antivirus software: consists of history, identification methods, popular anti viruses in the market, pros and issues of it.
Extremely basic ppt- can be used for college presentations & competitions- doesnt have enough info to be the winner, but certainly useful. :)
antivirus software: consists of history, identification methods, popular anti viruses in the market, pros and issues of it.
Extremely basic ppt- can be used for college presentations & competitions- doesnt have enough info to be the winner, but certainly useful. :)
Computer Virus, Types of Viruses, Working of Virus, Methods to Prevent From Virus, How Virus Spreads, How a computer gets a virus, How are viruses removed, What is antivirus, How anti virus works,
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
OBJECTIVES
Introduction
What Is Virus?
Why Virus Are Called “Virus”?
How Do Virus Spread?
Virus Operation
How Virus work?
Common Virus Entry Points
Symptoms Of Virus Attack
Types of Computer Virus
Techniques used by Viruses
Anti-Virus Software
Methods used by Antivirus Software
Actions to Prevent Virus Infection
Conclusion
This Presentation explains about Firewalls, Viruses and Antiviruses. I hope this presentation may help you in understanding about Viruses, Firewall and Antiviruses Software.
Computer Virus, Types of Viruses, Working of Virus, Methods to Prevent From Virus, How Virus Spreads, How a computer gets a virus, How are viruses removed, What is antivirus, How anti virus works,
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
OBJECTIVES
Introduction
What Is Virus?
Why Virus Are Called “Virus”?
How Do Virus Spread?
Virus Operation
How Virus work?
Common Virus Entry Points
Symptoms Of Virus Attack
Types of Computer Virus
Techniques used by Viruses
Anti-Virus Software
Methods used by Antivirus Software
Actions to Prevent Virus Infection
Conclusion
This Presentation explains about Firewalls, Viruses and Antiviruses. I hope this presentation may help you in understanding about Viruses, Firewall and Antiviruses Software.
Of course, you want to run a scan regularly to make sure that you're
clean, but more importantly, you need to make sure you're actually
protected in the first place. If you only scan your computer when it starts
slowing down, then you're only dealing with the problem after it happens.
When the home computer market really started to take off in the mid1990s, many users actually wound up replacing their computers when
they started to slow down thanks to virus infections. This was before
these new PC users really knew what viruses were, as they just assumed
that a two-year-old computer running at a snail's crawl was just "showing
its age." Really, this is comparable to trading your car in when all it
needed was an oil change.
THE DEFINITION OF A VIRUS- A BRIEF HISTORY OF THE COMPUTER VIRUS- Why People Make Viruses- Protecting your Computer- WHAT YOU SHOULD LOOK FOR IN COMPUTER
SECURITY SOFTWARE
Description : Massfluence is a revolutionary new technology that builds sites that grow automatically with push-button viral communities, displays your business information and events, and auto-sells your courses and products in one place.
Now, for the First Time Ever. Auto-build ‘Next Generation’ Sites that Sell Products, Generate Leads, & Build Raving Fans on Autopilot. All in One Place – With No Experience Needed. MassFluence solves this by building NEW types of sites that auto-grow viral communities w/ gamification right on them while selling your products – for autopilot leads & sales.
Massfluence bundle deal will save you tons of money if you would like to get FE and all the OTOs of Massfluence . With this bundle you can get the whole funnel, all the upsells and OTO’s at a one time price of $267. Here’s everything you are getting: FE - Massfluence Professional, OTO 1 - Massfluence Gold, OTO 2 - Massfluence Ruby, OTO 3 - Massfluence Platinum, OTO 4 - Massfluence Rewardsly Special, OTO 5 - Massfluence Forrk Special, OTO 6 - Massfluence PlayPix Special, and all the bonuses.
With Massfluence bundle deal, you're getting the same amazing technology and training regular Massfluence front-end customers got, plus the essential upgrades needed to shave weeks of time and build an incredible brand that gets traffic faster. Besides, Your low investment is protected by a 30-day money-back guarantee. Go ahead now, and secure your order before the price increases.
HERE’S WHAT YOU GET WITH LIMITED TIME MASSFLUENCE DISCOUNTED BUNDLE TODAY:
Massfluence is a website builder that allows you to build sites that grow automatically with push-button viral communities, displays your business information and events, and auto-sells your courses and products in one place. Front-end offer includes:
Tutorials & 24-7 Support
Create Resource & Blog Channels
Autoresponder Integration
Gamification Technology
Create & Run Events
Sell Digital or Physical Products
Upload and Host Courses
Live Chat and Direct Messaging
Viral Link Referral Technology
Video & Voice Marketing Tech.
QR Code Technology
20 DFY Templates
Make 100 Sites
Make 500 Private or Public Groups
Commercial Rights (Sell to Businesses)Agency Rights - 15 Accounts
The top sources of virus attacks are highlighted below: Downloadable Programs Cracked Software Email Attachments Internet Booting From CD. 10. Best antivirus software. Norton antivirus. MacAfee virus scan Kaspersky antivirus. 11. Norton antivirus Norton antivirus is a product of Symantec corporation.The top sources of virus attacks are highlighted below: Downloadable Programs Cracked Software Email Attachments Internet Booting From CD. 10. Best antivirus software. Norton antivirus. MacAfee virus scan Kaspersky antivirus. 11. Norton antivirus Norton antivirus is a product of Symantec corporation.
A computer virus is a type of malicious software, or malware, that spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1. Computer Viruses
Ali F. Al Sarraf
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 1
2. Introduction
A computer virus is a program or piece of code that is loaded onto your computer
without your knowledge and runs against your wishes. Viruses can also replicate
themselves. All computer viruses are man-made. A simple virus that can make
a copy of itself over and over again is relatively easy to produce. Even such a
simple virus is dangerous because it will quickly use all available memory and
bring the system to a halt. An even more dangerous type of virus is one capable of
transmitting itself across networks and by passing security systems.
Since 1987, when a virus infected ARPANET, a large network used by the Defense
Department and many universities, many antivirus programs have become
available. These programs periodically check your computer system for the best-known
types of viruses.
Some people distinguish between general viruses and worms. A worm is a special
type of virus that can replicate itself and use memory, but cannot attach itself to
other programs.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 2
3. History of Computers Viruses
Computer viruses have been around for a long, long time — pretty much as long as
personal computing and mainstream software development — and they've been
making international news since the Internet graduated from a researcher's toy to
a tool for consumers.
If you've ever wondered what the first viruses were like and just how bad or
dangerous they were, this info graphic should be an interesting read for you. And
the Space Invaders graphics will be easy on your nerdy eyes, too.
While the first virus in this brief history coincided with the birth of the 3.5-inch
floppy disk, a lot of the malware we see these days relies on social media or
mobile apps for transmission, adequate proof (as if any was needed) that with any
innovation comes an opportunity for exploitation.
The twist these days is that more viruses are specifically targeted to steal personal
data and make money for their creators, which was not necessarily a goal for
many of the virus-writing hackers of the late 1980s and early 1990s. In fact,
according to this data, the first money-making computer virus didn't hit PCs until
2003.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 3
4. Brain Virus – in 1986
Origin - Pakistan
The first virus to infect PC Computers was discovered in 1986. named BRAIN,
it spread around the world VIA FLOPPY DISKS. But was not meant to be a
destructive virus, which is why authors included their name and contact
information in the virus code.
The authors were identified as Brothers AMJAD FAROOD and BASIT FAROOD
from Lahore, BAKISTAN.
Today the run a successful internet service provider called BRAIN
TELECOMMUNICATION LTD.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 4
5. Brain Virus – in 1986
Origin - Pakistan
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 5
6. Stoned Virus – 1987
Origin – New Zealand
Before there was the World Wide Web, the computer viruses spread via
floppy disks. One of the earliest was the 1987 boot-sector virus Stoned, which
taunted infected users with the on-screen message, "Your computer is now
stoned."
Several variants of the virus were written by copycats, ushering in the
practice of hackers updating existing virus code to create more infections.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 6
7. Stoned Virus – 1987
Origin – New Zealand
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 7
8. Form Virus – 1990
Origin – Switzerland
Form was a boot sector virus isolated in Switzerland in the summer of 1990
which became very common worldwide. The origin of Form is widely listed as
Switzerland, but this may be an assumption based on its isolation locale. The
only notable characteristics of Form are that it infects the boot sector instead
of the Master Boot Record (MBR) and the clicking noises associated with some
infections. Infections under Form can result in severe data damage if
operating system characteristics are not identical to those Form assumes.
It is notable for arguably being the most common virus in the world for a
period during the early 1990s.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 8
9. Michelangelo Virus – 1991
Origin – Australia
The Michelangelo virus is a computer virus first discovered in 4 February 1991
in Australia The virus was designed to infect DOS systems, but did not engage the operating
system or make any OS calls. Michelangelo, like all boot sector viruses, basically operated at
the BIOS level. Each year, the virus remained dormant until March 6, the birthday
of Renaissance artist Michelangelo. There is no reference to the artist in the virus, and it is
doubtful that the virus writer intended Michelangelo to be referenced to the virus.
Michelangelo is a variant of the already endemic Stoned virus.
On March 6, if the PC is an AT or a PS/2, the virus overwrites the first one hundred sectors of
the hard disk with nulls. The virus assumes a geometry of 256 cylinders, 4 heads,
17 sectors per track. Although all the user's data would still be on the hard disk, it would be
irretrievable for the average user.
On hard disks, the virus moves the original master boot record to cylinder 0, head 0, sector 7.
On floppy disks, if the disk is 360 KB, the virus moves the original boot sector to cylinder 0,
head 1, sector 3.
On other disks, the virus moves the original boot sector to cylinder 0, head 1, sector 14.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 9
10. Michelangelo Virus – 1991
Origin – Australia
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 10
11. VCL Virus – 1992
Origin – USA
The Virus Creation Laboratory, or VCL, as it is known, was one of the earliest
attempts to provide a virus creation tool so that individuals with little to no
programming expertise could mass-create computer viruses.
A hacker dubbed "Nowhere Man", of the NUKE hacker group, released it in
July 1992.
However, it was later discovered that viruses created with the Virus Creation
Laboratory were often ineffective, as many anti-virus programs of the day
caught them easily. Also, many viruses created by the program did not work
at all - and often, their source codes could not be compiled. Due to a limited
feature set and bugs, the Virus Creation Laboratory did not become popular
with virus writers, who preferred to write their own.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 11
12. VCL Virus – 1992
Origin – USA
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 12
13. HAPPY 99 Virus – 1999
Origin – Unknown
Happy 99 was the first email virus, it greeted you with “ happy new year “
and emailed it self to all contacts in your address book.
Like the very first PC viruses, happy 99 did not cause any real damage, though
it did spread to millions of PCS around the world.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 13
14. Love letter Virus – 2000
Origin – Philippines
ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that
attacked tens of millions of Windows personal computers on and after 5 May
2000 local time in the Philippines when it started spreading as an email
message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-
YOU.txt.vbs". The latter file extension (in this case, 'VBS' - a type
of interpreted file) was most often hidden by default on Windows computers
of the time, leading unwitting users to think it was a normal text file.
Opening the attachment activated the Visual Basic script. The worm did
damage on the local machine, overwriting image files, and sent a copy of
itself to the first 50 addresses in the Windows Address Book used by Microsoft
Outlook.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 14
15. Love letter Virus – 2000
Origin – Philippines
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 15
16. SASSER Virus – 2004
Origin – Germany
Sasser was first noticed and started spreading on April 30, 2004. This worm
was named Sasser because it spreads by exploiting a buffer overflow in the
component known as LSASS (Local Security Authority Subsystem Service) on
the affected operating systems. The worm scans different ranges of IP
addresses and connects to victims' computers primarily through TCP port 445.
Microsoft's analysis of the worm indicates that it may also spread through port
139. Several variants called Sasser.B, Sasser.C, and Sasser.D appeared within
days (with the original named Sasser.A). The LSASS vulnerability was patched
by Microsoft in the April 2004 installment of its monthly security packages,
prior to the release of the worm. Some technology specialists have speculated
that the worm writers reverse-engineered the patch to discover the
vulnerability, which would open millions of computers whose operating system
had not been upgraded with the security update
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 16
17. SASSER Virus – 2004
Origin – Germany
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 17
18. Types Of Viruses
1. Boot Sector Virus
The term “boot sector” is a generic name that seems to originally come from
MS-DOS but is now applied generally to the boot information used by any
operating system. In modern computers this is usually called the “master boot
record,” and it is the first sector on a partitioned storage device.
Boot sector viruses became popular because of the use of floppy disks to boot
a computer. The widespread usage of the Internet and the death of the floppy
has made other means of virus transmission more effective.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 18
19. Types Of Viruses
2. Browser Hijacker
This type of virus, which can spread itself in numerous ways including
voluntary download, effectively hijacks certain browser functions, usually in
the form of re-directing the user automatically to particular sites. It’s usually
assumed that this tactic is designed to increase revenue from web
advertisements.
There are a lot of such viruses, and they usually have “search” included
somewhere in their description. Cool Web Search may be the most well known
example, but others are nearly as common.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 19
20. Types Of Viruses
3. Direct Action Virus
This type of virus, unlike most, only comes into action when the file
containing the virus is executed. The payload is delivered and then the virus
essentially becomes dormant – it takes no other action unless an infected file
is executed again.
Most viruses do not use the direct action method of reproduction simply
because it is not prolific, but viruses of this type have done damage in the
past. The Vienna virus, which briefly threatened computers in 1988, is one
such example of a direct action virus.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 20
21. Types Of Viruses
4. File Infector Virus
Perhaps the most common type of virus, the file infector takes root in a host
file and then begins its operation when the file is executed. The virus may
completely overwrite the file that it infects, or may only replace parts of the
file, or may not replace anything but instead re-write the file so that the
virus is executed rather than the program the user intended.
Although called a “file virus” the definition doesn’t apply to all viruses in all
files generally – for example, the macro virus below is not referred to by the
file virus. Instead, the definition is usually meant to refer only to viruses
which use an executable file format, such as .exe, as their host.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 21
22. Types Of Viruses
5. Macro Virus
A wide variety of programs, including productivity applications like Microsoft
Excel, provide support for Macros – special actions programmed into the
document using a specific macro programming language. Unfortunately, this
makes it possible for a virus to be hidden inside a seemingly benign
document.
Macro viruses very widely in terms of payload. The most well known macro
virus is probably Melissa, a Word document supposedly containing the
passwords to pornographic websites. The virus also exploited Word’s link to
Microsoft Outlook in order to automatically email copies of itself.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 22
23. Types Of Viruses
6. Multipartite Virus
While some viruses are happy to spread via one method or deliver a single
payload, Multipartite viruses want it all. A virus of this type may spread in
multiple ways, and it may take different actions on an infected computer
depending on variables, such as the operating system installed or the
existence of certain files.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 23
24. Types Of Viruses
7. Polymorphic Virus
Another jack-of-all-trades, the Polymorphic virus actually mutates over time
or after every execution, changing the code used to deliver its payload.
Alternatively, or in addition, a Polymorphic virus may guard itself with an
encryption algorithm that automatically alters itself when certain conditions
are met.
The goal of this trickery is evasion. Antivirus programs often find viruses by
the specific code used. Obscuring or changing the code of a virus can help it
avoid detection.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 24
25. Types Of Viruses
8. Resident Virus
This broad virus definition applies to any virus that inserts itself into a
system’s memory. It then may take any number of actions and run
independently of the file that was originally infected.
A resident virus can be compared to a direct payload virus, which does not
insert itself into the system’s memory and therefore only takes action when
an infected file is executed.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 25
26. Types Of Viruses
9. Web Scripting Virus
Many websites execute complex code in order to provide interesting content.
Displaying online video in your browser, for example, requires the execution
of a specific code language that provides both the video itself and the player
interface.
Of course, this code can sometimes be exploited, making it possible for a
virus to infect a computer or take actions on a computer through a website.
Although malicious sites are sometimes created with purposely infected code,
many such cases of virus exist because of code inserted into a site without the
webmaster’s knowledge.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 26
27. 10 Simple Tips to Protect PC from Viruses
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 27
28. 10 Simple Tips to Protect PC from Viruses
1. The first thing I would recommend – is to read about current viruses. It is
difficult to protect your computer from viruses if you do not even know what
they are. You can get it from here: http://www.securelist.com/en/
2. If you really care about the security of your computer, arm it with the best
anti-virus software. If you do not have antivirus software on your computer, then
you probably get some virus in the first hour of work on the Internet. It’s easy! In
addition to paying Kaspersky, Norton and free Avast, Microsoft Security Essentials
is Best and Free.
3. Also update your antivirus software as often as possible. Typically, antivirus
software is updated every day. Do not forget to do it manually, if not configured
to automatically update.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 28
29. 10 Simple Tips to Protect PC from Viruses
4. Be sensible: do not visit untrusted websites containing illegal software, links,
etc.
5. Update need not only anti-virus, but the whole system too Windows update.
These updates include improved security systems that will help in the fight
against viruses and other problems. Remember: If you do not perform regular
updates to Windows, you leave your computer in a vulnerable state.
6. The main channel of the spread of viruses is e-mail. Be careful with e-mails,
when you have something to bother them, it is better not to open. These days a
lot of mails are phishing mails that redirects you to fake webpages. So, avoid
opening such mails.
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 29
30. 10 Simple Tips to Protect PC from Viruses
7. If you are serious about protecting your computer, you can change your e-mail
and receive only text messages. You can also disable the ability to open email
attachments. This is what Hotmail, Gmail and Yahoo mails are doing by default.
8. Do not use peer (p2p) network. Such programs include for example, Torrents.
These programs allow you to download files from other users. You have no way of
knowing that you’re actually downloading, until the file is completely
downloaded to your computer.
9. Download files only from reliable web sites and sources. Of course, it is
impossible do not download anything, but you must remember that the file that
you download may not match the name and content.
10. Make sure that your computer has a firewall. Windows comes with built-in
firewall, but you can use any other (eg, Zone Alarm). If you don’t have other
firewall, then enable default Windows Firewall
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 30
31. The End
Eng. Ali F. Al Sarraf E-Mail: ali.alsarraf@outlook.com 31