2. COMPUTER VIRUS
A computer virus is a computer program that can
reproduce itself and spread from one computer to
another. and leaving infections as it travels, Like a
human virus.
Some virus may cause only testing effects while others
can damage your hardware, software or files. Almost
all viruses are attached to an executable file.
It is important to note that a virus cannot be spread
without a human action.
Because a virus is spread by human action people will
unknowingly continue the spread of a computer virus
by sharing infecting files or sending emails with
viruses as attachments in the email.
3. EFFECT OF COMPUTER VIRUS
It can slow down your computer.
It might corrupt your system files.
It might make some programs faulty or
corrupt.
It might damage your boot sector creating
problems when you boot into the windows.
it might steal important information from
your computer and send to some other
person.
It might change the power ratings of your
computer and could blast the system.
4. VIRUS IMPACT ON SYSTEM ACCESSORIES
Programs. Some viruses may impair your certain computer
programs and applications. As a result, you may not be able to
access the software or operate it smoothly.
Files. There are viruses that may modify, corrupt or delete files in
your machine owing to which you may not be able to access them.
Hard disk. Some viruses may attack the data present on your
computer’s hard disk, resulting in its crash. You may need to
reformat the disk in such cases.
Operational impact. Some viruses may not apparently harm your
system’s integrity and may limit themselves to displaying text
messages, images, audio and Video.
5. WHY DO PEOPLE CREATE COMPUTER VIRUS
To take control of a computer and use it for
specific tasks
To generate money
To steal sensitive information (credit card numbers,
passwords, personal details, data etc.)
To prove a point, to prove it can be done, to prove
ones skill or for revenge purposes
6. VIRUS IMPACT ON SYSTEM ACCESSORIES
Hardware. No computer viruses are capable of damaging your
hardware yet. They just work on all the files and data of your system,
make them useless and disable them.
Speed. Your system may slow down under the influence of viruses as
they consume your system’s memory for their execution.
Booting. Your system may suddenly restart and at times may not load
properly. In few cases, you may not be able to access your disk drives.
Applications. Viruses may modify, damage or delete your program files
and system files because of which applications on your system may not
be able to work appropriately.
7. VIRUS IMPACT ON SYSTEM ACCESSORIES
Reinstall. Some computer viruses are designed in the gravest
way possible. They cannot be uninstalled easily from your
system and some reinstall themselves even after they have
been removed.
Peripherals. Some viruses may impact device driver software
in your computer resulting in the relevant operational
issues. For example, disturbed software setting for printer
may impair its function.
8. COMPUTER VIRUS HISTORY
Elk Cloner has the distinction of being the
first wild virus for a home computer.
Coded by then-high-school student, Richard
Skrenta, around 1982.
who created the search engine blekko.
Happy
Birthday
Joshi',
the virus was first discovered in India in
June 1990
The first known virus was created in 1971
by Cambridge and was called the Creeper
Virus.
Creeper was an experimental selfreplicating program written by Bob Thomas
at BBN in 1971.
9. COMPUTER VIRUS HISTORY
This virus was spread using the Advanced Research Projects
Agency Network (ARPANET).
It was designed not to damage but to demonstrate a mobile
application. It is generally accepted to be the first computer
worm, although the Concept of a "computer virus" did not
exist in the 1970s
When the computers were infected, the message "I'm the
creeper, catch me if you can!"
This year marks the 40th anniversary of Creeper.
10. FIRST VIRUS FROM PAKISTAN
World's first computer virus was created to infect IBM PCs by
two Pakistani brothers, Amjad and Basit Farooq in 1986.
While they were trying to explore their expertise and potential
of MS DOS operating system, Virus travelled beyond their
imagination through Asia, Europe and was picked up in USA.
Amjad and Basit Farooq Alvi
11. FIRST VIRUS FROM PAKISTAN
The first computer virus named “Brain” was
designed by Amjad Farooq Alvi and Basit
Farooq Alvi.
"Beware
of this VIRUS...Contact us for
vaccination,". This message was put on the
screen.
The interesting fact remains that the location
of the “Brain Pvt Limited” is exactly the same
where the virus was first developed.
12. 10 LATEST COMPUTER VIRUS
Virus name
Spreading
Damage
Discovered
Backdoor.IRCBot.Dorkbot.A
MEDIUM
MEDIUM
2011 May 15
Backdoor.Lavandos.A
MEDIUM
HIGH
2011 Jan 06
VERY LOW
HIGH
2011 Jan 03
Java.Trojan.Downloader.OpenConn
ection.AI
HIGH
MEDIUM
2010 Nov 12
Java.Backdoor.ReverseBackdoor.A
LOW
MEDIUM
2010 Nov 12
VERY LOW
VERY LOW
2010 Oct 28
MEDIUM
HIGH
2010 Oct 20
Win32.Worm.Stuxnet.A
HIGH
MEDIUM
2010 Oct 07
Win32.Worm.Prolaco.S
MEDIUM
MEDIUM
2010 Oct 06
Exploit.CplLnk.Gen
MEDIUM
LOW
2010 Jul 19
Trojan.Android.Geinimi.A
Win32.Ramnit.G
Trojan.Spy.Ursnif.F
13. WORLD’S WORST COMPUTER VIRUS
Surreptitious Sircam
Sircam appeared in July 2001 on PCs running Windows 95, 98, and
Me.
The worm appeared in e-mail in-boxes with an attachment
the body of the message was in Spanish or English.
Typical greetings included "Hi! How are you?" and "Hola como
estas?”
Raid raider
Code Red burned brightly in the summer of 2001,
Infecting hundreds of thousands of computers--mainly on corporate
networks.
14. WORLD’S WORST COMPUTER VIRUS
Maniacal Magistr
Magistr is one of the most complex viruses to hit the Internet.
Its victims, users of Outlook Express, were hooked by an infected email attachment.
The virus, discovered in mid-March 2001,
Sent garbled messages to everyone in the infected user's e-mail
address book
Melissa
Melissa propagated via infected Microsoft Word documents and
mailed itself to Outlook contacts of the contaminated user.
15. WORLD’S WORST COMPUTER VIRUS
Expletive Deleted) Explorer
The Explorer.zip worm appeared in the summer of 1999.
The worm deleted Word, Excel, and PowerPoint files and
types of files.
Explorer traveled via e-mails that appeared to be from
someone the recipient knew.
Numbing Nimda
Nimda (also known as the Concept Virus) appeared in
September 2001,
Attacking tens of thousands of servers and hundreds of
thousands of PCs.
The worm modified Web documents and executable files
The worm spread as an embedded attachment in an HTML
e-mail message that would execute as soon as the
recipient opened the message
16. SOME COMPUTER SECURITY THREATS
ADWARE
Adware is software that displays advertisements on your computer.
BACKDOOR TROJAN
A backdoor Trojan allows someone to take control of another user’s
computer via the internet without their permission.
BLUE JACKING
Bluejacking is sending anonymous, unwanted messages to other users
with Bluetooth-enabled mobile phones or laptops.
BLUE SNARFING
Bluesnarfing is the theft of data from a Bluetooth phone.
Like Bluejacking, Bluesnarfing depends on the ability of Bluetoothenabled devices todetect and contact others nearby.
17. SOME COMPUTER SECURITY THREATS
BOOT SECTOR VIRUS
Boot sector viruses spread by modifying the program that enables
your computer to start up
BROWSER HIJACKERS
Browser hijackers change the default home and search pages in your
internet browser
CHAIN LETTER
In electronic chain letter is an email that urges you to forward copies
to other people.
COOKIES
Cookies are files on your computer that enable websites to remember
your details.
DENIAL OF SERVICE
A denial-of-service (DoS) attack prevents users from accessing a
computer or website.
18. SOME COMPUTER SECURITY THREATS
Worms
Worms are programs that replicate and spread, often opening a back door to allow
hackers to gain access to the computers that they infect.
Worms can spread over the Internet by exploiting security flaws in the software of
computers that are connected to the Internet. Worms can also spread by copying
themselves from disk to disk or by email.
Zombies
A Zombie is a hidden program that lies inactive on a computer.
Zombies don’t normally damage the computer on which they reside but can
damage other computers.
Zombies often arrive as email attachments and when the attachment is opened
they install themselves secretly and then wait to be activated.
Phishing
A Phishing attack is when you are are sent an email that asks you to click on a link
and re-enter your bank or credit card details. These emails can pretend to be from
banks, Internet service providers, on-line stores and so on, and both the email and
the web site it links to appear genuine. When you enter your bank or credit card
details they are then used fraudulently.
20. ADWARE
Adware, or advertising-supported software, is
any software package which automatically plays, displays, or
downloads advertisements to a computer.
These advertisements can be in the form of a pop-up.
They may also be in the user interface of the software or on a
screen presented to the user during the installation process.
The object of the Adware is to generate revenue for its author
Advertising functions are integrated into or bundled with the
software, which is often designed to note what Internet sites the
user visits
21. MALWARE
Malware, short for malicious software, Malware is a very general word for
software that deliberately harms, restricts, alters, or stops your computer from
working properly where the true purpose of the download or installation is
hidden or difficult to find and not clearly explained to the user .
Malware includes computer viruses, worms, trojan horses, spyware, dishonest
adware, scareware, crimeware, most rootkits, and other malicious and
unwanted software or program.
Malware can arrive through an internet download, as an email link or
attachment
as a file sent between users of instant messaging, social networking
communities, peer-to-peer file sharing programs, online games, online video
games or chatrooms or a link to a malicious webpage.
22. MALWARE
The best-known types of malware, viruses and worms, are
known for the manner in which they spread, rather than any
other particular behavior.
The term computer virus is used for a program that has
infected some executable software and, when run, causes the
virus to spread to other executables .
On
the
other
hand,
a
worm
is
a
program
that actively transmits itself over a network to infect other
computers
23. INDICATION OF MALWARE
the browser’s home page keeps changing
Pop-up advertisements appear when your browser is closed,.
Strange icons appear on your desktop without your prompting or
knowledge of the program
The computer light is blinking (meaning that your computer is
processing information) at unusual or unexpected times.
Your browser settings keep changing, including the webpage you
designate as your internet start-up page
Files are uploaded or downloaded without your prompting or
permission.
24. SPYWARE
Spyware
is
Internet
language
for
Advertising
Supported
software (Adware).
Spyware is
tracking software that hides itself (runs in
the
background) and gathers information without the computer owner's
or user's knowledge or permission for the benefit of someone else
The first recorded use of the term spyware occurred on 16 October
1995.
showing them pop-up ads, or altering web-browser behavior for the
financial benefit of the spyware creator.
For instance, some spyware programs redirect search engine results
to paid advertisements.
25. SPYWARE
Others,
often
called
"stealware"
by
the
media,
overwrite affiliate marketing codes so that revenue is
redirected to the spyware creator rather than the intended
recipient.
The presence of spyware is typically hidden from the user,
and can be difficult to detect
Spyware programs can collect various types of personal
information, such as Internet surfing habits and sites that
have been visited,
As of 2006, spyware has become one of the preeminent
security threats to computer systems running Microsoft
Windows operating systems.
26. GUIDELINE TO AVOID SPYWARE
Not opening emails or email attachments from
unknown senders
Block or don’t click on suspicious pop-up windows
Don’t open files that are more prone to be associated
with malware such as .bat, .pif, .txt .vbs, .htm .exe or
.vbs
Don’t download or execute applications from
untrusted sources.
Avoid phishing scams.
Use updated anti-virus and anti-spyware software
regularly.
27. COMPUTER ANTIVIRUS
A utility that searches a hard disk for viruses and removes any that are
found.
Antivirus software is a computer program you install on your machine that
scans files for malicious (dangerous) programs and either deletes them or
"heals" them therefore eliminating the threat of damage to your computer.
Most antivirus programs include an auto-update feature that enables
the program to download profiles of new viruses so that it can check
for the new viruses as soon as they are discovered.
Antivirus software is a computer program that detects, prevents, and
takes action to disarm or remove malicious software programs, such
as viruses and worms.
28. COMPUTER ANTIVIRUS HISTORY
The very first anti-virus software wasn't really an anti-virus
software.
It was a removal tool to remove a Polish virus named MKS vir.
That removal tool was released in 1987, and the person who
first had the idea of such removal tool was Bernt Fix.
29. BENEFITS FROM ANTIVIRUS
Stop Virus-Related Damage
Maintain the PC's Security
Protect Against Email Threats/Spam
Financial Savings
Protect Data and Files
30. TOP 10 ANTIVIRUS
Norton Antivirus
Kaspersky Antivirus
McAfee Antivirus Plus
Avira Antivir Premium
AVG Antivirus
ESET NOD32 Antivirus
ZoneAlarm Antvirus
Panda Antivirus
BitDefender Antivirus
F-Secure Antivirus
31. FIREWALL
A personal firewall is an application which controls network traffic to
and from a computer, permitting or denying communications based
on a security policy.
A personal firewall will usually protect only the computer on which it
is installed.
Personal firewalls may also provide some level of trouble detection,
allowing the software to terminate or block connectivity.
Allows the user to control which programs can and cannot access
the local network and/or Internet.
Provide information about the destination server with which an
application is attempting to communicate.
32. FIREWALL
They block other packets (usually dropping them
without acknowledgment to the sender). In
principle, application firewalls can prevent all
unwanted outside traffic from reaching protected
machines.
Packet filter: Looks at each packet entering or
leaving the network and accepts or rejects it based
on user-defined rules.
34. ANKIT FADIA
Ankit Fadia is an independent computer
security consultant
He runs a program on computer security for
corporates in alliance with Reliance Info
He
started
a
website
called
"HackingTruths". At 15, his book on Ethical
Hacking made him the youngest author to
be published by Macmillan India.
Fadia
sponsors
Singapore
Management
University's "Ankit Fadia Study Award", which
consists
of
a
$1000
cash
prize
and
Certificate which is annually awarded to "an
outstanding student“
35. ANKIT FADIA
According to Wendy McAuliffe at ZDNet UK, Fadia's Hacking
Truths website was judged "second best hacking site" by the Federal
Bureau of Investigation, though no ranked list of "hacking sites“
Person of the Year India 2002’ by Limca Book of Records.
In December 2009 Fadia's business site, hackingmobilephones.com
appeared.
Ankit Fadia’s Hacking Books--
The Unofficial Guide to Ethical Hacking
Network Security: A Hacker's Perspective
Hacking Mobile Phones
Tips and Tricks on Linux
Email Hacking