Downloading + Viruses
Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite
Downloads Music Movies Books Applications Photos/Images Text Files Server vs. Peer to Peer
Cost of Downloaded Programs Freeware Drivers, etc. Shareware Trial Purchased Programs
ftp Sites Upload and download files on the internet. Greatly replaced by web files downloads. FTP sites accessed through a browser for downloads: (ftp://citadel.sjfc.edu)ftp://citadel.sjfc.edu FTP software can work with a command line or graphic interface.
Downloading Plug-Ins Flash ( Quicktime RealPlayer Shockwave Acrobat Reader VRML
Viruses A program which infects (affects) other programs or sectors of a disk or hard drive. Transmitted with an infected disk, program or file. An virus is transmitted by opening an “executable” attachment received via A virus can attack the BIOS, erase files, erase the hard drive, or simply reveal messages Some types: polymorphic, stealth “in the wild”
Types of Viruses Harmless Paper-tigers Harmful Hot Famous viruses include: Michelangelo ( angelo'_computer_virus), Melissa, Loveletterhttp:// angelo'_computer_virus
Worms Many viruses are actually worms. Transmitted over network (internet) if there is a security hole. (Windows vs. Macs and Unix) Frequently spreads by copying addresses from address books. May be “harmless” (just take up processing time) or ruin files or erase hard drives. Always replicate themselves to spread. Robert Morris story—disconnect computer when experimenting
Mydoom Virus Causing problems in January 2004 Attacking companies, including Microsoft Moves through (as a Technical Message) and if opened, may reprogram your computer into a “zombie” (a computer which attacks other sites), replicates by sending to addresses in address book, and/or connects to Kazaa and disguises itself as a bootleg copy of Microsoft Office living on your computer.
Trojan Horses Programs hidden within other programs (have two simultaneous functions). Cause damage to files or a hard drive or create some frivolous effect: an annoying greeting. If one program is indeed useful, malicious purpose is never discovered.
Spyware Keylogger Information may be sent to chat room or other “public” place May be hidden in “Adware”
Programs to Fight Viruses Scanners Monitors Integrity Checkers Immunizers Behavior Blockers
Avoiding Viruses Update antivirus program Be careful with attachments Install program updates Check disks and other “mobile media” Back up files Create a virus-free startup disk Use multiple techniques
Other Methods of Affecting Your Computer Remote-access software Web Sites (possibly with Active X)
How Hackers Find You Must discover your IP address This happens when you: Visit the hacker’s site Visit a site that has been “hijacked” Open an with HTML that connects to the hacker’s site. Send an to the hacker’s site Post to a newsgroup A virus that “phones home” Share an ISP/LAN Or…War Dialing
Hackers also… Find holes in popular programs e.g. AOL Instant Messenger Look at your hard drive Clean-Up Afterwards?
Other malevolent approaches Cookies: used by multiple sites hoaxes: (they are the viruses) or directions to erase a file Website Hosts, including redirection (bush2004.com???)
Protective Measures Use virus programs. Add a firewall, especially if you have a high-speed connection. Own a Macintosh (or Unix) computer. Supposedly safe attachments: txt; jpg, gif, bmp, tif,wmf; avi,mpg,mov,wmv;pdf;mp3,wav Possibly unsafe attachments: bat,com,exe,js,jde,pif,reg,scr,shs,vbe,vbs, wsf,wsh Be wary of Peer-to-Peer, remote access applications, public wireless systems, as well as personal web servers Choose good passwords