SlideShare a Scribd company logo
An Introduction to Computer Viruses GEN008
GEN008 November 2000
An Introduction to Computer Viruses
Ward Takamiya and Jocelyn Kasamoto
Introduction ............................................................................................................................ 1
What is a Virus? ..................................................................................................................... 1
How Do Viruses Spread? ....................................................................................................... 1
How Can You Protect Yourself?............................................................................................ 2
Getting Anti-virus Software ................................................................................................... 2
Keeping it Current .................................................................................................................. 2
I May Have a Virus. Now What? .......................................................................................... 3
More Information ................................................................................................................... 3
Introduction
This document covers the basics on computer viruses. Please take some time to peruse the information
to obtain an overall understanding of the concern and how to safeguard yourself from the dangers of
viruses.
What is a Virus?
A computer virus is one of thousands of programs that can invade computer systems (both IBM PC and
Macintosh) and perform a variety of functions ranging from annoying (e.g., popping up messages as a
joke) to dangerous (e.g., deleting files or destroying your hard disk). Trojan horses or worms are
specific types of clandestine programs (loosely categorized as viruses) and can be just as dangerous. For
simplicity’s sake, future mention of viruses in this document will refer to viruses, Trojan horses, and
worms taken as a whole.
How Do Viruses Spread?
Computer viruses are programs that must be triggered or somehow executed before they can infect your
computer system and spread to others. Examples include opening a document infected with a “macro
virus,” booting with a diskette infected with a “boot sector” virus, or double-clicking on an infected
program file. Viruses can then be spread by sharing infected files on a diskette, network drive, or other
media, by exchanging infected files over the Internet via e-mail attachments, or by downloading
questionable files from the Internet.
Page 2 An Introduction to Computer Viruses GEN008
How Can You Protect Yourself?
With dangerous viruses on the network, what can computer users do to protect their systems? Here are
just a few hints:
• Be sure to install an anti-virus software program (see the next section) to guard against virus
attacks. Also, be sure you turn on the scanning features. It can’t protect you if it’s not enabled.
• Practice caution when working with files from unknown or questionable sources.
• Do not open e-mail attachments if you do not recognize the sender (though you may also receive
viruses from people you know). Scan the attachments with anti-virus software before opening
them.
• Download files only from reputable Internet sites, and be wary when exchanging diskettes or
other media with friends.
• Scan your hard drive for viruses monthly.
Even with these precautions, new viruses may find ways to enter your computer system.
Getting Anti-virus Software
Anti-virus software are programs that are installed onto your computer and can scan and remove known
viruses which you may have contracted. The software can also be set to automatically scan diskettes
when inserted into the disk drive, scan files when downloaded from the Internet, or scan e-mail when
received.
University of Hawai‘i faculty, staff, and students are eligible for a copy of one of the following ITS-
supported anti-virus software programs free of charge:
McAfee VirusScan for Windows
(www.hawaii.edu/downloads/mcafee/virusscan.html), or
Virex for Macintosh
(www.hawaii.edu/downloads/mcafee/virex.html)
Visit www.hawaii.edu/sitelic/antivirus for download information.
The above site-licensed software are also on the ITS CD-ROM which is available at the ITS Help Desk
in Keller Hall 105 on the Manoa campus.
Note: Be sure to have only one anti-virus program running on your system.
Multiple programs may cause conflicts and system instability.
Keeping it Current
Even with active monitoring of computer systems, anti-virus software can only protect against viruses
that it knows about. For this reason, update files (generally called Definition Files) for anti-virus
software are needed every time there is a new virus release. On the Windows platform, this means an
update roughly every week; the Macintosh has fewer new viruses to worry about so updates are usually
done monthly. The software that ITS distributes has an “Auto Update” feature to automatically connect
to a Web site and download the latest Definition Files. Refer to the documentation to turn this feature on
An Introduction to Computer Viruses GEN008 Page 3
and receive the maximum protection against viruses on your computer. Be sure to keep your Definition
Files current! See links at the end of this document to download the latest Definition Files.
I May Have a Virus. Now What?
If your computer becomes infected with a virus, don’t panic! For most viruses, you can simply use your
anti-virus program to scan and remove the virus. If your Definition Files are up-to-date, the program
should be able to clean off all but the most recent viruses. In the case of rather nasty viruses, you may
have some damaged files that cannot be fixed. Restore these from your backups. (You do make
backups, don’t you?) Call the ITS Help Desk at 956-8883 if you need further assistance.
More Information
If you would like to be apprised of the latest major virus outbreaks by e-mail, join the UH virus alert
listserv by sending e-mail to listproc@hawaii.edu and including in the body of the message:
SUBSCRIBE UHVIRUS-ALERT Firstname Lastname
with your first name and last name in the appropriate location.
For more information about computer viruses, here are additional links to check out:
For URL
UH ITS Site License Anti-
Virus Page (with links
to downloads and
documentation)
www.hawaii.edu/sitelic/antivirus
Installation Document for
VirusScan for Windows
www.hawaii.edu/itsdocs/index.html#virusscan
Installation Document for
Virex for Macintosh
www.hawaii.edu/itsdocs/index.html#virex
Virus Alerts for Windows www.hawaii.edu/sitelic/antivirus/pcalerts.html
UH Technology News
(includes Virus Alerts)
www.hawaii.edu/technews
Virus Alerts from McAfee
(makers of VirusScan
and Virex)
www.mcafeeb2b.com/avert/virus-alerts/default.asp
McAfee’s Virus
Information Library
www.mcafeeb2b.com/avert/virus-information-
library/default.asp
Latest Definition Files
(DAT) to download
www.mcafeeb2b.com/naicommon/download/dats/find.asp
Symantec Virus
Encyclopedia
www.symantec.com/avcenter/vinfodb.html
Page 4 An Introduction to Computer Viruses GEN008
For additional assistance, please phone the ITS Help Desk at (808) 956-8883,
send e-mail to help@hawaii.edu, or fax (808) 956-2108.
Or see the ITS Helpdesk home page at www.hawaii.edu/help
The ITS Help Desk is located in Keller 105 on the UH Manoa Campus.
The University of Hawai‘i is an equal opportunity/affirmative action institution.

More Related Content

What's hot

Anti virus software
Anti virus softwareAnti virus software
Anti virus software
harsh gajipara
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
reasonsecurity
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaILAKIA
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
SWAMY NAYAK
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
nikkinikhita
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trendsAthena Catindig
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
Shabnam Bashir
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
BESOR ACADEMY
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
Lee Ray
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
San Diego Continuing Education
 
Anti virus
Anti virusAnti virus
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
aaberra
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
Prakriti Sharma
 

What's hot (19)

Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Antivirus
AntivirusAntivirus
Antivirus
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 

Viewers also liked

A framework for deception
A framework for deceptionA framework for deception
A framework for deceptionUltraUploader
 
A note on cohen's formal model for computer viruses
A note on cohen's formal model for computer virusesA note on cohen's formal model for computer viruses
A note on cohen's formal model for computer virusesUltraUploader
 
A hybrid model to detect malicious executables
A hybrid model to detect malicious executablesA hybrid model to detect malicious executables
A hybrid model to detect malicious executablesUltraUploader
 
A plague of viruses biological, computer and marketing
A plague of viruses biological, computer and marketingA plague of viruses biological, computer and marketing
A plague of viruses biological, computer and marketingUltraUploader
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
A method to detect metamorphic computer viruses
A method to detect metamorphic computer virusesA method to detect metamorphic computer viruses
A method to detect metamorphic computer virusesUltraUploader
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoriaUltraUploader
 
A fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsA fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsUltraUploader
 
A generic virus scanner in c++
A generic virus scanner in c++A generic virus scanner in c++
A generic virus scanner in c++UltraUploader
 
A public health approach to preventing malware propagation
A public health approach to preventing malware propagationA public health approach to preventing malware propagation
A public health approach to preventing malware propagationUltraUploader
 
A classification of viruses through recursion theorems
A classification of viruses through recursion theoremsA classification of viruses through recursion theorems
A classification of viruses through recursion theoremsUltraUploader
 
$$$ +$$+$$ _+_$+$$_$+$$$_+$$_$
$$$ +$$+$$ _+_$+$$_$+$$$_+$$_$$$$ +$$+$$ _+_$+$$_$+$$$_+$$_$
$$$ +$$+$$ _+_$+$$_$+$$$_+$$_$UltraUploader
 
A cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetA cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetUltraUploader
 
An approach towards disassembly of malicious binary executables
An approach towards disassembly of malicious binary executablesAn approach towards disassembly of malicious binary executables
An approach towards disassembly of malicious binary executablesUltraUploader
 
A method for detecting obfuscated calls in malicious binaries
A method for detecting obfuscated calls in malicious binariesA method for detecting obfuscated calls in malicious binaries
A method for detecting obfuscated calls in malicious binariesUltraUploader
 
An overview of unix rootkits
An overview of unix rootkitsAn overview of unix rootkits
An overview of unix rootkitsUltraUploader
 
A formal definition of computer worms and some related results
A formal definition of computer worms and some related resultsA formal definition of computer worms and some related results
A formal definition of computer worms and some related resultsUltraUploader
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manualeUltraUploader
 

Viewers also liked (18)

A framework for deception
A framework for deceptionA framework for deception
A framework for deception
 
A note on cohen's formal model for computer viruses
A note on cohen's formal model for computer virusesA note on cohen's formal model for computer viruses
A note on cohen's formal model for computer viruses
 
A hybrid model to detect malicious executables
A hybrid model to detect malicious executablesA hybrid model to detect malicious executables
A hybrid model to detect malicious executables
 
A plague of viruses biological, computer and marketing
A plague of viruses biological, computer and marketingA plague of viruses biological, computer and marketing
A plague of viruses biological, computer and marketing
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
A method to detect metamorphic computer viruses
A method to detect metamorphic computer virusesA method to detect metamorphic computer viruses
A method to detect metamorphic computer viruses
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
 
A fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsA fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flows
 
A generic virus scanner in c++
A generic virus scanner in c++A generic virus scanner in c++
A generic virus scanner in c++
 
A public health approach to preventing malware propagation
A public health approach to preventing malware propagationA public health approach to preventing malware propagation
A public health approach to preventing malware propagation
 
A classification of viruses through recursion theorems
A classification of viruses through recursion theoremsA classification of viruses through recursion theorems
A classification of viruses through recursion theorems
 
$$$ +$$+$$ _+_$+$$_$+$$$_+$$_$
$$$ +$$+$$ _+_$+$$_$+$$$_+$$_$$$$ +$$+$$ _+_$+$$_$+$$$_+$$_$
$$$ +$$+$$ _+_$+$$_$+$$$_+$$_$
 
A cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetA cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internet
 
An approach towards disassembly of malicious binary executables
An approach towards disassembly of malicious binary executablesAn approach towards disassembly of malicious binary executables
An approach towards disassembly of malicious binary executables
 
A method for detecting obfuscated calls in malicious binaries
A method for detecting obfuscated calls in malicious binariesA method for detecting obfuscated calls in malicious binaries
A method for detecting obfuscated calls in malicious binaries
 
An overview of unix rootkits
An overview of unix rootkitsAn overview of unix rootkits
An overview of unix rootkits
 
A formal definition of computer worms and some related results
A formal definition of computer worms and some related resultsA formal definition of computer worms and some related results
A formal definition of computer worms and some related results
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manuale
 

Similar to An introduction to computer viruses

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Virus
VirusVirus
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2maranan_zyra
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
Nishant Reshwal
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Information of Virus
Information of VirusInformation of Virus
Information of Virusjazz_306
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureUltraUploader
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
Abrish06
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 

Similar to An introduction to computer viruses (20)

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Virus
VirusVirus
Virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Lab 2
Lab 2Lab 2
Lab 2
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 

More from UltraUploader

01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hackingUltraUploader
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)UltraUploader
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manualUltraUploader
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...UltraUploader
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)UltraUploader
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)UltraUploader
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorUltraUploader
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applicationsUltraUploader
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...UltraUploader
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyUltraUploader
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesUltraUploader
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer virusesUltraUploader
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virologyUltraUploader
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksUltraUploader
 
Binary obfuscation using signals
Binary obfuscation using signalsBinary obfuscation using signals
Binary obfuscation using signalsUltraUploader
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityUltraUploader
 

More from UltraUploader (20)

1 (1)
1 (1)1 (1)
1 (1)
 
01 intro
01 intro01 intro
01 intro
 
01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hacking
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manual
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applications
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
 
Blast off!
Blast off!Blast off!
Blast off!
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassembly
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer viruses
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virology
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networks
 
Binary obfuscation using signals
Binary obfuscation using signalsBinary obfuscation using signals
Binary obfuscation using signals
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
Becoming positive
Becoming positiveBecoming positive
Becoming positive
 

An introduction to computer viruses

  • 1. An Introduction to Computer Viruses GEN008 GEN008 November 2000 An Introduction to Computer Viruses Ward Takamiya and Jocelyn Kasamoto Introduction ............................................................................................................................ 1 What is a Virus? ..................................................................................................................... 1 How Do Viruses Spread? ....................................................................................................... 1 How Can You Protect Yourself?............................................................................................ 2 Getting Anti-virus Software ................................................................................................... 2 Keeping it Current .................................................................................................................. 2 I May Have a Virus. Now What? .......................................................................................... 3 More Information ................................................................................................................... 3 Introduction This document covers the basics on computer viruses. Please take some time to peruse the information to obtain an overall understanding of the concern and how to safeguard yourself from the dangers of viruses. What is a Virus? A computer virus is one of thousands of programs that can invade computer systems (both IBM PC and Macintosh) and perform a variety of functions ranging from annoying (e.g., popping up messages as a joke) to dangerous (e.g., deleting files or destroying your hard disk). Trojan horses or worms are specific types of clandestine programs (loosely categorized as viruses) and can be just as dangerous. For simplicity’s sake, future mention of viruses in this document will refer to viruses, Trojan horses, and worms taken as a whole. How Do Viruses Spread? Computer viruses are programs that must be triggered or somehow executed before they can infect your computer system and spread to others. Examples include opening a document infected with a “macro virus,” booting with a diskette infected with a “boot sector” virus, or double-clicking on an infected program file. Viruses can then be spread by sharing infected files on a diskette, network drive, or other media, by exchanging infected files over the Internet via e-mail attachments, or by downloading questionable files from the Internet.
  • 2. Page 2 An Introduction to Computer Viruses GEN008 How Can You Protect Yourself? With dangerous viruses on the network, what can computer users do to protect their systems? Here are just a few hints: • Be sure to install an anti-virus software program (see the next section) to guard against virus attacks. Also, be sure you turn on the scanning features. It can’t protect you if it’s not enabled. • Practice caution when working with files from unknown or questionable sources. • Do not open e-mail attachments if you do not recognize the sender (though you may also receive viruses from people you know). Scan the attachments with anti-virus software before opening them. • Download files only from reputable Internet sites, and be wary when exchanging diskettes or other media with friends. • Scan your hard drive for viruses monthly. Even with these precautions, new viruses may find ways to enter your computer system. Getting Anti-virus Software Anti-virus software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted. The software can also be set to automatically scan diskettes when inserted into the disk drive, scan files when downloaded from the Internet, or scan e-mail when received. University of Hawai‘i faculty, staff, and students are eligible for a copy of one of the following ITS- supported anti-virus software programs free of charge: McAfee VirusScan for Windows (www.hawaii.edu/downloads/mcafee/virusscan.html), or Virex for Macintosh (www.hawaii.edu/downloads/mcafee/virex.html) Visit www.hawaii.edu/sitelic/antivirus for download information. The above site-licensed software are also on the ITS CD-ROM which is available at the ITS Help Desk in Keller Hall 105 on the Manoa campus. Note: Be sure to have only one anti-virus program running on your system. Multiple programs may cause conflicts and system instability. Keeping it Current Even with active monitoring of computer systems, anti-virus software can only protect against viruses that it knows about. For this reason, update files (generally called Definition Files) for anti-virus software are needed every time there is a new virus release. On the Windows platform, this means an update roughly every week; the Macintosh has fewer new viruses to worry about so updates are usually done monthly. The software that ITS distributes has an “Auto Update” feature to automatically connect to a Web site and download the latest Definition Files. Refer to the documentation to turn this feature on
  • 3. An Introduction to Computer Viruses GEN008 Page 3 and receive the maximum protection against viruses on your computer. Be sure to keep your Definition Files current! See links at the end of this document to download the latest Definition Files. I May Have a Virus. Now What? If your computer becomes infected with a virus, don’t panic! For most viruses, you can simply use your anti-virus program to scan and remove the virus. If your Definition Files are up-to-date, the program should be able to clean off all but the most recent viruses. In the case of rather nasty viruses, you may have some damaged files that cannot be fixed. Restore these from your backups. (You do make backups, don’t you?) Call the ITS Help Desk at 956-8883 if you need further assistance. More Information If you would like to be apprised of the latest major virus outbreaks by e-mail, join the UH virus alert listserv by sending e-mail to listproc@hawaii.edu and including in the body of the message: SUBSCRIBE UHVIRUS-ALERT Firstname Lastname with your first name and last name in the appropriate location. For more information about computer viruses, here are additional links to check out: For URL UH ITS Site License Anti- Virus Page (with links to downloads and documentation) www.hawaii.edu/sitelic/antivirus Installation Document for VirusScan for Windows www.hawaii.edu/itsdocs/index.html#virusscan Installation Document for Virex for Macintosh www.hawaii.edu/itsdocs/index.html#virex Virus Alerts for Windows www.hawaii.edu/sitelic/antivirus/pcalerts.html UH Technology News (includes Virus Alerts) www.hawaii.edu/technews Virus Alerts from McAfee (makers of VirusScan and Virex) www.mcafeeb2b.com/avert/virus-alerts/default.asp McAfee’s Virus Information Library www.mcafeeb2b.com/avert/virus-information- library/default.asp Latest Definition Files (DAT) to download www.mcafeeb2b.com/naicommon/download/dats/find.asp Symantec Virus Encyclopedia www.symantec.com/avcenter/vinfodb.html
  • 4. Page 4 An Introduction to Computer Viruses GEN008 For additional assistance, please phone the ITS Help Desk at (808) 956-8883, send e-mail to help@hawaii.edu, or fax (808) 956-2108. Or see the ITS Helpdesk home page at www.hawaii.edu/help The ITS Help Desk is located in Keller 105 on the UH Manoa Campus. The University of Hawai‘i is an equal opportunity/affirmative action institution.