SlideShare a Scribd company logo
Introduction to Computer
Virus and Malware
Bhupinder Singh
Presentation Content
• Description
• Virus Characteristics
• Different Types of Malwares
• Different Types of Viruses
• Safe Computing Tips and Techniques
Introduction
Description
A program (a block of executable code) that has the ability to
replicate, or make copies of itself, and spread to other files.
What is a Computer Virus?
Description
What is a Malware?
Unexpected or malicious program or mobile codes
What does a Malware do to a
Computer
Some Possible Malware Payloads:
• Simple display of messages
• Delete or corrupt files,hard disk
• Interfere with computer operations
• Spread to other files and computers
• Compromise computer or network security
How do Viruses and Other Malware spread?
From Disk to Disk
From Program to Program
From Document to Document
Via E-mail and Internet
Over the Network
They spread…
They spread…
Virus Characteristics
Direct-Action
Direct-Action
Virus Characteristics
Memory-Resident
Memory-Resident
Direct-Action vs. Memory-Resident
Infect files during execution of virus
• Installs itself in memory
• Monitors the activity of the computer
• Infects files on certain conditions
(i.e. when they are executed, opened, etc.)
Stealth
Stealth
Implements a way to hide modifications
Polymorphic
Polymorphic
Produces varied but functional copies of
itself.
Virus Characteristics
Different Forms of Malware
Different Types of Malwares
• Trojans
• Worms
• Joke Programs
• Droppers
• Viruses
• Backdoors
• DDos Programs
Trojan Programs
Trojan Horse Programs
Trojans are programs that may appear harmless,
but perform unexpected or unauthorized, usually
malicious, actions
• downloading and uploading files on their computer
• reading all of their IRC logs and learning interesting things
about them and their friends.
• reading their ICQ messages.
• stealing information such as credit card numbers,
username and passwords, etc..
• and worst…deleting their files, formatting their hard drive.
The Dangers of a Trojan
Computer Worms
Worms
A computer worm is a program (or set of programs) that is able to spread
copies of itself to other computer systems.Unlike viruses, worms do not need to
attach themselves to host programs.
Checking for Trojans and Worms
Some Symptoms:
• Unusual system slowdown and/or behavior
• Unusual tasks running
• Modifications on the Registry
• Modifications in configuration files.
• Unusual emails sent
(without the user’s consent)
Joke Programs
Joke Programs
• Ordinary executable programs.
• Created to make fun of users.
• These programs do not intend to
destroy data
Some Characteristics:
• Similar to ordinary executable programs
• Will not infect other programs
• Will not do any damage directly
• May annoy or tease the user
• May be difficult to halt or terminate
• May cause some devices (e.g., mouse or
keyboard) to temporarily function abnormally
Joke Programs
Malware Droppers
Malware Droppers
Upon execution, this malware will
drop a virus or other malware.
When the dropped malware is
executed, it can infect files or
cause damage
A program that drops a virus or other malware
Backdoors
Backdoors
Backdoors
A backdoor is a program that opens secret access to
systems, and is often used to bypass system security.
Backdoors
Here are some of the things that these
Here are some of the things that these
backdoors are capable of:
backdoors are capable of:
 Log keystrokes
 Edit or delete files and folders
 Edit the registry
 Send out confidential information such as password to
the hacker
 Run programs on the host or target machine
 Restart or shut down the computer
 Capture screens
 Browse and send out files to the hacker
 Change computer settings such as wallpaper
 Kill or disable running programs

More Related Content

Similar to virus-part2-150726093824-lva1-app6891.pdf

Computer Virus
Computer VirusComputer Virus
Computer Virus
PravinGhosekar
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
Computer virus
Computer virusComputer virus
Computer virus
SanthiNivas
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Malwares
MalwaresMalwares
Malwares
Ishaq Ticklye
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
JohnRebenRequinto1
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
YouQue ™
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_wargames12
 
Computer virus
Computer virusComputer virus
Computer virus
Sammer Khizer
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
GDhanushia
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
Azri Abdin
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Worm
WormWorm

Similar to virus-part2-150726093824-lva1-app6891.pdf (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Malwares
MalwaresMalwares
Malwares
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
 
Malicious
MaliciousMalicious
Malicious
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virusppt
ViruspptVirusppt
Virusppt
 
Worm
WormWorm
Worm
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 

More from NORTHCUSTOMS

informatique1as_project-virus.pptx
informatique1as_project-virus.pptxinformatique1as_project-virus.pptx
informatique1as_project-virus.pptx
NORTHCUSTOMS
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
NORTHCUSTOMS
 
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).pptd8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
NORTHCUSTOMS
 
901130_computer1.ppt
901130_computer1.ppt901130_computer1.ppt
901130_computer1.ppt
NORTHCUSTOMS
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
NORTHCUSTOMS
 
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.pptd8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
NORTHCUSTOMS
 
تحرير الكتب الرسمية وكتابة المختصر .pptx
تحرير الكتب الرسمية وكتابة المختصر .pptxتحرير الكتب الرسمية وكتابة المختصر .pptx
تحرير الكتب الرسمية وكتابة المختصر .pptx
NORTHCUSTOMS
 

More from NORTHCUSTOMS (7)

informatique1as_project-virus.pptx
informatique1as_project-virus.pptxinformatique1as_project-virus.pptx
informatique1as_project-virus.pptx
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).pptd8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
 
901130_computer1.ppt
901130_computer1.ppt901130_computer1.ppt
901130_computer1.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.pptd8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
 
تحرير الكتب الرسمية وكتابة المختصر .pptx
تحرير الكتب الرسمية وكتابة المختصر .pptxتحرير الكتب الرسمية وكتابة المختصر .pptx
تحرير الكتب الرسمية وكتابة المختصر .pptx
 

Recently uploaded

Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

virus-part2-150726093824-lva1-app6891.pdf

  • 1. Introduction to Computer Virus and Malware Bhupinder Singh
  • 2. Presentation Content • Description • Virus Characteristics • Different Types of Malwares • Different Types of Viruses • Safe Computing Tips and Techniques Introduction
  • 3. Description A program (a block of executable code) that has the ability to replicate, or make copies of itself, and spread to other files. What is a Computer Virus?
  • 4. Description What is a Malware? Unexpected or malicious program or mobile codes
  • 5. What does a Malware do to a Computer Some Possible Malware Payloads: • Simple display of messages • Delete or corrupt files,hard disk • Interfere with computer operations • Spread to other files and computers • Compromise computer or network security
  • 6. How do Viruses and Other Malware spread? From Disk to Disk From Program to Program From Document to Document Via E-mail and Internet Over the Network They spread… They spread…
  • 8. Direct-Action Direct-Action Virus Characteristics Memory-Resident Memory-Resident Direct-Action vs. Memory-Resident Infect files during execution of virus • Installs itself in memory • Monitors the activity of the computer • Infects files on certain conditions (i.e. when they are executed, opened, etc.)
  • 9. Stealth Stealth Implements a way to hide modifications Polymorphic Polymorphic Produces varied but functional copies of itself. Virus Characteristics
  • 11. Different Types of Malwares • Trojans • Worms • Joke Programs • Droppers • Viruses • Backdoors • DDos Programs
  • 13. Trojan Horse Programs Trojans are programs that may appear harmless, but perform unexpected or unauthorized, usually malicious, actions
  • 14. • downloading and uploading files on their computer • reading all of their IRC logs and learning interesting things about them and their friends. • reading their ICQ messages. • stealing information such as credit card numbers, username and passwords, etc.. • and worst…deleting their files, formatting their hard drive. The Dangers of a Trojan
  • 16. Worms A computer worm is a program (or set of programs) that is able to spread copies of itself to other computer systems.Unlike viruses, worms do not need to attach themselves to host programs.
  • 17. Checking for Trojans and Worms Some Symptoms: • Unusual system slowdown and/or behavior • Unusual tasks running • Modifications on the Registry • Modifications in configuration files. • Unusual emails sent (without the user’s consent)
  • 19. Joke Programs • Ordinary executable programs. • Created to make fun of users. • These programs do not intend to destroy data
  • 20. Some Characteristics: • Similar to ordinary executable programs • Will not infect other programs • Will not do any damage directly • May annoy or tease the user • May be difficult to halt or terminate • May cause some devices (e.g., mouse or keyboard) to temporarily function abnormally Joke Programs
  • 22. Malware Droppers Upon execution, this malware will drop a virus or other malware. When the dropped malware is executed, it can infect files or cause damage A program that drops a virus or other malware
  • 24. Backdoors Backdoors A backdoor is a program that opens secret access to systems, and is often used to bypass system security.
  • 25. Backdoors Here are some of the things that these Here are some of the things that these backdoors are capable of: backdoors are capable of:  Log keystrokes  Edit or delete files and folders  Edit the registry  Send out confidential information such as password to the hacker  Run programs on the host or target machine  Restart or shut down the computer  Capture screens  Browse and send out files to the hacker  Change computer settings such as wallpaper  Kill or disable running programs