SlideShare a Scribd company logo
1 of 15
HARMFUL SOFTWARE
Malware and Virus
Software and Computer
 Software is an inseparable component of the computer
 Different types of software have made our work easy
BUT…
Some software that are very harmful for our system and data
Malware
 Combination of two words
Malicious + Software
Software written and developed to create mischief or hurt the user
Various types:
 Virus
 Trojan Horse
 Worms
 Rootkits
 Backdoors
 Ransomware
 Spyware
 Adware
 Sacreware
Purpose of Malware
 In the beginning Malware was written for purpose of
experiments.
 Sometimes, it was also written as a joke.
 With advancement in technology, it is being used with
more intensions:
 Steal Personal informations
 Obtain bank account details and credit card details.
 Disturb activities
 Take control of users computer for illegal activities
 Send email spams
 Advertise products
Symptoms of presence of Malware
 Unexplained messages start appearing on the screen
 Some files deleted on their own.
 Keyboard does not work properly
 Unexplained problems occur while printing files
 Making system unusable/ crashing of the system
 Slowing down of your system
 Automatic rebooting/restarting
 Data on the system becomes inaccessible
 Random playing of strange sounds
Types of Malware
1. Virus
 The term ‘VIRUS’ was first used by John Von Neumann in 1949
 A computer virus is nothing but an electronic version of ‘Biological virus’
Vital
Information
Resource
Under
Siege
 When enters the computer, it replicates itself and cause infection.
CREEPER is widely acclaimed as
the first virus on ARPANET
(First version of Internet)
Types of Viruses
 File Infector Virus: This virus attacks executable files of the computer.
 This virus either deletes or damages files.
 Eg: Sunday, Invader, Cascade
 Boot Sector Virus: Infects the boot sector of hard disk
 Either copies boot sector instructions present in hard disk to some other
location or overwrites these instructions
 Eg: Disk Killer, stone Virus
 Macro Virus: Infects the macro files of MS Office files
 Difficult to detect(They enter the system as a part of office file and appear
non-suspesious)
 Eg: Nuclear, DMV
2. Trojan Horses
 These are ordinary looking files but are actually programs
that delete/ corrupt files.
 They are transferred as innocent attachments to an email.
 They do not replicate themselves.
 They are usually written with the intention of stealing
data.
 These are used to take unauthorized access and control of
infected system.
 Eg: PC-Write (First Trojan Horse in cyber history)
The Trojan Horse can:
 Crash the computer
 Corrupt user data
 Format HD
 Make unauthorized transfer of data/electronic money
 Modify/delete data
 Unnecessary download or upload files
 Control computer remotely
3. Worms
 Viruses are transferred from one system to another as an
attachment to a file or a program.
 Worms can spread on their own. (Do not need the support
of another file)
 Worms are designed only to spread from one computer to
another.
 NOT TO CAUSE CHANGES IN DATA OF THE SYSTEMS.
 Some worms cause problem of increased network traffic.
 Eg: Red Code, Slammer worm, Storm
4. Backdoors
 When you log into a computer system, it asks for the user
name and password
 Backdoor malware has been designed to bypass this
process
 It can get installed to a computer with/without the
knowledge of the user.
 Eg: Subseven, NetBus, Award BIOS
5.Rootkit
 Rootkit is a special type of malware that gives
administrative rights to use the computer.
 Unlike other malware, they are not harmful.
 They are simply cover other malware, gain entry to the
computer and then attack the computer using other
malware like virus, Trojan etc.
 Eg: Back Orifice
6.Spyware
 Spyware is a type of malware that does not
corrupt the computer
 It is designed to collect personal information
about an individual/ organization.
 It is designed to collect informations like web
visiting history of the user
 advertisement start appearing according to
the web visiting history
 Some spyware designed to download unwanted
softwares/files form internet.
 It does not multiply
Symptoms of spyware infected systems:
 Performance of the computer has started
decreasing.
 The free space in the computer HD has
decreased on its own.
 Huge network traffic
 Applications installed on the computer
started closing in their own.
 User has started facing difficulty in
connecting to the computer.
Check your knowledge:
 Macros present in ……………………….. File.
 Ans: Office file
 Malware is written and developed to
create…………… or ………………….. The user.
 Ans: Mischief or Hurt
 ………………… collects information about an
individual or an organization.
 Ans:Spyware
 ………………………. Is considered as the first Trojan
Horse in cyber history
 Ans:PC-write
 …………………….. Is widely acclaimed as the first
virus on ARPANET
 Creeper

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virusDark Side
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)ainizbahari97
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virusShashankRoy11
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Computer viruses
Computer virusesComputer viruses
Computer virusessimron2002
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware
MalwareMalware
Malware
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Ppt123
Ppt123Ppt123
Ppt123
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 

Similar to Harmful software (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Viruses
VirusesViruses
Viruses
 
Malwares
MalwaresMalwares
Malwares
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 

Recently uploaded

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 

Recently uploaded (20)

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 

Harmful software

  • 2. Software and Computer  Software is an inseparable component of the computer  Different types of software have made our work easy BUT… Some software that are very harmful for our system and data
  • 3. Malware  Combination of two words Malicious + Software Software written and developed to create mischief or hurt the user Various types:  Virus  Trojan Horse  Worms  Rootkits  Backdoors  Ransomware  Spyware  Adware  Sacreware
  • 4. Purpose of Malware  In the beginning Malware was written for purpose of experiments.  Sometimes, it was also written as a joke.  With advancement in technology, it is being used with more intensions:  Steal Personal informations  Obtain bank account details and credit card details.  Disturb activities  Take control of users computer for illegal activities  Send email spams  Advertise products
  • 5. Symptoms of presence of Malware  Unexplained messages start appearing on the screen  Some files deleted on their own.  Keyboard does not work properly  Unexplained problems occur while printing files  Making system unusable/ crashing of the system  Slowing down of your system  Automatic rebooting/restarting  Data on the system becomes inaccessible  Random playing of strange sounds
  • 6. Types of Malware 1. Virus  The term ‘VIRUS’ was first used by John Von Neumann in 1949  A computer virus is nothing but an electronic version of ‘Biological virus’ Vital Information Resource Under Siege  When enters the computer, it replicates itself and cause infection. CREEPER is widely acclaimed as the first virus on ARPANET (First version of Internet)
  • 7. Types of Viruses  File Infector Virus: This virus attacks executable files of the computer.  This virus either deletes or damages files.  Eg: Sunday, Invader, Cascade  Boot Sector Virus: Infects the boot sector of hard disk  Either copies boot sector instructions present in hard disk to some other location or overwrites these instructions  Eg: Disk Killer, stone Virus  Macro Virus: Infects the macro files of MS Office files  Difficult to detect(They enter the system as a part of office file and appear non-suspesious)  Eg: Nuclear, DMV
  • 8. 2. Trojan Horses  These are ordinary looking files but are actually programs that delete/ corrupt files.  They are transferred as innocent attachments to an email.  They do not replicate themselves.  They are usually written with the intention of stealing data.  These are used to take unauthorized access and control of infected system.  Eg: PC-Write (First Trojan Horse in cyber history)
  • 9. The Trojan Horse can:  Crash the computer  Corrupt user data  Format HD  Make unauthorized transfer of data/electronic money  Modify/delete data  Unnecessary download or upload files  Control computer remotely
  • 10. 3. Worms  Viruses are transferred from one system to another as an attachment to a file or a program.  Worms can spread on their own. (Do not need the support of another file)  Worms are designed only to spread from one computer to another.  NOT TO CAUSE CHANGES IN DATA OF THE SYSTEMS.  Some worms cause problem of increased network traffic.  Eg: Red Code, Slammer worm, Storm
  • 11. 4. Backdoors  When you log into a computer system, it asks for the user name and password  Backdoor malware has been designed to bypass this process  It can get installed to a computer with/without the knowledge of the user.  Eg: Subseven, NetBus, Award BIOS
  • 12. 5.Rootkit  Rootkit is a special type of malware that gives administrative rights to use the computer.  Unlike other malware, they are not harmful.  They are simply cover other malware, gain entry to the computer and then attack the computer using other malware like virus, Trojan etc.  Eg: Back Orifice
  • 13. 6.Spyware  Spyware is a type of malware that does not corrupt the computer  It is designed to collect personal information about an individual/ organization.  It is designed to collect informations like web visiting history of the user  advertisement start appearing according to the web visiting history  Some spyware designed to download unwanted softwares/files form internet.  It does not multiply
  • 14. Symptoms of spyware infected systems:  Performance of the computer has started decreasing.  The free space in the computer HD has decreased on its own.  Huge network traffic  Applications installed on the computer started closing in their own.  User has started facing difficulty in connecting to the computer.
  • 15. Check your knowledge:  Macros present in ……………………….. File.  Ans: Office file  Malware is written and developed to create…………… or ………………….. The user.  Ans: Mischief or Hurt  ………………… collects information about an individual or an organization.  Ans:Spyware  ………………………. Is considered as the first Trojan Horse in cyber history  Ans:PC-write  …………………….. Is widely acclaimed as the first virus on ARPANET  Creeper