introduction to malwares,virus,trojan horse

4,633 views

Published on

Published in: Education
2 Comments
5 Likes
Statistics
Notes
No Downloads
Views
Total views
4,633
On SlideShare
0
From Embeds
0
Number of Embeds
53
Actions
Shares
0
Downloads
699
Comments
2
Likes
5
Embeds 0
No embeds

No notes for slide

introduction to malwares,virus,trojan horse

  1. 3. <ul><li>Malwares are softwares Designed to infiltrate or damage a computer system without the owner's informed consent. </li></ul><ul><li>Many normal computer users are however still unfamiliar with The term, and most never use it. </li></ul><ul><li>Instead, “virus” is used in common parlance and often in the general media to describe all kinds of malware. </li></ul>
  2. 4. <ul><li>Viruses </li></ul><ul><li>Worms </li></ul><ul><li>Trojan horses </li></ul><ul><li>Rootkit </li></ul><ul><li>Ransomware </li></ul><ul><li>Adware </li></ul><ul><li>Spyware </li></ul><ul><li>Key loggers </li></ul><ul><li>Dialers </li></ul><ul><li>Hijakers </li></ul>
  3. 5. <ul><li>A computer program that can copy itself and infect a computer without permission or knowledge of the user. </li></ul><ul><li>A virus can spread from one computer to another when its host is taken to the uninfected computer. </li></ul><ul><li>Viruses may take advantage of network services such as web ,email , sharing file systems in a network to spread. </li></ul><ul><li>Usually viruses are programmed to damage the computer by damaging programs ,deleting files , reformatting hard disk. </li></ul><ul><li>expand exponentially through recursion. </li></ul>
  4. 6. <ul><li>MACRO VIRUS: </li></ul><ul><li>It is written in scripting languages for programs such as word and excel. </li></ul><ul><li>It infects documents & spreadsheets. </li></ul><ul><li>NETWORK VIRUS: </li></ul><ul><li>It quickly spreads over internet and LAN. </li></ul><ul><li>It generally propagates through shared resources. </li></ul><ul><li>COMPANION VIRUS : </li></ul><ul><li>It creates new files that have the same file names as a legitimate program but with different extensions. </li></ul>
  5. 7. <ul><li>LOGIC BOMB: </li></ul><ul><li>It employs code that remain inert until specific conditions are met. </li></ul><ul><li>BOOT SECTOR VIRUS: </li></ul><ul><li>It is hidden in the boot sector(usually in the first sector.) </li></ul><ul><li>It loads into memory during every boot sequence. </li></ul><ul><li>It doesn’t effect files but the disks that contain them. </li></ul>
  6. 8. <ul><li>POLYMORPHIC VIRUS: </li></ul><ul><li>A well written virus of this type is usually difficult for antivirus scanners to detect but these are usually not that well written. They changes code whenever it passes to another machine. </li></ul><ul><li>STEALTH VIRUS : </li></ul><ul><li>These hides its presence by making an infected file not appear infected, but doesn't usually stand up to antivirus software . </li></ul><ul><li>MULTIPARTITE VIRUS: </li></ul><ul><li>These infects both files and the boot sector that infect our system dozens of times before it's caught. </li></ul>
  7. 9. <ul><li>A self replicating computer program. </li></ul><ul><li>It uses a network to send copies of itself to other nodes and it may do so without any user intervention. </li></ul><ul><li>Unlike a virus, it doesn’t need to attach itself to an existing program. </li></ul><ul><li>Worms always effect network (only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer. </li></ul>
  8. 10. <ul><li>A computer software that collects personal information about users without their informed consent. </li></ul><ul><li>Personal information is secretly recorded with different technique including logging keystrokes recording internet, web browsing history and scanning documents on computer hard disk. </li></ul><ul><li>It can steal victim’s password and financial details. </li></ul><ul><li>contd. </li></ul>
  9. 11. <ul><li>Malicious programmers have released a large number of rogue (fake) anti-spyware programs, and widely distributed Web banner ads now spuriously warn users that their computers have been infected with spyware, directing them to purchase programs which do not actually remove spyware or else, may add more spyware of their own. </li></ul><ul><li>It is recommended that users do not install any freeware claiming to be anti-spyware unless it is verified to be legitimate. Some known offenders include : </li></ul><ul><li> AntiVirus Gold </li></ul><ul><li> XP antivirus 2008 </li></ul><ul><li> WinFixer </li></ul><ul><li> World AntiSpy </li></ul>
  10. 12. <ul><li>A Trojan is a malware that appears to perform a desirable function but infact performs undisclosed malicious function. </li></ul><ul><li>Trojan horse programs can’t operate autonomously, The victim must activate it. </li></ul><ul><li>Unlike virus it doesn’t replicate. </li></ul><ul><li>There are two types of trojan horses. </li></ul><ul><li>Useful software that has been corrupted by a cracker inserting malicious code that executes when the program is used. </li></ul><ul><li>Standalone program that is disguised as something else like a game or image file that is malicious to the computer. </li></ul>
  11. 13. <ul><li>Now a days pendrive is the major medium of transferring data between two computers. </li></ul><ul><li>The unpleasant truth is that this pendrive is the medium of spreading Malware among computers. </li></ul><ul><li>Some Malwares are built in a way that When we insert the pen drive in an infected computer it is copied to the pendrive. </li></ul><ul><li>Sometimes we can see it. E.g A file contains with in a folder with the same name as the folder with a .exe extension </li></ul>
  12. 14. <ul><li>Go to Tools->Folder options ->view </li></ul><ul><li>check show hidden files and folders, uncheck hide protected OS files, uncheck hide extensions . </li></ul><ul><li>Mark the extensions .vbs/.exe/.com /.bat . </li></ul><ul><li>These are the Malwares and effects the system when the pendrive is double clicked. </li></ul>
  13. 15. <ul><li>When we see the hidden malwares there is always a file called autorun.inf . </li></ul><ul><li>Many of the computer users have the misconception that the autorun.inf is a virus. </li></ul><ul><li>But it is the file which helps another file to run. </li></ul><ul><li>The pictures shows an example of autorun.inf </li></ul><ul><li>The autorun.inf file in the example opens a file called bank.exe changes the icon to bank.ico and changes the label to SDSC BANK. </li></ul>
  14. 16. <ul><li>Always open the pendrive by using the address of the drive in the Address bar or open it using windows autoplay application. </li></ul><ul><li>Don’t double click the pendrive icon or don’t try to use the right click menu commands. </li></ul><ul><li>Try to know the extention of a file. </li></ul><ul><li>Follow the either of two solutions </li></ul><ul><ul><li>Use a batch file to delete the autorun.inf </li></ul></ul><ul><ul><li>Disable the autorun on windows </li></ul></ul>
  15. 17. <ul><li>Batch file is a text file that contains series of commands to be executed one after another. </li></ul><ul><li>It has an extension .bat </li></ul><ul><li>On double clicking the batch file it starts executing. </li></ul><ul><li>People used to design malwares using batch files. </li></ul><ul><li>Simply writing a delete command in the batch file can delete one file or set of files. </li></ul><ul><li>E.g. “del /a /f h:autorun.inf” deletes the autorun.inf hidden in H drive </li></ul><ul><li>Instead of H we can give the address of our removal storage disk to delete the autorun.inf </li></ul>
  16. 18. <ul><li>We can disable the autorun feature using windows registry </li></ul><ul><li>The Windows registry is a database which stores settings and options for the operating system for Windows </li></ul><ul><li>Open the registry editor and goto HKCU/Software/microsoft/windows/CurrentVersion/policies/explorer </li></ul><ul><li>On the right double click NoDriveTypeAutoRun enter a value “223” in decimal or “fd” in hexadecimal. </li></ul><ul><li>screenshot </li></ul><ul><li>Close the registry and restart the computer . </li></ul><ul><li>Now you are free to open your pendrive. </li></ul>
  17. 19. <ul><li>Don’t fear to malware, rather try to get some knowledge about it. </li></ul><ul><li>Don’t download files and free software from unknown sites & strangers. </li></ul><ul><li>Install a trustable antivirus & update it regularly. </li></ul><ul><li>Back up the files on a regular basis. so, that if some malware attacks the system then we can able to restore them. </li></ul>
  18. 20. THANK YOU

×