SlideShare uma empresa Scribd logo
1 de 12
Malicious codes  and Other Wild Life Oleh: M. Yahya, S. Kom email:  [email_address] Facebook:  [email_address]  or  www.facebook.com/yahya73 website:  http:// sinaudotcom.blogspot.com
Malicious Codes ,[object Object]
Jenis Malicious Codes  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trap Doors/ Back Doors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados (19)

Virus, trojan, dan worm
Virus, trojan, dan wormVirus, trojan, dan worm
Virus, trojan, dan worm
 
Virus Pada Komputer
Virus Pada KomputerVirus Pada Komputer
Virus Pada Komputer
 
Mengenal virus
Mengenal virusMengenal virus
Mengenal virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Virus Komputer
Virus KomputerVirus Komputer
Virus Komputer
 
Apa itu malware
Apa itu malwareApa itu malware
Apa itu malware
 
virus komputer
virus komputervirus komputer
virus komputer
 
Mengenal Program Jahat Komputer
Mengenal Program Jahat KomputerMengenal Program Jahat Komputer
Mengenal Program Jahat Komputer
 
Pengenalan dan Analisa Malware
Pengenalan dan Analisa MalwarePengenalan dan Analisa Malware
Pengenalan dan Analisa Malware
 
Tgs 8 (virus)
Tgs 8 (virus)Tgs 8 (virus)
Tgs 8 (virus)
 
Tugas kelompok 1 kapiten patimura
Tugas kelompok 1 kapiten patimuraTugas kelompok 1 kapiten patimura
Tugas kelompok 1 kapiten patimura
 
Malware
MalwareMalware
Malware
 
Jurnal trojan horse
Jurnal trojan horseJurnal trojan horse
Jurnal trojan horse
 
Virus-virus didalam Komputer
Virus-virus didalam KomputerVirus-virus didalam Komputer
Virus-virus didalam Komputer
 
Malware
MalwareMalware
Malware
 
Mengenal Internet Security
Mengenal Internet SecurityMengenal Internet Security
Mengenal Internet Security
 
about virus and his enemy
about virus and his enemyabout virus and his enemy
about virus and his enemy
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 

Destaque

Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014Supriya Radhakrishna
 
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSM.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSSupriya Radhakrishna
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...vtunotesbysree
 

Destaque (11)

Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Malicious
MaliciousMalicious
Malicious
 
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Adbms lab manual
Adbms lab manualAdbms lab manual
Adbms lab manual
 
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSM.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malware
MalwareMalware
Malware
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
 

Semelhante a Malicious Code

Virus dan other wild life.ppt
Virus dan other wild life.pptVirus dan other wild life.ppt
Virus dan other wild life.pptIDIARSOMANDIRAJA
 
Mulok xii ipa 4
Mulok   xii ipa 4Mulok   xii ipa 4
Mulok xii ipa 4iriinriin
 
Devil program and safe computer security.pptx
Devil program and safe computer security.pptxDevil program and safe computer security.pptx
Devil program and safe computer security.pptxAsmanyNurwahid
 
Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Dhika Vermansyah
 
Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Dhika Vermansyah
 
Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Gita A Nisa
 
TUGAS MULOK III (viruses)
TUGAS MULOK III (viruses)TUGAS MULOK III (viruses)
TUGAS MULOK III (viruses)ayu-sekarr
 
Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Dhika Vermansyah
 
Tugas mulok fix (1)
Tugas mulok fix (1)Tugas mulok fix (1)
Tugas mulok fix (1)Reza Ernando
 
Antivirus dan Antispyware PTI-A 2012 (12050974248 dan 12050974251)
Antivirus dan Antispyware PTI-A 2012 (12050974248 dan 12050974251)Antivirus dan Antispyware PTI-A 2012 (12050974248 dan 12050974251)
Antivirus dan Antispyware PTI-A 2012 (12050974248 dan 12050974251)dwidhoasih
 
Slaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan KomputerSlaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan Komputerrazak12345
 

Semelhante a Malicious Code (20)

Virus dan other wild life.ppt
Virus dan other wild life.pptVirus dan other wild life.ppt
Virus dan other wild life.ppt
 
Kelompok 6
Kelompok 6Kelompok 6
Kelompok 6
 
Trojan Presentation
Trojan PresentationTrojan Presentation
Trojan Presentation
 
Mulok xii ipa 4
Mulok   xii ipa 4Mulok   xii ipa 4
Mulok xii ipa 4
 
Devil program and safe computer security.pptx
Devil program and safe computer security.pptxDevil program and safe computer security.pptx
Devil program and safe computer security.pptx
 
Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4
 
Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4
 
Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4
 
TUGAS MULOK III (viruses)
TUGAS MULOK III (viruses)TUGAS MULOK III (viruses)
TUGAS MULOK III (viruses)
 
Basic Metasploit
Basic MetasploitBasic Metasploit
Basic Metasploit
 
Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4Tugas mulok virus xii ipa 4
Tugas mulok virus xii ipa 4
 
Tugas mulok fix (1)
Tugas mulok fix (1)Tugas mulok fix (1)
Tugas mulok fix (1)
 
Antivirus dan Antispyware PTI-A 2012 (12050974248 dan 12050974251)
Antivirus dan Antispyware PTI-A 2012 (12050974248 dan 12050974251)Antivirus dan Antispyware PTI-A 2012 (12050974248 dan 12050974251)
Antivirus dan Antispyware PTI-A 2012 (12050974248 dan 12050974251)
 
Mulok tugas 3
Mulok tugas 3Mulok tugas 3
Mulok tugas 3
 
Virus komputer
Virus komputer Virus komputer
Virus komputer
 
Virus komputer
Virus komputerVirus komputer
Virus komputer
 
Virus komputer
Virus komputerVirus komputer
Virus komputer
 
Slaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan KomputerSlaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan Komputer
 
Virus komputer
Virus komputerVirus komputer
Virus komputer
 
Ganteng banget
Ganteng bangetGanteng banget
Ganteng banget
 

Mais de Yahya Electone (13)

I N T R O T O C O M P U T E R N E T W O R K S ( N E W)
I N T R O  T O  C O M P U T E R  N E T W O R K S ( N E W)I N T R O  T O  C O M P U T E R  N E T W O R K S ( N E W)
I N T R O T O C O M P U T E R N E T W O R K S ( N E W)
 
Journalfacebook2kolom
Journalfacebook2kolomJournalfacebook2kolom
Journalfacebook2kolom
 
P I K 7
P I K 7P I K 7
P I K 7
 
P I K 6
P I K 6P I K 6
P I K 6
 
P I K 4
P I K 4P I K 4
P I K 4
 
P I K 3
P I K 3P I K 3
P I K 3
 
P I K 2
P I K 2P I K 2
P I K 2
 
P I K 1
P I K 1P I K 1
P I K 1
 
Multimedia Pembelajaran
Multimedia  PembelajaranMultimedia  Pembelajaran
Multimedia Pembelajaran
 
Orkom1
Orkom1Orkom1
Orkom1
 
Soal
SoalSoal
Soal
 
P T I
P T IP T I
P T I
 
Jadwal 35 Samarinda
Jadwal 35  SamarindaJadwal 35  Samarinda
Jadwal 35 Samarinda
 

Malicious Code

  • 1. Malicious codes and Other Wild Life Oleh: M. Yahya, S. Kom email: [email_address] Facebook: [email_address] or www.facebook.com/yahya73 website: http:// sinaudotcom.blogspot.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.