SlideShare a Scribd company logo
1 of 19
Computer
Viruses
What is a Computer Virus?
•A computer virus is a computer program that can
copy itself and infect a computer without the
permission or knowledge of the owner.
•One of the first detected virus was the Creeper virus
in the early 70’s
•Before computer networks became widespread, most
viruses spread on removable media, particularly
floppy disk.
What is a Computer Virus?
•A computer virus is a computer program that can
copy itself and infect a computer without the
permission or knowledge of the owner.
•One of the first detected virus was the Creeper virus
in the early 70’s
•Before computer networks became widespread, most
viruses spread on removable media, particularly
floppy disk.
Basic Computer Viruses
•Trojan Horses
• appears as interesting program file but when installed it
allows intruders to access and read your files
•Worms
• virus that copies and multiplies itself by using
computer networks and security flaws
•E-mail Viruses
• use e-mail messages to spread which allow it to
automatically forward itself to thousands of people
Types of Viruses
• Boot Sector Virus
• Infects the boot or MBR of diskettes and hard drives through the sharing
of infected disks and pirated software applications
• Once your hard drive is infected all diskettes that you use in your
computer will be infected
• Program Virus
• Becomes active when the program file (usually with extensions .BIN,
.COM, .EXE, .OVL, .DRV) carrying the virus is opened
• It then makes copies of itself and will infect other programs on the
computer
• Multipartite Virus
• Hybrid of a Boot Sector and Program viruses
• It infects program files and when the infected program is active it will
affect the boot record
Types of Viruses
• Stealth Virus
• Disguises itself to prevent from being detected by antivirus software
• It alters its file size or conceals itself in memory
• Polymorphic Virus
• Act like a chameleon, changing its virus signature (binary pattern) every
time it multiples and infects a new file
• Macro Virus
• Programmed as a macro embedded in a document, usually found in
Microsoft Word and Excel
• Once it gets in to your computer, every document you produce will
become infected
• Relatively new type of virus and may slip by your antivirus software if
you don't have the most recent version installed
Signs Your Computer is Infected
• Functions slower than normal
• Responds slowly and freezes
often
• Restarts itself often
• See uncommon error
messages, distorted menus,
and dialog boxes
• Notice applications fail to
work correctly
• Fail to print correctly
• First half of the 70'Late 60,s, early 70,s- "Rabbits" cloned themselves occupied
system resources, slowing down the productivity.
• -"The Creeper" capable of entering a network by itself and transferring a copy of
itself to the system.
• Early 80,s-Increasing number of programs written by individuals not by software
companies. Programs caused miner viruses called "Trojan horses".
• 1986'Brain virus' - by Amjad and Basit Farooq Alvi.
- spread through floppy disks,
- infected boot records and not computer hard drives
• Lahore, Pakistani Brain, Brain-A and UIUC virus
-took over free space on the floppy disk and hid from detection
”disguised itself by displaying the uninfected boot sector on the disk.”
• 1987-Lehigh virus
- the first memory resident file infector that attacked executable files and took
control when a file was opened
• The Jerusalem Virus
-had bugs that re-infected programs that were already infected
 1988: Robert Morris made a worm that invaded ARPANET computers
- disabled 6,000 computers on the network by overflowing their memory banks with
copies of itself
 1991: Norton Anti-Virus software
 1999: "Melissa" virus
-infected thousands of computers very fast by sending copies of itself to 50 names in
the address book on Outlook e-mail
- Led to an estimated $80 million in damage and record sales of anti-virus products.
 2000: "I Love You" virus
-was sent by email and infected 10 % of computers in only one day
-created by a young Filipino computer student who did not get punished because then
the Philippines had no laws against hacking which led to the European Union's
global Cybercrime Treaty.
 2001: "Nimda" virus (days after 9/11)
-had 5 ways of infecting systems
• 2004
• MyDoom spreads through emails and file-sharing software faster than
any previous virus or worm.
• Allows hackers to access the hard drive of the infected computer.
• An estimated one million computers running Windows are affected by
the fast-spreading Sasser computer worm.
• The worm does not cause irreparable harm to computers or data, but it does
slow computers and cause some to quit or reboot without explanation.
• 2006
• Discovery of the first-ever malware trojan horse for Mac OS X
• 2008
• Torpig is a Trojan horse which affects Windows, turning off anti-virus
applications.
• It allows others to access the computer, modifies data, steals confidential
information and installs malware on the victim's computer.
• 2009
• Conficker infects anywhere from 9 to 15 million Microsoft server
systems.
• French air force, Royal Navy warships and submarines, Sheffield Hospital
network, UK Ministry of Defence, German Bundeswehr and Norwegian
Police were all affected.
Total Number of Viruses by year
January 1985 1
January 1985 1
January 1987 3
January 1989 6
January 1990 142
January 1991 357
January 1992 1,161
January 1993 2,482
January 1994 3,687
January 1995 5,626
January 1996 7,764
January 1997 11,037
January 1998 16,726
January 1999 40,850
January 2000 44,000
January 2001 48,000
January 2002 55,000
January 2003 62,000
Melissa
• Another virus that fired up the media was Melissa, a Word macro virus.
• When people received the host Word document via email and opened it,
the virus sent a copy of itself to the first 50 people in the victim's address
book.
• Named after a topless dancer in Florida, the Melissa virus crashed the
email servers of corporations and governments in different spots around
the world.
• The Computer Emergency Response Team, set up after Robert Morris
mucked up the Internet with his worm in 1988, estimated that the virus hit
100,000 computers in its first weekend.
• David L. Smith posted the infected file to an alt.sex usenet group using a
stolen AOL account. Initially he entered a plea of innocence, but after being
confronted with a maximum sentence of 40 years in prison, he eventually
pled guilty and received a much-reduced sentence.
Love You, Love Bug
• By almost any measure, the so-called Love Bug was the most damaging
and costly virus ever. I don't know who comes up with these whack
figures, but according to Reuters the bug cost the world $15 billion in
lost productivity.
• The Love Bug spread far faster than Melissa. Unlike Melissa, it would
mail itself to everyone in your Outlook address book -- most of whom
would probably be delighted to read about how you love them -- not
just the first fifty. Moreover, it would gobble up certain media files
stored on your hard drive.
Did you know?
• One German newspaper
tragically lost 2,000 pictures from
its archive.
• The perpetrator turned out to be
a 23-year-old Filipino computer
science student who more or less
plagiarized all of his code.
• The lack of laws in the
Philippines covering computer
crimes, he pretty much got away
with his crime.
Prevention
• Upload and use antivirus
software
• Be aware of the e-mails and
attachments you open
• Check for updates on
antivirus software regularly
• Make sure antivirus software
is installed correctly
Sources
http://www.tech-faq.com/history-of-computer-viruses.shtml
http://spamlaws.com/history.html
http://en.wikipedia.org/wiki/Computer_virus#History
http://www.infoplease.com/ipa/A0872842.html
References
http://www.spamlaws.com/protect.html
http://www.spamlaws.com/virus-types.html
http://www.spamlaws.com/virus-comtypes.html
http://www.spamlaws.com/federal/index.shtml
http://www.spamlaws.com/virus-types.html
Wikipedia
www.suggestafix.com
www.microsoft.com
Thank You

More Related Content

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
The Giant Black Book Of Computer Viruses
The Giant Black Book Of Computer VirusesThe Giant Black Book Of Computer Viruses
The Giant Black Book Of Computer Viruses
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Similar to Computer Virus (20)

computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Virus09
Virus09Virus09
Virus09
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
The 15 deadliest computer viruses
The 15 deadliest computer virusesThe 15 deadliest computer viruses
The 15 deadliest computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 

More from Study Hub

Coal to Electricity
Coal to Electricity Coal to Electricity
Coal to Electricity Study Hub
 
generation 200 vs 500 MW
generation 200 vs 500 MWgeneration 200 vs 500 MW
generation 200 vs 500 MWStudy Hub
 
Bearings and lubrication
Bearings and lubricationBearings and lubrication
Bearings and lubricationStudy Hub
 
Ball & tube mill
Ball & tube millBall & tube mill
Ball & tube millStudy Hub
 
Top 10 Phones Under 10k
Top 10 Phones Under 10kTop 10 Phones Under 10k
Top 10 Phones Under 10kStudy Hub
 
STUDY ON EFFECTIVE THERMAL CONDUCTIVITY OF COPPER PARTICLE FILLED POLYMER COM...
STUDY ON EFFECTIVE THERMAL CONDUCTIVITY OF COPPER PARTICLE FILLED POLYMER COM...STUDY ON EFFECTIVE THERMAL CONDUCTIVITY OF COPPER PARTICLE FILLED POLYMER COM...
STUDY ON EFFECTIVE THERMAL CONDUCTIVITY OF COPPER PARTICLE FILLED POLYMER COM...Study Hub
 
Top 5 "Ethical Hackers of India"
Top 5 "Ethical Hackers of India"Top 5 "Ethical Hackers of India"
Top 5 "Ethical Hackers of India"Study Hub
 
Ntpc tranning report
Ntpc tranning report Ntpc tranning report
Ntpc tranning report Study Hub
 
Suspension system for any vehicle
Suspension system for any vehicleSuspension system for any vehicle
Suspension system for any vehicleStudy Hub
 
Vehicle accident detection system (VAD)
Vehicle accident detection system (VAD)Vehicle accident detection system (VAD)
Vehicle accident detection system (VAD)Study Hub
 

More from Study Hub (13)

Deaerator
DeaeratorDeaerator
Deaerator
 
Coal to Electricity
Coal to Electricity Coal to Electricity
Coal to Electricity
 
generation 200 vs 500 MW
generation 200 vs 500 MWgeneration 200 vs 500 MW
generation 200 vs 500 MW
 
Bearings and lubrication
Bearings and lubricationBearings and lubrication
Bearings and lubrication
 
Ball & tube mill
Ball & tube millBall & tube mill
Ball & tube mill
 
Top 10 Phones Under 10k
Top 10 Phones Under 10kTop 10 Phones Under 10k
Top 10 Phones Under 10k
 
STUDY ON EFFECTIVE THERMAL CONDUCTIVITY OF COPPER PARTICLE FILLED POLYMER COM...
STUDY ON EFFECTIVE THERMAL CONDUCTIVITY OF COPPER PARTICLE FILLED POLYMER COM...STUDY ON EFFECTIVE THERMAL CONDUCTIVITY OF COPPER PARTICLE FILLED POLYMER COM...
STUDY ON EFFECTIVE THERMAL CONDUCTIVITY OF COPPER PARTICLE FILLED POLYMER COM...
 
Top 5 "Ethical Hackers of India"
Top 5 "Ethical Hackers of India"Top 5 "Ethical Hackers of India"
Top 5 "Ethical Hackers of India"
 
Dc motor
Dc motorDc motor
Dc motor
 
Ntpc tranning report
Ntpc tranning report Ntpc tranning report
Ntpc tranning report
 
Suspension system for any vehicle
Suspension system for any vehicleSuspension system for any vehicle
Suspension system for any vehicle
 
Vad
VadVad
Vad
 
Vehicle accident detection system (VAD)
Vehicle accident detection system (VAD)Vehicle accident detection system (VAD)
Vehicle accident detection system (VAD)
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Computer Virus

  • 2. What is a Computer Virus? •A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. •One of the first detected virus was the Creeper virus in the early 70’s •Before computer networks became widespread, most viruses spread on removable media, particularly floppy disk.
  • 3. What is a Computer Virus? •A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. •One of the first detected virus was the Creeper virus in the early 70’s •Before computer networks became widespread, most viruses spread on removable media, particularly floppy disk.
  • 4. Basic Computer Viruses •Trojan Horses • appears as interesting program file but when installed it allows intruders to access and read your files •Worms • virus that copies and multiplies itself by using computer networks and security flaws •E-mail Viruses • use e-mail messages to spread which allow it to automatically forward itself to thousands of people
  • 5. Types of Viruses • Boot Sector Virus • Infects the boot or MBR of diskettes and hard drives through the sharing of infected disks and pirated software applications • Once your hard drive is infected all diskettes that you use in your computer will be infected • Program Virus • Becomes active when the program file (usually with extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened • It then makes copies of itself and will infect other programs on the computer • Multipartite Virus • Hybrid of a Boot Sector and Program viruses • It infects program files and when the infected program is active it will affect the boot record
  • 6. Types of Viruses • Stealth Virus • Disguises itself to prevent from being detected by antivirus software • It alters its file size or conceals itself in memory • Polymorphic Virus • Act like a chameleon, changing its virus signature (binary pattern) every time it multiples and infects a new file • Macro Virus • Programmed as a macro embedded in a document, usually found in Microsoft Word and Excel • Once it gets in to your computer, every document you produce will become infected • Relatively new type of virus and may slip by your antivirus software if you don't have the most recent version installed
  • 7. Signs Your Computer is Infected • Functions slower than normal • Responds slowly and freezes often • Restarts itself often • See uncommon error messages, distorted menus, and dialog boxes • Notice applications fail to work correctly • Fail to print correctly
  • 8.
  • 9. • First half of the 70'Late 60,s, early 70,s- "Rabbits" cloned themselves occupied system resources, slowing down the productivity. • -"The Creeper" capable of entering a network by itself and transferring a copy of itself to the system. • Early 80,s-Increasing number of programs written by individuals not by software companies. Programs caused miner viruses called "Trojan horses". • 1986'Brain virus' - by Amjad and Basit Farooq Alvi. - spread through floppy disks, - infected boot records and not computer hard drives • Lahore, Pakistani Brain, Brain-A and UIUC virus -took over free space on the floppy disk and hid from detection ”disguised itself by displaying the uninfected boot sector on the disk.” • 1987-Lehigh virus - the first memory resident file infector that attacked executable files and took control when a file was opened • The Jerusalem Virus -had bugs that re-infected programs that were already infected
  • 10.  1988: Robert Morris made a worm that invaded ARPANET computers - disabled 6,000 computers on the network by overflowing their memory banks with copies of itself  1991: Norton Anti-Virus software  1999: "Melissa" virus -infected thousands of computers very fast by sending copies of itself to 50 names in the address book on Outlook e-mail - Led to an estimated $80 million in damage and record sales of anti-virus products.  2000: "I Love You" virus -was sent by email and infected 10 % of computers in only one day -created by a young Filipino computer student who did not get punished because then the Philippines had no laws against hacking which led to the European Union's global Cybercrime Treaty.  2001: "Nimda" virus (days after 9/11) -had 5 ways of infecting systems
  • 11. • 2004 • MyDoom spreads through emails and file-sharing software faster than any previous virus or worm. • Allows hackers to access the hard drive of the infected computer. • An estimated one million computers running Windows are affected by the fast-spreading Sasser computer worm. • The worm does not cause irreparable harm to computers or data, but it does slow computers and cause some to quit or reboot without explanation. • 2006 • Discovery of the first-ever malware trojan horse for Mac OS X • 2008 • Torpig is a Trojan horse which affects Windows, turning off anti-virus applications. • It allows others to access the computer, modifies data, steals confidential information and installs malware on the victim's computer. • 2009 • Conficker infects anywhere from 9 to 15 million Microsoft server systems. • French air force, Royal Navy warships and submarines, Sheffield Hospital network, UK Ministry of Defence, German Bundeswehr and Norwegian Police were all affected.
  • 12. Total Number of Viruses by year January 1985 1 January 1985 1 January 1987 3 January 1989 6 January 1990 142 January 1991 357 January 1992 1,161 January 1993 2,482 January 1994 3,687 January 1995 5,626 January 1996 7,764 January 1997 11,037 January 1998 16,726 January 1999 40,850 January 2000 44,000 January 2001 48,000 January 2002 55,000 January 2003 62,000
  • 13. Melissa • Another virus that fired up the media was Melissa, a Word macro virus. • When people received the host Word document via email and opened it, the virus sent a copy of itself to the first 50 people in the victim's address book. • Named after a topless dancer in Florida, the Melissa virus crashed the email servers of corporations and governments in different spots around the world. • The Computer Emergency Response Team, set up after Robert Morris mucked up the Internet with his worm in 1988, estimated that the virus hit 100,000 computers in its first weekend. • David L. Smith posted the infected file to an alt.sex usenet group using a stolen AOL account. Initially he entered a plea of innocence, but after being confronted with a maximum sentence of 40 years in prison, he eventually pled guilty and received a much-reduced sentence.
  • 14. Love You, Love Bug • By almost any measure, the so-called Love Bug was the most damaging and costly virus ever. I don't know who comes up with these whack figures, but according to Reuters the bug cost the world $15 billion in lost productivity. • The Love Bug spread far faster than Melissa. Unlike Melissa, it would mail itself to everyone in your Outlook address book -- most of whom would probably be delighted to read about how you love them -- not just the first fifty. Moreover, it would gobble up certain media files stored on your hard drive.
  • 15. Did you know? • One German newspaper tragically lost 2,000 pictures from its archive. • The perpetrator turned out to be a 23-year-old Filipino computer science student who more or less plagiarized all of his code. • The lack of laws in the Philippines covering computer crimes, he pretty much got away with his crime.
  • 16. Prevention • Upload and use antivirus software • Be aware of the e-mails and attachments you open • Check for updates on antivirus software regularly • Make sure antivirus software is installed correctly