><li>Computer viruses
  4. 4. Worms
  5. 5. Trojan horses
  6. 6. Spyware
  7. 7. Adware
  8. 8. Any other type of malicious & unwanted software. </li></ul>
  9. 9. What is a computer virus? A computer program that can infect a computer and replicate and spread without the users knowledge.
  10. 10. Types of viruses <ul><li>Resident
  11. 11. Direct Action
  12. 12. Overwrite
  13. 13. Boot
  14. 14. Macro
  15. 15. Directory </li></ul><ul><li>Polymorphic
  16. 16. File Infectors
  17. 17. Companion
  18. 18. Fat
  19. 19. Logic Bombs </li></ul>
  20. 20. Resident Virus A virus that takes up permanent residence in the RAM memory. It can take over or interupt any operation executed by the computer system. It can corrupt files and programs; such as copy, open, close, rename and more. Examples: Randex, CMJ, Meve, and MrKlunky.
  21. 21. Direct Action Virus A batch file that resides in the root directory of the hard disk. When executed it will infect files in the directory that it is in, plus any directed to, in the batch file AUTOEXEC.BAT file PATH.
  22. 22. Overwrite Virus A virus that deletes of overwrites part or all of the information in a file, making them partially or totally worthless. To get rid of the virus, the file has to be deleted. Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
  23. 23. Boot Virus A virus that affects the boot sector of the hard drive or a floppy drive. The boot sector gives the computer information on how to boot, if it is not functioning the computer won't boot. To avoid a boot virus, don't boot your computer with an unknown floppy disk in your floppy drive and make sure it is write protected. Examples of boot viruses include: Polyboot.B, AntiEXE.
  24. 24. Macro Virus A virus written in a macro language that infects the files that were created with it. When the file is opened the macro virus runs automatically. This may arrive on your computer by email attachment. Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
  25. 25. Directory Virus <ul><li>Directory viruses will replace an existing executable and move the real file somewhere else, so when you run it you are unknowingly running the virus program instead of the original. It then becomes impossible to find the original file. </li></ul>
  26. 26. Polymorphic Virus Viruses that encode or encrypt themselves so that each new version is different. This enables them to replicate and very hard for virus scanners to track down.
  27. 27. File Infectors The majority of viruses are file infectors. This virus is activated by running an executable file like .exe or .com extension files. Once run, the virus does its damage according to the program in the executable file.
  28. 28. Companion Virus once the system is infected they accompany the files that already exist. They can lay in wait or take action immediately. Some examples include: Stator, Asimov.1539, and Terrax.1069
  29. 29. Fat Virus this virus will only infect a computer running a file allocation table (FAT) file system. This virus will prevent access to parts of the hard drive preventing files to be accessed Newer windows computers use NTFS and don't need to worry about this virus.
  30. 30. Logic Bomb <ul><li>Not technically a virus because it does not replicate. It is program designed to destroy data, or perform a function, that is set to go off under specific conditions. </li></ul>
  31. 31. What is a worm? A worm typically infects networked computers. It replicates but may not corrupt files. It uses a network to send copies of itself to other nodes without user intervention. It will at the very least slow the computers and network down.
  32. 32. What is a trojan? Trojan – refers to the story of the Trojan horse. This is malware that is hidden inside of a benign looking function but actually performs a malicious function. This malware may allow unauthorized access to the computer, give them access to the files and control the computer.
  33. 33. Type of Trojans <ul><li>Remote Access
  34. 34. Data Destruction
  35. 35. Downloader/dropper
  36. 36. Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)
  37. 37. Disable security software
  38. 38. Denial-of-service attack (DoS) </li></ul>
  39. 39. What is spyware? Spyware is computer software that is secretly installed on your computer to monitor your internet usage and behavior.
  40. 40. Spyware continued Spyware – spyware can do more than monitor the user's behavior. It can collect personal information, such as, surfing habits and sites visited. Spyware can also install software and redirirect web browser activity. Spyware can slow connection speeds and set different home pages
  41. 41. List of fake anti-spyware <ul><li>AntiVirus 360
  42. 42. Antivirus 2008
  43. 43. Antivirus 2009
  44. 44. AntiVirus Gold
  45. 45. ContraVirus
  46. 46. Errorsafe
  47. 47. MacSweeper
  48. 48. PAL Spyware Remover
  49. 49. Pest Trap
  50. 50. PSGuard
  51. 51. Spy Wiper </li></ul><ul><li>Spydawn
  52. 52. Spylocked
  53. 53. Spysheriff
  54. 54. SpyShredder
  55. 55. Spyware Quake
  56. 56. SpywareStrike
  57. 57. UltimateCleaner
  58. 58. WinAntiVirus Pro 2006
  59. 59. WinFixer
  60. 60. WorldAntiSpy </li></ul>
  61. 61. What is adware? Adware – a software package that plays automatically and will display advertisements on the computer after installing some other software.
  62. 62. Known adware programs <ul><li>123 Messenger
  63. 63. 180SearchAssistant
  64. 64. 888bar
  65. 65. Adssite Toolbar
  66. 66. AOL Instant Messenger
  67. 67. Antivirus 200 Family
  68. 68. Bearshare
  69. 69. Bonzi Buddy
  70. 70. BlockChecker
  71. 71. Burn4Free
  72. 72. ClipGenie
  73. 73. Comet Cursor </li></ul><ul><li>Daemon Tools
  74. 74. Direct Revenue
  75. 75. DivX
  76. 76. DollarRevenue
  77. 77. Ebates MoneyMaker
  78. 78. ErrorSafe
  79. 79. Ezula
  80. 80. FlashGet
  81. 81. Gamespy Arcade
  82. 82. Gator
  83. 83. Kazaa </li></ul>
  84. 84. Adware programs continued <ul><li>Messenger Plus! Live
  85. 85. MessengerSkinner
  86. 86. Micro Antivirus
  87. 87. Mirar Toolbar
  88. 88. Oemji Toolbar R
  89. 89. RealPlayer
  90. 90. Smiley Central
  91. 91. TagASaurus
  92. 92. TopMoxie
  93. 93. Tribal Fusion
  94. 94. Videothang
  95. 95. Viewpoint Media Player
  96. 96. VirusProtectPro </li></ul><ul><li>Viewpoint Media Player
  97. 97. VirusProtectPro
  98. 98. WeatherBug
  99. 99. WhenU
  100. 100. WinAce
  101. 101. WinFixer
  102. 102. Winzix
  103. 103. Wolfenstein enemy territory
  104. 104. Zango
  105. 105. Zango Toolbar
  106. 106. Zwinky </li></ul>

×