Malware Fighting Spyware, Viruses, and Malware Ch 4.

Slides:



Advertisements
Similar presentations
the Internet browser of choiceVidor ISD What is Internet Explorer? a Web browser* produced by the Microsoft Corporation *a software application used.
Advertisements

Virus Removal BB&C Case Study Roger Bailey Oct 2006.
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cosc 4765 Cleaning up.. So… The Windows machine has been infected/comprised or just “acting funny”. How to clean it up. Hope you have backups…
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Chapter 8 Damage Control How to remove viruses and spyware infections.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
1 Computer Security: Protect your PC and Protect Yourself.
Security Advice Georgie Pepper Campsmount Acadamy.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
HijackThis - A general Homepage Hijacker Detector and Removal Tool By: Tahira Farid Project 1 Fall 2004.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
March 14, Microsoft Microsoft officially announced the date and time that Internet Explorer 9 (IE9) will move away from a release candidate and.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Basic Computer Cleanup Larry James ResNet Manager.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
PC Maintenance How to keep your computer healthy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
Return to the PC Security web page Lesson 5: Dealing with Malware.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
W elcome to our Presentation. Presentation Topic Virus.
PREVENTION Cleaning/Housekeeping BASIC MONTHLY CHECK OFF LIST (Minimum requirement): –Cleaning »Physical Cleaning »Clean internal dust bunnies with canned.
 How to install and Activate Kaspersky Endpoint Security 10  How to block usb drives and CD/DVD drives  How to manually update Virus definition  How.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
COMPUTER VIRUSES By James Robins. THE IMPACT OF VIRUSES By James 2.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Protecting Your PC. Malware Virus Trojan Spyware Worm Rootkit Browser Hijacker With or Without AV software, ALL computers that have access to the internet.
Speeding Up Your PC Roger Libman. Typical Repair Orders.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Computer Security Keeping you and your computer safe in the digital world.
For more information on Rouge, visit:
What they are and how to protect against them
oad or wrong installation or Call
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
MacAfee product keyMacAfee product key,
Remove Security Tool Recently, quite a number of staff infected by Security Tool. This is so called Rogue software. User simply click some link in the.
Presentation transcript:

Malware Fighting Spyware, Viruses, and Malware Ch 4

How the Pros Do It Test machines Easily replaced test OS images Software to detect exactly what damage an infection has caused –We now have all these things for free with virtual PCs and HijackThis

Anatomy of an Infection File system –Add, delete, or modify files Spyware doesn’t usually modify or delete files, or make many copies of itself; that’s what viruses do Windows Registry –All software installation modifies the Registry –Avoid editing the Registry manually; if you must, set a Restore Point first (demonstration)

Anatomy of an Infection Internet Explorer and other Applications –Change IE home page and security settings Prevents updates or online virus scans Especially common with Browser Hijackers To remove browser hijackers, go to a clean machine and download Stinger from McAfee –Link CNIT 30 Ch 4a, or /vil.nai.com/vil/stinger/ –Infect Outlook, send s to people in your Address book

Anatomy of an Infection Windows System –May block Windows Update, or even show you a fake Windows Update Screen –Some malware kicks out previous infections to steal zombies from other botmasters

System Restore Enables Windows XP machines to return the system files to the way they were on a previous date –Fixes many problems, but not viruses or worms –Infections can hide in the Restore Points, so that later Restores re-infect a cleaned system –Delete the Restore points before running Stinger, and most other malware removal tools too

Disabling System Restore System Properties Turning it off deletes all the Restore points Don’t do it casually, only when you know you are infected

Safe Mode Press F8 during startup Startup items, like spyware, don’t run But neither do antivirus and antispyware programs Avoid “Safe Mode with Networking” for that reason

Registry Editing The Registry stores thousands of system settings –Control Panel is the best way to modify the Registry for normal activities –To manually change the Registry, use Start, Run, Regedit

Registry Editing You may need to remove items spyware puts into the Registry manually –You can wreck your machine with a wrong registry edit –Set a Restore Point first –Project 3x guides you through a few fun Registry hacks

CoolWebSearch This is an example of very nasty malware Makes pop-ups Blocks antispyware scans Adds favorites to Internet Explorer Hijacks the home page and other pages via the Hosts file Some variants are very difficult to remove –See links CNIT 30 Ch 4d, 4e

Hosts File C:\WINDOWS\system32\drivers\etc\Hosts –Can be used to make networking faster and more reliable –Can also be used to redirect traffic to spoofed sites “Pharming”