Download presentation
Presentation is loading. Please wait.
Published byImogene Kory Harrison Modified over 8 years ago
1
Venugopal reddy 07R91A05b7
2
Computer virus have become today’s headline news With the increasing use of the Internet, it has become easier for virus to spread Virus show us loopholes in software Most virus are targeted at the MS Windows OS
3
Þ Virus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own with out traveling to a new host.
4
Background Symptoms Classifying Viruses Examples Protection/Prevention Conclusion
5
There are estimated 30,000 computer viruses in existence Over 300 new ones are created each month First virus was created to show loopholes in software
6
ANSI COBOL C/C++ Pascal VBA Unix Shell Scripts JavaScript Basically any language that works on the system that is the target
7
Computer runs slower then usual Computer no longer boots up Screen sometimes flicker PC speaker beeps periodically System crashes for no reason Files/directories sometimes disappear
8
Today almost 87% of all viruses are spread through the internet (source: ZDNet) Transmission time to a new host is relatively low, on the order of hours to days.
9
Trojan Horse Worm
10
Covert Leaks information Usually does not reproduce
11
Features of Trojans: ◦ pings and query servers ◦ reboot or lock up the system ◦ display system information ◦ logs keystrokes ◦ server control
12
Spread over network connection Worms replicate First worm released on the Internet was called Morris worm, it was released on Nov 2, 1988.
13
Features of worms: ◦ requires WSL (windows scripting language), Outlook or Outlook Express, and IE5 ◦ Does not work in Windows NT ◦ Effects Spanish and English version of Windows ◦ 2 variants have been identified ◦ Is a “latent virus” on a Unix or Linux system
14
How Worms works ◦ worm is embedded within an email message of HTML format. ◦ a VbScript while the user views a HTML page ◦ a file named “Update.hta” is placed in the start up directory ◦ upon reboot worms executes
15
Knowledge Proper configurations Run only necessary programs Anti-virus software
16
There are three different kind of anti-viral packages: activity monitors, authentication or change-detection software, and scanners. Each type has its own strengths and weaknesses. Commercial anti-viral programs have a combination of the above mentioned functions.
17
Data Fellows F-Prot Data Fellows F-Prot EliaShim ViruSafe EliaShim ViruSafe ESaSS ThunderBYTE ESaSS ThunderBYTE IBM Antivirus IBM Antivirus McAfee Scan McAfee Scan Microsoft Anti-Virus Microsoft Anti-Virus Symantec Norton Antivirus Symantec Norton Antivirus S&S Dr S&S Dr Solomon's AVTK. S&S Dr S&S Dr Solomon's AVTK Bit Defender 2008 Bit Defender 2008
18
You know know more about virus and how: ◦ viruses work through your system ◦ to make a better virus Have seen how viruses show us a loophole in popular software Most viruses show that they can cause great damage due to loopholes in programming
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.