This document defines and discusses various types of malware such as computer viruses, worms, and zombies. It provides a timeline of notable computer viruses from 1981-1988 and describes how viruses spread and the damage they can cause. The document also defines worms and discusses the Morris worm of 1988. It then covers topics such as distributed denial of service attacks, the MyDoom virus of 2004, and different types of viruses like boot sector and email viruses. Prevention methods and the decline of traditional viruses are also summarized.
The primary difference between a virus and a worm is that viruses must be triggered by the activation of their host; whereas worms are stand-alone malicious programs that can self-replicate and propagate independently as soon as they have breached the system.
The primary difference between a virus and a worm is that viruses must be triggered by the activation of their host; whereas worms are stand-alone malicious programs that can self-replicate and propagate independently as soon as they have breached the system.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
2. Definition of Virus
A virus is a small piece of software that
piggybacks on real programs in order to get
executed
Once it’s running, it spreads by inserting
copies of itself into other executable code or
documents
4. Worms
Worm - is a self-replicating program,
similar to a computer virus. A virus
attaches itself to, and becomes part of,
another executable program; however,
a worm is self-contained and does not
need to be part of another program to
propagate itself.
5. History of Worms
The first worm to attract wide attention, the
Morris worm, was written by Robert Tappan
Morris, who at the time was a graduate
student at Cornell University.
It was released on November 2, 1988
Morris himself was convicted under the US
Computer Crime and Abuse Act and received
three years probation, community service and
a fine in excess of $10,000.
Xerox PARC
6. Worms…
Worms – is a small piece of software that
uses computer networks and security holes to
replicate itself. A copy of the worm scans the
network for another machine that has a
specific security hole. It copies itself to the
new machine using the security hole, and
then starts replicating from there, as well.
They are often designed to exploit the file
transmission capabilities found on many
computers.
7. Zombies
Infected computers — mostly Windows
machines — are now the major delivery
method of spam.
Zombies have been used extensively to
send e-mail spam; between 50% to
80% of all spam worldwide is now sent
by zombie computers
9. Typical things that some current
Personal Computer (PC) viruses do
Display a message
10. Typical things that some current
Personal Computer (PC) viruses do
Erase files
Scramble data on a hard disk
Cause erratic screen behavior
Halt the PC
Many viruses do nothing obvious at all
except spread!
Display a message
11. Distributed Denial of
Service
A denial-of-service attack is an attack that
causes a loss of service to users, typically
the loss of network connectivity and
services by consuming the bandwidth of the
victim network or overloading the
computational resources of the victim
system.
12. How it works?
The flood of incoming messages to the target
system essentially forces it to shut down, thereby
denying service to the system to legitimate users.
Victim's IP address.
Victim's port number.
Attacking packet size.
Attacking interpacket delay.
Duration of attack.
MyDoom – SCO Group
14. MyDoom
26 January 2004: The Mydoom virus is
first identified around 8am. Computer
security companies report that Mydoom is
responsible for approximately one in ten e-
mail messages at this time. Slows overall
internet performance by approximately ten
percent and average web page load times by
approximately fifty percent
15. MyDoom…
27 January: SCO Group offers a US $250,000
reward for information leading to the arrest of the
worm's creator.
1 February: An estimated one million computers
around the world infected with Mydoom begin the
virus's massive distributed denial of service
attack—the largest such attack to date.
2 February: The SCO Group moves its site to
www.thescogroup.com.
16. Executable Viruses
Traditional Viruses
pieces of code attached to a legitimate
program
run when the legitimate program gets
executed
loads itself into memory and looks around
to see if it can find any other programs on
the disk
17. Boot Sector Viruses
Traditional Virus
infect the boot sector on floppy disks and
hard disks
By putting its code in the boot sector, a
virus can guarantee it gets executed
load itself into memory immediately, and it
is able to run whenever the computer is on
18. Decline of traditional viruses
Reasons:
– Huge size of today’s programs storing on a
compact disk
– Operating systmes now protect the boot sector
19. E-mail Viruses
Moves around in e-mail messages
Replicates itself by automatically mailing
itself to dozens of people in the victim’s e-
mail address book
Example: Melissa virus, ILOVEYOU virus
20. Melissa virus
March 1999
the Melissa virus was the fastest-spreading virus
ever seen
Someone created the virus as a Word document
uploaded to an Internet newsgroup
People who downloaded the document and opened
it would trigger the virus
The virus would then send the document in an e-
mail message to the first 50 people in the person's
address book
21. Melissa virus
Took advantage of the programming
language built into Microsoft Word called
VBA (Visual Basic for Applications)