Computer Viruses


Published on

Submitted by Act Academy

Published in: Education, Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Computer Viruses

  1. 1. COMPUTER VIRUS     A computer virus is a computer program that can reproduce itself and spread from one computer to another. and leaving infections as it travels, Like a human virus. Some virus may cause only testing effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file. It is important to note that a virus cannot be spread without a human action. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
  2. 2. EFFECT OF COMPUTER VIRUS       It can slow down your computer. It might corrupt your system files. It might make some programs faulty or corrupt. It might damage your boot sector creating problems when you boot into the windows. it might steal important information from your computer and send to some other person. It might change the power ratings of your computer and could blast the system.
  3. 3. VIRUS IMPACT ON SYSTEM ACCESSORIES     Programs. Some viruses may impair your certain computer programs and applications. As a result, you may not be able to access the software or operate it smoothly. Files. There are viruses that may modify, corrupt or delete files in your machine owing to which you may not be able to access them. Hard disk. Some viruses may attack the data present on your computer’s hard disk, resulting in its crash. You may need to reformat the disk in such cases. Operational impact. Some viruses may not apparently harm your system’s integrity and may limit themselves to displaying text messages, images, audio and Video.
  4. 4. WHY DO PEOPLE CREATE COMPUTER VIRUS     To take control of a computer and use it for specific tasks To generate money To steal sensitive information (credit card numbers, passwords, personal details, data etc.) To prove a point, to prove it can be done, to prove ones skill or for revenge purposes
  5. 5. VIRUS IMPACT ON SYSTEM ACCESSORIES     Hardware. No computer viruses are capable of damaging your hardware yet. They just work on all the files and data of your system, make them useless and disable them. Speed. Your system may slow down under the influence of viruses as they consume your system’s memory for their execution. Booting. Your system may suddenly restart and at times may not load properly. In few cases, you may not be able to access your disk drives. Applications. Viruses may modify, damage or delete your program files and system files because of which applications on your system may not be able to work appropriately.
  6. 6. VIRUS IMPACT ON SYSTEM ACCESSORIES   Reinstall. Some computer viruses are designed in the gravest way possible. They cannot be uninstalled easily from your system and some reinstall themselves even after they have been removed. Peripherals. Some viruses may impact device driver software in your computer resulting in the relevant operational issues. For example, disturbed software setting for printer may impair its function.
  7. 7. COMPUTER VIRUS HISTORY       Elk Cloner has the distinction of being the first wild virus for a home computer. Coded by then-high-school student, Richard Skrenta, around 1982. who created the search engine blekko. Happy Birthday Joshi', the virus was first discovered in India in June 1990 The first known virus was created in 1971 by Cambridge and was called the Creeper Virus. Creeper was an experimental selfreplicating program written by Bob Thomas at BBN in 1971.
  8. 8. COMPUTER VIRUS HISTORY     This virus was spread using the Advanced Research Projects Agency Network (ARPANET). It was designed not to damage but to demonstrate a mobile application. It is generally accepted to be the first computer worm, although the Concept of a "computer virus" did not exist in the 1970s When the computers were infected, the message "I'm the creeper, catch me if you can!" This year marks the 40th anniversary of Creeper.
  9. 9. FIRST VIRUS FROM PAKISTAN   World's first computer virus was created to infect IBM PCs by two Pakistani brothers, Amjad and Basit Farooq in 1986. While they were trying to explore their expertise and potential of MS DOS operating system, Virus travelled beyond their imagination through Asia, Europe and was picked up in USA. Amjad and Basit Farooq Alvi
  10. 10. FIRST VIRUS FROM PAKISTAN  The first computer virus named “Brain” was designed by Amjad Farooq Alvi and Basit Farooq Alvi.  "Beware of this VIRUS...Contact us for vaccination,". This message was put on the screen.  The interesting fact remains that the location of the “Brain Pvt Limited” is exactly the same where the virus was first developed.
  11. 11. 10 LATEST COMPUTER VIRUS Virus name Spreading Damage Discovered Backdoor.IRCBot.Dorkbot.A MEDIUM MEDIUM 2011 May 15 Backdoor.Lavandos.A MEDIUM HIGH 2011 Jan 06 VERY LOW HIGH 2011 Jan 03 Java.Trojan.Downloader.OpenConn ection.AI HIGH MEDIUM 2010 Nov 12 Java.Backdoor.ReverseBackdoor.A LOW MEDIUM 2010 Nov 12 VERY LOW VERY LOW 2010 Oct 28 MEDIUM HIGH 2010 Oct 20 Win32.Worm.Stuxnet.A HIGH MEDIUM 2010 Oct 07 Win32.Worm.Prolaco.S MEDIUM MEDIUM 2010 Oct 06 Exploit.CplLnk.Gen MEDIUM LOW 2010 Jul 19 Trojan.Android.Geinimi.A Win32.Ramnit.G Trojan.Spy.Ursnif.F
  12. 12. WORLD’S WORST COMPUTER VIRUS Surreptitious Sircam  Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me.  The worm appeared in e-mail in-boxes with an attachment  the body of the message was in Spanish or English.  Typical greetings included "Hi! How are you?" and "Hola como estas?” Raid raider  Code Red burned brightly in the summer of 2001,  Infecting hundreds of thousands of computers--mainly on corporate networks.
  13. 13. WORLD’S WORST COMPUTER VIRUS Maniacal Magistr  Magistr is one of the most complex viruses to hit the Internet.  Its victims, users of Outlook Express, were hooked by an infected email attachment.  The virus, discovered in mid-March 2001,  Sent garbled messages to everyone in the infected user's e-mail address book Melissa  Melissa propagated via infected Microsoft Word documents and mailed itself to Outlook contacts of the contaminated user.
  14. 14. WORLD’S WORST COMPUTER VIRUS Expletive Deleted) Explorer  The worm appeared in the summer of 1999.  The worm deleted Word, Excel, and PowerPoint files and types of files.  Explorer traveled via e-mails that appeared to be from someone the recipient knew. Numbing Nimda  Nimda (also known as the Concept Virus) appeared in September 2001,  Attacking tens of thousands of servers and hundreds of thousands of PCs.  The worm modified Web documents and executable files  The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message
  15. 15. SOME COMPUTER SECURITY THREATS ADWARE Adware is software that displays advertisements on your computer. BACKDOOR TROJAN A backdoor Trojan allows someone to take control of another user’s computer via the internet without their permission. BLUE JACKING Bluejacking is sending anonymous, unwanted messages to other users with Bluetooth-enabled mobile phones or laptops. BLUE SNARFING Bluesnarfing is the theft of data from a Bluetooth phone. Like Bluejacking, Bluesnarfing depends on the ability of Bluetoothenabled devices todetect and contact others nearby.
  16. 16. SOME COMPUTER SECURITY THREATS BOOT SECTOR VIRUS Boot sector viruses spread by modifying the program that enables your computer to start up BROWSER HIJACKERS Browser hijackers change the default home and search pages in your internet browser CHAIN LETTER In electronic chain letter is an email that urges you to forward copies to other people. COOKIES Cookies are files on your computer that enable websites to remember your details. DENIAL OF SERVICE A denial-of-service (DoS) attack prevents users from accessing a computer or website.
  17. 17. SOME COMPUTER SECURITY THREATS    Worms Worms are programs that replicate and spread, often opening a back door to allow hackers to gain access to the computers that they infect. Worms can spread over the Internet by exploiting security flaws in the software of computers that are connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email. Zombies A Zombie is a hidden program that lies inactive on a computer. Zombies don’t normally damage the computer on which they reside but can damage other computers. Zombies often arrive as email attachments and when the attachment is opened they install themselves secretly and then wait to be activated. Phishing A Phishing attack is when you are are sent an email that asks you to click on a link and re-enter your bank or credit card details. These emails can pretend to be from banks, Internet service providers, on-line stores and so on, and both the email and the web site it links to appear genuine. When you enter your bank or credit card details they are then used fraudulently.
  19. 19. ADWARE  Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.  These advertisements can be in the form of a pop-up.  They may also be in the user interface of the software or on a screen presented to the user during the installation process.  The object of the Adware is to generate revenue for its author  Advertising functions are integrated into or bundled with the software, which is often designed to note what Internet sites the user visits
  20. 20. MALWARE  Malware, short for malicious software, Malware is a very general word for software that deliberately harms, restricts, alters, or stops your computer from working properly where the true purpose of the download or installation is hidden or difficult to find and not clearly explained to the user .  Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, and other malicious and unwanted software or program.  Malware can arrive through an internet download, as an email link or attachment  as a file sent between users of instant messaging, social networking communities, peer-to-peer file sharing programs, online games, online video games or chatrooms or a link to a malicious webpage.
  21. 21. MALWARE  The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior.  The term computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables .  On the other hand, a worm is a program that actively transmits itself over a network to infect other computers
  22. 22. INDICATION OF MALWARE  the browser’s home page keeps changing  Pop-up advertisements appear when your browser is closed,.  Strange icons appear on your desktop without your prompting or knowledge of the program  The computer light is blinking (meaning that your computer is processing information) at unusual or unexpected times.  Your browser settings keep changing, including the webpage you designate as your internet start-up page  Files are uploaded or downloaded without your prompting or permission.
  23. 23. SPYWARE  Spyware is Internet language for Advertising Supported software (Adware).  Spyware is tracking software that hides itself (runs in the background) and gathers information without the computer owner's or user's knowledge or permission for the benefit of someone else  The first recorded use of the term spyware occurred on 16 October 1995.  showing them pop-up ads, or altering web-browser behavior for the financial benefit of the spyware creator.  For instance, some spyware programs redirect search engine results to paid advertisements.
  24. 24. SPYWARE     Others, often called "stealware" by the media, overwrite affiliate marketing codes so that revenue is redirected to the spyware creator rather than the intended recipient. The presence of spyware is typically hidden from the user, and can be difficult to detect Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, As of 2006, spyware has become one of the preeminent security threats to computer systems running Microsoft Windows operating systems.
  25. 25. GUIDELINE TO AVOID SPYWARE       Not opening emails or email attachments from unknown senders Block or don’t click on suspicious pop-up windows Don’t open files that are more prone to be associated with malware such as .bat, .pif, .txt .vbs, .htm .exe or .vbs Don’t download or execute applications from untrusted sources. Avoid phishing scams. Use updated anti-virus and anti-spyware software regularly.
  26. 26. COMPUTER ANTIVIRUS  A utility that searches a hard disk for viruses and removes any that are found.  Antivirus software is a computer program you install on your machine that scans files for malicious (dangerous) programs and either deletes them or "heals" them therefore eliminating the threat of damage to your computer.  Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered.  Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms.
  27. 27. COMPUTER ANTIVIRUS HISTORY The very first anti-virus software wasn't really an anti-virus software. It was a removal tool to remove a Polish virus named MKS vir. That removal tool was released in 1987, and the person who first had the idea of such removal tool was Bernt Fix.
  28. 28. BENEFITS FROM ANTIVIRUS Stop Virus-Related Damage Maintain the PC's Security Protect Against Email Threats/Spam Financial Savings Protect Data and Files
  29. 29. TOP 10 ANTIVIRUS           Norton Antivirus Kaspersky Antivirus McAfee Antivirus Plus Avira Antivir Premium AVG Antivirus ESET NOD32 Antivirus ZoneAlarm Antvirus Panda Antivirus BitDefender Antivirus F-Secure Antivirus
  30. 30. FIREWALL  A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy.  A personal firewall will usually protect only the computer on which it is installed.  Personal firewalls may also provide some level of trouble detection, allowing the software to terminate or block connectivity.  Allows the user to control which programs can and cannot access the local network and/or Internet.  Provide information about the destination server with which an application is attempting to communicate.
  31. 31. FIREWALL   They block other packets (usually dropping them without acknowledgment to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines. Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules.
  33. 33. ANKIT FADIA  Ankit Fadia is an independent computer security consultant  He runs a program on computer security for corporates in alliance with Reliance Info  He started a website called "HackingTruths". At 15, his book on Ethical Hacking made him the youngest author to be published by Macmillan India.  Fadia sponsors Singapore Management University's "Ankit Fadia Study Award", which consists of a $1000 cash prize and Certificate which is annually awarded to "an outstanding student“
  34. 34. ANKIT FADIA    According to Wendy McAuliffe at ZDNet UK, Fadia's Hacking Truths website was judged "second best hacking site" by the Federal Bureau of Investigation, though no ranked list of "hacking sites“ Person of the Year India 2002’ by Limca Book of Records. In December 2009 Fadia's business site, appeared. Ankit Fadia’s Hacking Books--     The Unofficial Guide to Ethical Hacking Network Security: A Hacker's Perspective Hacking Mobile Phones Tips and Tricks on Linux Email Hacking