SlideShare a Scribd company logo
Computer Viruses 
Ali F. Al Sarraf 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 1
Introduction 
 A computer virus is a program or piece of code that is loaded onto your computer 
without your knowledge and runs against your wishes. Viruses can also replicate 
themselves. All computer viruses are man-made. A simple virus that can make 
a copy of itself over and over again is relatively easy to produce. Even such a 
simple virus is dangerous because it will quickly use all available memory and 
bring the system to a halt. An even more dangerous type of virus is one capable of 
transmitting itself across networks and by passing security systems. 
 Since 1987, when a virus infected ARPANET, a large network used by the Defense 
Department and many universities, many antivirus programs have become 
available. These programs periodically check your computer system for the best-known 
types of viruses. 
 Some people distinguish between general viruses and worms. A worm is a special 
type of virus that can replicate itself and use memory, but cannot attach itself to 
other programs. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 2
History of Computers Viruses 
 Computer viruses have been around for a long, long time — pretty much as long as 
personal computing and mainstream software development — and they've been 
making international news since the Internet graduated from a researcher's toy to 
a tool for consumers. 
 If you've ever wondered what the first viruses were like and just how bad or 
dangerous they were, this info graphic should be an interesting read for you. And 
the Space Invaders graphics will be easy on your nerdy eyes, too. 
 While the first virus in this brief history coincided with the birth of the 3.5-inch 
floppy disk, a lot of the malware we see these days relies on social media or 
mobile apps for transmission, adequate proof (as if any was needed) that with any 
innovation comes an opportunity for exploitation. 
 The twist these days is that more viruses are specifically targeted to steal personal 
data and make money for their creators, which was not necessarily a goal for 
many of the virus-writing hackers of the late 1980s and early 1990s. In fact, 
according to this data, the first money-making computer virus didn't hit PCs until 
2003. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 3
Brain Virus – in 1986 
Origin - Pakistan 
 The first virus to infect PC Computers was discovered in 1986. named BRAIN, 
it spread around the world VIA FLOPPY DISKS. But was not meant to be a 
destructive virus, which is why authors included their name and contact 
information in the virus code. 
 The authors were identified as Brothers AMJAD FAROOD and BASIT FAROOD 
from Lahore, BAKISTAN. 
 Today the run a successful internet service provider called BRAIN 
TELECOMMUNICATION LTD. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 4
Brain Virus – in 1986 
Origin - Pakistan 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 5
Stoned Virus – 1987 
Origin – New Zealand 
 Before there was the World Wide Web, the computer viruses spread via 
floppy disks. One of the earliest was the 1987 boot-sector virus Stoned, which 
taunted infected users with the on-screen message, "Your computer is now 
stoned." 
 Several variants of the virus were written by copycats, ushering in the 
practice of hackers updating existing virus code to create more infections. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 6
Stoned Virus – 1987 
Origin – New Zealand 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 7
Form Virus – 1990 
Origin – Switzerland 
 Form was a boot sector virus isolated in Switzerland in the summer of 1990 
which became very common worldwide. The origin of Form is widely listed as 
Switzerland, but this may be an assumption based on its isolation locale. The 
only notable characteristics of Form are that it infects the boot sector instead 
of the Master Boot Record (MBR) and the clicking noises associated with some 
infections. Infections under Form can result in severe data damage if 
operating system characteristics are not identical to those Form assumes. 
 It is notable for arguably being the most common virus in the world for a 
period during the early 1990s. 
 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 8
Michelangelo Virus – 1991 
Origin – Australia 
 The Michelangelo virus is a computer virus first discovered in 4 February 1991 
in Australia The virus was designed to infect DOS systems, but did not engage the operating 
system or make any OS calls. Michelangelo, like all boot sector viruses, basically operated at 
the BIOS level. Each year, the virus remained dormant until March 6, the birthday 
of Renaissance artist Michelangelo. There is no reference to the artist in the virus, and it is 
doubtful that the virus writer intended Michelangelo to be referenced to the virus. 
Michelangelo is a variant of the already endemic Stoned virus. 
 On March 6, if the PC is an AT or a PS/2, the virus overwrites the first one hundred sectors of 
the hard disk with nulls. The virus assumes a geometry of 256 cylinders, 4 heads, 
17 sectors per track. Although all the user's data would still be on the hard disk, it would be 
irretrievable for the average user. 
 On hard disks, the virus moves the original master boot record to cylinder 0, head 0, sector 7. 
 On floppy disks, if the disk is 360 KB, the virus moves the original boot sector to cylinder 0, 
head 1, sector 3. 
 On other disks, the virus moves the original boot sector to cylinder 0, head 1, sector 14. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 9
Michelangelo Virus – 1991 
Origin – Australia 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 10
VCL Virus – 1992 
Origin – USA 
 The Virus Creation Laboratory, or VCL, as it is known, was one of the earliest 
attempts to provide a virus creation tool so that individuals with little to no 
programming expertise could mass-create computer viruses. 
 A hacker dubbed "Nowhere Man", of the NUKE hacker group, released it in 
July 1992. 
 However, it was later discovered that viruses created with the Virus Creation 
Laboratory were often ineffective, as many anti-virus programs of the day 
caught them easily. Also, many viruses created by the program did not work 
at all - and often, their source codes could not be compiled. Due to a limited 
feature set and bugs, the Virus Creation Laboratory did not become popular 
with virus writers, who preferred to write their own. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 11
VCL Virus – 1992 
Origin – USA 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 12
HAPPY 99 Virus – 1999 
Origin – Unknown 
 Happy 99 was the first email virus, it greeted you with “ happy new year “ 
and emailed it self to all contacts in your address book. 
 Like the very first PC viruses, happy 99 did not cause any real damage, though 
it did spread to millions of PCS around the world. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 13
Love letter Virus – 2000 
Origin – Philippines 
 ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that 
attacked tens of millions of Windows personal computers on and after 5 May 
2000 local time in the Philippines when it started spreading as an email 
message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR- 
YOU.txt.vbs". The latter file extension (in this case, 'VBS' - a type 
of interpreted file) was most often hidden by default on Windows computers 
of the time, leading unwitting users to think it was a normal text file. 
Opening the attachment activated the Visual Basic script. The worm did 
damage on the local machine, overwriting image files, and sent a copy of 
itself to the first 50 addresses in the Windows Address Book used by Microsoft 
Outlook. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 14
Love letter Virus – 2000 
Origin – Philippines 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 15
SASSER Virus – 2004 
Origin – Germany 
 Sasser was first noticed and started spreading on April 30, 2004. This worm 
was named Sasser because it spreads by exploiting a buffer overflow in the 
component known as LSASS (Local Security Authority Subsystem Service) on 
the affected operating systems. The worm scans different ranges of IP 
addresses and connects to victims' computers primarily through TCP port 445. 
Microsoft's analysis of the worm indicates that it may also spread through port 
139. Several variants called Sasser.B, Sasser.C, and Sasser.D appeared within 
days (with the original named Sasser.A). The LSASS vulnerability was patched 
by Microsoft in the April 2004 installment of its monthly security packages, 
prior to the release of the worm. Some technology specialists have speculated 
that the worm writers reverse-engineered the patch to discover the 
vulnerability, which would open millions of computers whose operating system 
had not been upgraded with the security update 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 16
SASSER Virus – 2004 
Origin – Germany 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 17
Types Of Viruses 
1. Boot Sector Virus 
 The term “boot sector” is a generic name that seems to originally come from 
MS-DOS but is now applied generally to the boot information used by any 
operating system. In modern computers this is usually called the “master boot 
record,” and it is the first sector on a partitioned storage device. 
 Boot sector viruses became popular because of the use of floppy disks to boot 
a computer. The widespread usage of the Internet and the death of the floppy 
has made other means of virus transmission more effective. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 18
Types Of Viruses 
2. Browser Hijacker 
 This type of virus, which can spread itself in numerous ways including 
voluntary download, effectively hijacks certain browser functions, usually in 
the form of re-directing the user automatically to particular sites. It’s usually 
assumed that this tactic is designed to increase revenue from web 
advertisements. 
 There are a lot of such viruses, and they usually have “search” included 
somewhere in their description. Cool Web Search may be the most well known 
example, but others are nearly as common. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 19
Types Of Viruses 
3. Direct Action Virus 
 This type of virus, unlike most, only comes into action when the file 
containing the virus is executed. The payload is delivered and then the virus 
essentially becomes dormant – it takes no other action unless an infected file 
is executed again. 
 Most viruses do not use the direct action method of reproduction simply 
because it is not prolific, but viruses of this type have done damage in the 
past. The Vienna virus, which briefly threatened computers in 1988, is one 
such example of a direct action virus. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 20
Types Of Viruses 
4. File Infector Virus 
 Perhaps the most common type of virus, the file infector takes root in a host 
file and then begins its operation when the file is executed. The virus may 
completely overwrite the file that it infects, or may only replace parts of the 
file, or may not replace anything but instead re-write the file so that the 
virus is executed rather than the program the user intended. 
 Although called a “file virus” the definition doesn’t apply to all viruses in all 
files generally – for example, the macro virus below is not referred to by the 
file virus. Instead, the definition is usually meant to refer only to viruses 
which use an executable file format, such as .exe, as their host. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 21
Types Of Viruses 
5. Macro Virus 
 A wide variety of programs, including productivity applications like Microsoft 
Excel, provide support for Macros – special actions programmed into the 
document using a specific macro programming language. Unfortunately, this 
makes it possible for a virus to be hidden inside a seemingly benign 
document. 
 Macro viruses very widely in terms of payload. The most well known macro 
virus is probably Melissa, a Word document supposedly containing the 
passwords to pornographic websites. The virus also exploited Word’s link to 
Microsoft Outlook in order to automatically email copies of itself. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 22
Types Of Viruses 
6. Multipartite Virus 
 While some viruses are happy to spread via one method or deliver a single 
payload, Multipartite viruses want it all. A virus of this type may spread in 
multiple ways, and it may take different actions on an infected computer 
depending on variables, such as the operating system installed or the 
existence of certain files. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 23
Types Of Viruses 
7. Polymorphic Virus 
 Another jack-of-all-trades, the Polymorphic virus actually mutates over time 
or after every execution, changing the code used to deliver its payload. 
Alternatively, or in addition, a Polymorphic virus may guard itself with an 
encryption algorithm that automatically alters itself when certain conditions 
are met. 
 The goal of this trickery is evasion. Antivirus programs often find viruses by 
the specific code used. Obscuring or changing the code of a virus can help it 
avoid detection. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 24
Types Of Viruses 
8. Resident Virus 
 This broad virus definition applies to any virus that inserts itself into a 
system’s memory. It then may take any number of actions and run 
independently of the file that was originally infected. 
 A resident virus can be compared to a direct payload virus, which does not 
insert itself into the system’s memory and therefore only takes action when 
an infected file is executed. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 25
Types Of Viruses 
9. Web Scripting Virus 
 Many websites execute complex code in order to provide interesting content. 
Displaying online video in your browser, for example, requires the execution 
of a specific code language that provides both the video itself and the player 
interface. 
 Of course, this code can sometimes be exploited, making it possible for a 
virus to infect a computer or take actions on a computer through a website. 
Although malicious sites are sometimes created with purposely infected code, 
many such cases of virus exist because of code inserted into a site without the 
webmaster’s knowledge. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 26
10 Simple Tips to Protect PC from Viruses 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 27
10 Simple Tips to Protect PC from Viruses 
1. The first thing I would recommend – is to read about current viruses. It is 
difficult to protect your computer from viruses if you do not even know what 
they are. You can get it from here: http://www.securelist.com/en/ 
2. If you really care about the security of your computer, arm it with the best 
anti-virus software. If you do not have antivirus software on your computer, then 
you probably get some virus in the first hour of work on the Internet. It’s easy! In 
addition to paying Kaspersky, Norton and free Avast, Microsoft Security Essentials 
is Best and Free. 
3. Also update your antivirus software as often as possible. Typically, antivirus 
software is updated every day. Do not forget to do it manually, if not configured 
to automatically update. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 28
10 Simple Tips to Protect PC from Viruses 
4. Be sensible: do not visit untrusted websites containing illegal software, links, 
etc. 
5. Update need not only anti-virus, but the whole system too Windows update. 
These updates include improved security systems that will help in the fight 
against viruses and other problems. Remember: If you do not perform regular 
updates to Windows, you leave your computer in a vulnerable state. 
6. The main channel of the spread of viruses is e-mail. Be careful with e-mails, 
when you have something to bother them, it is better not to open. These days a 
lot of mails are phishing mails that redirects you to fake webpages. So, avoid 
opening such mails. 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 29
10 Simple Tips to Protect PC from Viruses 
7. If you are serious about protecting your computer, you can change your e-mail 
and receive only text messages. You can also disable the ability to open email 
attachments. This is what Hotmail, Gmail and Yahoo mails are doing by default. 
8. Do not use peer (p2p) network. Such programs include for example, Torrents. 
These programs allow you to download files from other users. You have no way of 
knowing that you’re actually downloading, until the file is completely 
downloaded to your computer. 
9. Download files only from reliable web sites and sources. Of course, it is 
impossible do not download anything, but you must remember that the file that 
you download may not match the name and content. 
10. Make sure that your computer has a firewall. Windows comes with built-in 
firewall, but you can use any other (eg, Zone Alarm). If you don’t have other 
firewall, then enable default Windows Firewall 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 30
The End 
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 31

More Related Content

What's hot

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
Mohak Jain
 
Computer virus
Computer virusComputer virus
Computer virus
Utchi
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Computer virus
Computer virusComputer virus
Computer virus
Aarya Khanal
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Annies Minu
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
Adeel Rasheed
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 

What's hot (20)

Antivirus
AntivirusAntivirus
Antivirus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Presentation2
Presentation2Presentation2
Presentation2
 

Viewers also liked

Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
San Diego Continuing Education
 
Virus part1
Virus part1Virus part1
Virus part1
Ajay Banyal
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
Rohit Kashyap
 
Central processing unit
Central processing unitCentral processing unit
Central processing unitmariolinov
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
guest5fd01d
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
guest7453829
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
tayyaba rashid
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Annies Minu
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 

Viewers also liked (18)

Viruses And Hacking
Viruses And HackingViruses And Hacking
Viruses And Hacking
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Virus part1
Virus part1Virus part1
Virus part1
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Central processing unit
Central processing unitCentral processing unit
Central processing unit
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Virus ppt
Virus pptVirus ppt
Virus ppt
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 

Similar to Computer viruses

History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
Ammy Vijay
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
kamrannasiriiui
 
Anti virus
Anti virusAnti virus
Anti virus
LauratHarun
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
Lihtnes1
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
Shah Rashedul LastHaque
 
Computer virus
Computer virusComputer virus
Computer virus
BGS Model Public School
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Dark Side
 
Viruses
VirusesViruses
Viruses
yuvan80
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
VijayPatidar71
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
NORTHCUSTOMS
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
PrinceYdvz
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
Priyanka Aggarwal
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
AsimRaza464161
 
Viruses
VirusesViruses
Viruses
AlyssaFerrer7
 
Computer virus
Computer virusComputer virus
Computer virus
Shailendra Gohil
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
Computer viruses
Computer virusesComputer viruses
Computer virusesshopnil786
 
Virus09
Virus09Virus09
Virus09defler
 

Similar to Computer viruses (20)

History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Anti virus
Anti virusAnti virus
Anti virus
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses
VirusesViruses
Viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus09
Virus09Virus09
Virus09
 

Recently uploaded

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 

Recently uploaded (20)

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 

Computer viruses

  • 1. Computer Viruses Ali F. Al Sarraf Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 1
  • 2. Introduction  A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and by passing security systems.  Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.  Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 2
  • 3. History of Computers Viruses  Computer viruses have been around for a long, long time — pretty much as long as personal computing and mainstream software development — and they've been making international news since the Internet graduated from a researcher's toy to a tool for consumers.  If you've ever wondered what the first viruses were like and just how bad or dangerous they were, this info graphic should be an interesting read for you. And the Space Invaders graphics will be easy on your nerdy eyes, too.  While the first virus in this brief history coincided with the birth of the 3.5-inch floppy disk, a lot of the malware we see these days relies on social media or mobile apps for transmission, adequate proof (as if any was needed) that with any innovation comes an opportunity for exploitation.  The twist these days is that more viruses are specifically targeted to steal personal data and make money for their creators, which was not necessarily a goal for many of the virus-writing hackers of the late 1980s and early 1990s. In fact, according to this data, the first money-making computer virus didn't hit PCs until 2003. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 3
  • 4. Brain Virus – in 1986 Origin - Pakistan  The first virus to infect PC Computers was discovered in 1986. named BRAIN, it spread around the world VIA FLOPPY DISKS. But was not meant to be a destructive virus, which is why authors included their name and contact information in the virus code.  The authors were identified as Brothers AMJAD FAROOD and BASIT FAROOD from Lahore, BAKISTAN.  Today the run a successful internet service provider called BRAIN TELECOMMUNICATION LTD. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 4
  • 5. Brain Virus – in 1986 Origin - Pakistan Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 5
  • 6. Stoned Virus – 1987 Origin – New Zealand  Before there was the World Wide Web, the computer viruses spread via floppy disks. One of the earliest was the 1987 boot-sector virus Stoned, which taunted infected users with the on-screen message, "Your computer is now stoned."  Several variants of the virus were written by copycats, ushering in the practice of hackers updating existing virus code to create more infections. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 6
  • 7. Stoned Virus – 1987 Origin – New Zealand Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 7
  • 8. Form Virus – 1990 Origin – Switzerland  Form was a boot sector virus isolated in Switzerland in the summer of 1990 which became very common worldwide. The origin of Form is widely listed as Switzerland, but this may be an assumption based on its isolation locale. The only notable characteristics of Form are that it infects the boot sector instead of the Master Boot Record (MBR) and the clicking noises associated with some infections. Infections under Form can result in severe data damage if operating system characteristics are not identical to those Form assumes.  It is notable for arguably being the most common virus in the world for a period during the early 1990s.  Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 8
  • 9. Michelangelo Virus – 1991 Origin – Australia  The Michelangelo virus is a computer virus first discovered in 4 February 1991 in Australia The virus was designed to infect DOS systems, but did not engage the operating system or make any OS calls. Michelangelo, like all boot sector viruses, basically operated at the BIOS level. Each year, the virus remained dormant until March 6, the birthday of Renaissance artist Michelangelo. There is no reference to the artist in the virus, and it is doubtful that the virus writer intended Michelangelo to be referenced to the virus. Michelangelo is a variant of the already endemic Stoned virus.  On March 6, if the PC is an AT or a PS/2, the virus overwrites the first one hundred sectors of the hard disk with nulls. The virus assumes a geometry of 256 cylinders, 4 heads, 17 sectors per track. Although all the user's data would still be on the hard disk, it would be irretrievable for the average user.  On hard disks, the virus moves the original master boot record to cylinder 0, head 0, sector 7.  On floppy disks, if the disk is 360 KB, the virus moves the original boot sector to cylinder 0, head 1, sector 3.  On other disks, the virus moves the original boot sector to cylinder 0, head 1, sector 14. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 9
  • 10. Michelangelo Virus – 1991 Origin – Australia Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 10
  • 11. VCL Virus – 1992 Origin – USA  The Virus Creation Laboratory, or VCL, as it is known, was one of the earliest attempts to provide a virus creation tool so that individuals with little to no programming expertise could mass-create computer viruses.  A hacker dubbed "Nowhere Man", of the NUKE hacker group, released it in July 1992.  However, it was later discovered that viruses created with the Virus Creation Laboratory were often ineffective, as many anti-virus programs of the day caught them easily. Also, many viruses created by the program did not work at all - and often, their source codes could not be compiled. Due to a limited feature set and bugs, the Virus Creation Laboratory did not become popular with virus writers, who preferred to write their own. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 11
  • 12. VCL Virus – 1992 Origin – USA Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 12
  • 13. HAPPY 99 Virus – 1999 Origin – Unknown  Happy 99 was the first email virus, it greeted you with “ happy new year “ and emailed it self to all contacts in your address book.  Like the very first PC viruses, happy 99 did not cause any real damage, though it did spread to millions of PCS around the world. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 13
  • 14. Love letter Virus – 2000 Origin – Philippines  ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR- YOU.txt.vbs". The latter file extension (in this case, 'VBS' - a type of interpreted file) was most often hidden by default on Windows computers of the time, leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. The worm did damage on the local machine, overwriting image files, and sent a copy of itself to the first 50 addresses in the Windows Address Book used by Microsoft Outlook. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 14
  • 15. Love letter Virus – 2000 Origin – Philippines Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 15
  • 16. SASSER Virus – 2004 Origin – Germany  Sasser was first noticed and started spreading on April 30, 2004. This worm was named Sasser because it spreads by exploiting a buffer overflow in the component known as LSASS (Local Security Authority Subsystem Service) on the affected operating systems. The worm scans different ranges of IP addresses and connects to victims' computers primarily through TCP port 445. Microsoft's analysis of the worm indicates that it may also spread through port 139. Several variants called Sasser.B, Sasser.C, and Sasser.D appeared within days (with the original named Sasser.A). The LSASS vulnerability was patched by Microsoft in the April 2004 installment of its monthly security packages, prior to the release of the worm. Some technology specialists have speculated that the worm writers reverse-engineered the patch to discover the vulnerability, which would open millions of computers whose operating system had not been upgraded with the security update Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 16
  • 17. SASSER Virus – 2004 Origin – Germany Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 17
  • 18. Types Of Viruses 1. Boot Sector Virus  The term “boot sector” is a generic name that seems to originally come from MS-DOS but is now applied generally to the boot information used by any operating system. In modern computers this is usually called the “master boot record,” and it is the first sector on a partitioned storage device.  Boot sector viruses became popular because of the use of floppy disks to boot a computer. The widespread usage of the Internet and the death of the floppy has made other means of virus transmission more effective. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 18
  • 19. Types Of Viruses 2. Browser Hijacker  This type of virus, which can spread itself in numerous ways including voluntary download, effectively hijacks certain browser functions, usually in the form of re-directing the user automatically to particular sites. It’s usually assumed that this tactic is designed to increase revenue from web advertisements.  There are a lot of such viruses, and they usually have “search” included somewhere in their description. Cool Web Search may be the most well known example, but others are nearly as common. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 19
  • 20. Types Of Viruses 3. Direct Action Virus  This type of virus, unlike most, only comes into action when the file containing the virus is executed. The payload is delivered and then the virus essentially becomes dormant – it takes no other action unless an infected file is executed again.  Most viruses do not use the direct action method of reproduction simply because it is not prolific, but viruses of this type have done damage in the past. The Vienna virus, which briefly threatened computers in 1988, is one such example of a direct action virus. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 20
  • 21. Types Of Viruses 4. File Infector Virus  Perhaps the most common type of virus, the file infector takes root in a host file and then begins its operation when the file is executed. The virus may completely overwrite the file that it infects, or may only replace parts of the file, or may not replace anything but instead re-write the file so that the virus is executed rather than the program the user intended.  Although called a “file virus” the definition doesn’t apply to all viruses in all files generally – for example, the macro virus below is not referred to by the file virus. Instead, the definition is usually meant to refer only to viruses which use an executable file format, such as .exe, as their host. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 21
  • 22. Types Of Viruses 5. Macro Virus  A wide variety of programs, including productivity applications like Microsoft Excel, provide support for Macros – special actions programmed into the document using a specific macro programming language. Unfortunately, this makes it possible for a virus to be hidden inside a seemingly benign document.  Macro viruses very widely in terms of payload. The most well known macro virus is probably Melissa, a Word document supposedly containing the passwords to pornographic websites. The virus also exploited Word’s link to Microsoft Outlook in order to automatically email copies of itself. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 22
  • 23. Types Of Viruses 6. Multipartite Virus  While some viruses are happy to spread via one method or deliver a single payload, Multipartite viruses want it all. A virus of this type may spread in multiple ways, and it may take different actions on an infected computer depending on variables, such as the operating system installed or the existence of certain files. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 23
  • 24. Types Of Viruses 7. Polymorphic Virus  Another jack-of-all-trades, the Polymorphic virus actually mutates over time or after every execution, changing the code used to deliver its payload. Alternatively, or in addition, a Polymorphic virus may guard itself with an encryption algorithm that automatically alters itself when certain conditions are met.  The goal of this trickery is evasion. Antivirus programs often find viruses by the specific code used. Obscuring or changing the code of a virus can help it avoid detection. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 24
  • 25. Types Of Viruses 8. Resident Virus  This broad virus definition applies to any virus that inserts itself into a system’s memory. It then may take any number of actions and run independently of the file that was originally infected.  A resident virus can be compared to a direct payload virus, which does not insert itself into the system’s memory and therefore only takes action when an infected file is executed. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 25
  • 26. Types Of Viruses 9. Web Scripting Virus  Many websites execute complex code in order to provide interesting content. Displaying online video in your browser, for example, requires the execution of a specific code language that provides both the video itself and the player interface.  Of course, this code can sometimes be exploited, making it possible for a virus to infect a computer or take actions on a computer through a website. Although malicious sites are sometimes created with purposely infected code, many such cases of virus exist because of code inserted into a site without the webmaster’s knowledge. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 26
  • 27. 10 Simple Tips to Protect PC from Viruses Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 27
  • 28. 10 Simple Tips to Protect PC from Viruses 1. The first thing I would recommend – is to read about current viruses. It is difficult to protect your computer from viruses if you do not even know what they are. You can get it from here: http://www.securelist.com/en/ 2. If you really care about the security of your computer, arm it with the best anti-virus software. If you do not have antivirus software on your computer, then you probably get some virus in the first hour of work on the Internet. It’s easy! In addition to paying Kaspersky, Norton and free Avast, Microsoft Security Essentials is Best and Free. 3. Also update your antivirus software as often as possible. Typically, antivirus software is updated every day. Do not forget to do it manually, if not configured to automatically update. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 28
  • 29. 10 Simple Tips to Protect PC from Viruses 4. Be sensible: do not visit untrusted websites containing illegal software, links, etc. 5. Update need not only anti-virus, but the whole system too Windows update. These updates include improved security systems that will help in the fight against viruses and other problems. Remember: If you do not perform regular updates to Windows, you leave your computer in a vulnerable state. 6. The main channel of the spread of viruses is e-mail. Be careful with e-mails, when you have something to bother them, it is better not to open. These days a lot of mails are phishing mails that redirects you to fake webpages. So, avoid opening such mails. Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 29
  • 30. 10 Simple Tips to Protect PC from Viruses 7. If you are serious about protecting your computer, you can change your e-mail and receive only text messages. You can also disable the ability to open email attachments. This is what Hotmail, Gmail and Yahoo mails are doing by default. 8. Do not use peer (p2p) network. Such programs include for example, Torrents. These programs allow you to download files from other users. You have no way of knowing that you’re actually downloading, until the file is completely downloaded to your computer. 9. Download files only from reliable web sites and sources. Of course, it is impossible do not download anything, but you must remember that the file that you download may not match the name and content. 10. Make sure that your computer has a firewall. Windows comes with built-in firewall, but you can use any other (eg, Zone Alarm). If you don’t have other firewall, then enable default Windows Firewall Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 30
  • 31. The End Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 31