SlideShare uma empresa Scribd logo
1 de 33
Objectives

• Name some Computer Virus

• List different attacks of computer viruses
HISTORY
    OF
COMPUTER
  VIRUS
COMPUTER VIRUS
Program that spread,
replicate
and
Interferes computer
operation
How does it

AFFECT
Computers?
Viruses can

•   slow down your computer
•   corrupt your system files
•   make some programs faulty or corrupt
•   damage your boot sector
•   Tie up Internet traffic
•   turn your computer into a slave
•   steal important information from your computer
•   change the power ratings and blast your computer
•   worst case
    can make your computer unusable
Viruses behave in different ways

•   Hide in the system
•   Replace files
•   Replicate files
•   Delete files
•   Run programs
•   Send files and info
•   Deny access
•   Reboot computers
•   Clog your memory
Email attachments
Rogue Websites
Networks
Infected storage disks
Infected Software
Fake Anti Virus Software
Pirated programs
From Mobile Devices
Different types
         of

Computer Virus
•   Memory Resident Virus   •   Companion Viruses
•   Direct Action Viruses   •   FAT Virus
•   Overwrite Viruses
                            •   Multipartite Virus
•   Boot Sector Virus
                            •   Web Scripting Virus
•   Macro Virus
                            •   Worms
•   Directory Virus
•   Polymorphic Virus       •   Trojans
                            •   Logic Bombs
                            •   Rootkits
•   Memory Resident Virus   •   Companion Viruses
•   Direct Action Viruses   •   FAT Virus
•   Overwrite Viruses
                            •   Multipartite Virus
•   Boot Sector Virus
                            •   Web Scripting Virus
•   Macro Virus
                            •   Worms
•   Directory Virus
•   Polymorphic Virus       •   Trojans
                            •   Logic Bombs
                            •   Rootkits
OVERWRITE VIRUS

      deletes information contained in the files that it infects and
sometimes reboot the system

EX.
       Way
       Trj.Reboot
       Trivial.88.D

DAMAGE: files may be partially or totally
      useless
DIRECTORY VIRUS (CLUSTER)
       changing the path that indicates the location of a file and renaming all
executable to non-executable extensions. When you run the program, you first
run the virus

EX. Dir-2 virus (creeping death)

DAMAGE: Once infected, it becomes impossible to locate the original files.
FAT virus
Damaged the part of a disk used to store all the information about the location of
files, available space, unusable space, etc.
FILE ALLOCATION TABLE

Ex. Link Virus

Damage:
cause serious damage to computer
reformat needed.
WEB scripting Virus
originated from websites used for social networking.
Attached a link that could lead to other harmful sites.

Symptoms
       Yahoo and Google search will be re-directed
       Homepage of web browser, desktop          background often
get changed automatically

Damage: slow down the performance of the machine
Trojans
    •   Disguise as a useful program
    •   steal end-user information (credit card info, banks etc.)
    •   perform destructive harm on the target computer
    •   download additional computer malware

    Took its name From the Greek myth ‘Trojan Horse’
                     ex. Chernobyl virus 1998




                              Damage: perform destructive features   on the
                              computer.
Worms
replicates itself in order to spread to other computers
sends out hundreds or thousands of copies
creating a huge devastating effect

Ex. Morris worm – worth damaged between $10,000,000 and $100,000,000
    ILOVEYOU virus - Onel A. de Guzman, $5.5 billion to $8.7 billion in damages.        10% of all Internet-
connected computers were hit.


                      Damage
                      consumes too much system memory(or network
                      bandwidth), causing Web servers, network servers and individual
                      computers to stop responding
Rootkit
allow viruses and malware to “hide in plain sight” by disguising as necessary files that
your antivirus software will overlook
Worst case:
         control your computer and turn it into ‘Zombie’
            “secretly compromised by hacking tools which allow a third party to control the   computer and its resources
remotely”
HOW TO COUNTER



COMPUTER VIRUS
SCAN EMAIL ATTACHMENTS
USE WINDOWS FIREWALL
INSTALL A RELIABLE ANTIVIRUS
AVOID SUSPICIOS WEBSITE
WATCH YOUR DOWNLOADS
Computer Virus
•   Memory Resident Virus          •   Companion Viruses
•   Direct Action Viruses          •   FAT Virus
•   Overwrite Viruses              •   Multipartite Virus
•   Boot Sector Virus              •   Web Scripting Virus
•   Macro Virus                    •   Worms
•   Directory Virus                •   Trojans
•   Polymorphic Virus              •   Logic Bombs
                                   •   Rootkits
Viruses can

•   slow down your computer
•   corrupt your system files
•   make some programs faulty or corrupt
•   damage your boot sector
•   Tie up Internet traffic
•   turn your computer into a slave
•   steal important information from your computer
•   change the power ratings and blast your computer
•   worst case
    can make your computer unusable
 Cruda, mayday pp tx 2

Mais conteúdo relacionado

Mais procurados (20)

Viruses And Hacking
Viruses And HackingViruses And Hacking
Viruses And Hacking
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Top 10 Latest Viruses
Top 10 Latest VirusesTop 10 Latest Viruses
Top 10 Latest Viruses
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
Virus
VirusVirus
Virus
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Virus
VirusVirus
Virus
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Conficker
ConfickerConficker
Conficker
 
Backdoor
BackdoorBackdoor
Backdoor
 
Data Base Attack
Data Base AttackData Base Attack
Data Base Attack
 
Kernel.org Hacked & Rooted
Kernel.org Hacked & RootedKernel.org Hacked & Rooted
Kernel.org Hacked & Rooted
 
Know Your Worm (Conficker)
Know Your Worm (Conficker)Know Your Worm (Conficker)
Know Your Worm (Conficker)
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Conficker
ConfickerConficker
Conficker
 

Destaque

Como de grandes son tus datos
Como de grandes son tus datosComo de grandes son tus datos
Como de grandes son tus datosAntonio Rodriguez
 
Trabajo Practico Nº 1
Trabajo Practico Nº 1Trabajo Practico Nº 1
Trabajo Practico Nº 1luki_83
 
Dividend and dividend act
Dividend and dividend actDividend and dividend act
Dividend and dividend actAltacit Global
 
Родительское собрание ЕГЭ-2013
Родительское собрание ЕГЭ-2013Родительское собрание ЕГЭ-2013
Родительское собрание ЕГЭ-2013zerr0
 
реком для презентаций
реком для презентацийреком для презентаций
реком для презентацийzerr0
 
EXAMEN COMPUTACION
EXAMEN COMPUTACIONEXAMEN COMPUTACION
EXAMEN COMPUTACIONvegsonia
 
Du2013poynardtraitementhcv 130118061904-phpapp01
Du2013poynardtraitementhcv 130118061904-phpapp01Du2013poynardtraitementhcv 130118061904-phpapp01
Du2013poynardtraitementhcv 130118061904-phpapp01Frédérique Prévost
 
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...YouthEduForum
 
Carol Foy - CV
Carol Foy - CVCarol Foy - CV
Carol Foy - CVCarol Foy
 
Éducation et numérique : quelques étapes
Éducation et numérique : quelques étapesÉducation et numérique : quelques étapes
Éducation et numérique : quelques étapesBenoit Lacherez
 
Historia de la informática
Historia de la informáticaHistoria de la informática
Historia de la informáticaCecilia_Teobaldo
 
Interactive upload
Interactive uploadInteractive upload
Interactive uploadSS Free
 
Doença cardíaca crônica e Anemia
Doença cardíaca crônica e AnemiaDoença cardíaca crônica e Anemia
Doença cardíaca crônica e AnemiaMichael Collan
 
Use and reputation – ft – case (ipab)
Use and reputation – ft – case (ipab)Use and reputation – ft – case (ipab)
Use and reputation – ft – case (ipab)Altacit Global
 

Destaque (20)

8086 Architecture by Er. Swapnil Kaware
8086 Architecture by Er. Swapnil Kaware8086 Architecture by Er. Swapnil Kaware
8086 Architecture by Er. Swapnil Kaware
 
Como de grandes son tus datos
Como de grandes son tus datosComo de grandes son tus datos
Como de grandes son tus datos
 
Trabajo Practico Nº 1
Trabajo Practico Nº 1Trabajo Practico Nº 1
Trabajo Practico Nº 1
 
Dividend and dividend act
Dividend and dividend actDividend and dividend act
Dividend and dividend act
 
Contexto Histórico
Contexto HistóricoContexto Histórico
Contexto Histórico
 
Родительское собрание ЕГЭ-2013
Родительское собрание ЕГЭ-2013Родительское собрание ЕГЭ-2013
Родительское собрание ЕГЭ-2013
 
реком для презентаций
реком для презентацийреком для презентаций
реком для презентаций
 
EXAMEN COMPUTACION
EXAMEN COMPUTACIONEXAMEN COMPUTACION
EXAMEN COMPUTACION
 
Du2013poynardtraitementhcv 130118061904-phpapp01
Du2013poynardtraitementhcv 130118061904-phpapp01Du2013poynardtraitementhcv 130118061904-phpapp01
Du2013poynardtraitementhcv 130118061904-phpapp01
 
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...
 
Jeopardy 1
Jeopardy 1Jeopardy 1
Jeopardy 1
 
Alvin pp
Alvin ppAlvin pp
Alvin pp
 
Carol Foy - CV
Carol Foy - CVCarol Foy - CV
Carol Foy - CV
 
Éducation et numérique : quelques étapes
Éducation et numérique : quelques étapesÉducation et numérique : quelques étapes
Éducation et numérique : quelques étapes
 
تريز
تريزتريز
تريز
 
Historia de la informática
Historia de la informáticaHistoria de la informática
Historia de la informática
 
Interactive upload
Interactive uploadInteractive upload
Interactive upload
 
Doença cardíaca crônica e Anemia
Doença cardíaca crônica e AnemiaDoença cardíaca crônica e Anemia
Doença cardíaca crônica e Anemia
 
Звернення
ЗверненняЗвернення
Звернення
 
Use and reputation – ft – case (ipab)
Use and reputation – ft – case (ipab)Use and reputation – ft – case (ipab)
Use and reputation – ft – case (ipab)
 

Semelhante a Cruda, mayday pp tx 2

TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxglainAE
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanwormJenMorri
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptxmalikmuzammil2326
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virusKennethMorales26
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their typesNeha Kurale
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 

Semelhante a Cruda, mayday pp tx 2 (20)

Virus vs worms vs trojans
Virus vs worms vs trojansVirus vs worms vs trojans
Virus vs worms vs trojans
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
It ppt new
It ppt newIt ppt new
It ppt new
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Último (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Cruda, mayday pp tx 2

  • 1.
  • 2. Objectives • Name some Computer Virus • List different attacks of computer viruses
  • 3. HISTORY OF COMPUTER VIRUS
  • 4.
  • 6.
  • 9. Viruses can • slow down your computer • corrupt your system files • make some programs faulty or corrupt • damage your boot sector • Tie up Internet traffic • turn your computer into a slave • steal important information from your computer • change the power ratings and blast your computer • worst case can make your computer unusable
  • 10. Viruses behave in different ways • Hide in the system • Replace files • Replicate files • Delete files • Run programs • Send files and info • Deny access • Reboot computers • Clog your memory
  • 11.
  • 12. Email attachments Rogue Websites Networks Infected storage disks Infected Software Fake Anti Virus Software Pirated programs From Mobile Devices
  • 13. Different types of Computer Virus
  • 14. Memory Resident Virus • Companion Viruses • Direct Action Viruses • FAT Virus • Overwrite Viruses • Multipartite Virus • Boot Sector Virus • Web Scripting Virus • Macro Virus • Worms • Directory Virus • Polymorphic Virus • Trojans • Logic Bombs • Rootkits
  • 15. Memory Resident Virus • Companion Viruses • Direct Action Viruses • FAT Virus • Overwrite Viruses • Multipartite Virus • Boot Sector Virus • Web Scripting Virus • Macro Virus • Worms • Directory Virus • Polymorphic Virus • Trojans • Logic Bombs • Rootkits
  • 16. OVERWRITE VIRUS deletes information contained in the files that it infects and sometimes reboot the system EX. Way Trj.Reboot Trivial.88.D DAMAGE: files may be partially or totally useless
  • 17. DIRECTORY VIRUS (CLUSTER) changing the path that indicates the location of a file and renaming all executable to non-executable extensions. When you run the program, you first run the virus EX. Dir-2 virus (creeping death) DAMAGE: Once infected, it becomes impossible to locate the original files.
  • 18. FAT virus Damaged the part of a disk used to store all the information about the location of files, available space, unusable space, etc. FILE ALLOCATION TABLE Ex. Link Virus Damage: cause serious damage to computer reformat needed.
  • 19. WEB scripting Virus originated from websites used for social networking. Attached a link that could lead to other harmful sites. Symptoms Yahoo and Google search will be re-directed Homepage of web browser, desktop background often get changed automatically Damage: slow down the performance of the machine
  • 20. Trojans • Disguise as a useful program • steal end-user information (credit card info, banks etc.) • perform destructive harm on the target computer • download additional computer malware Took its name From the Greek myth ‘Trojan Horse’ ex. Chernobyl virus 1998 Damage: perform destructive features on the computer.
  • 21. Worms replicates itself in order to spread to other computers sends out hundreds or thousands of copies creating a huge devastating effect Ex. Morris worm – worth damaged between $10,000,000 and $100,000,000 ILOVEYOU virus - Onel A. de Guzman, $5.5 billion to $8.7 billion in damages. 10% of all Internet- connected computers were hit. Damage consumes too much system memory(or network bandwidth), causing Web servers, network servers and individual computers to stop responding
  • 22. Rootkit allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook Worst case: control your computer and turn it into ‘Zombie’ “secretly compromised by hacking tools which allow a third party to control the computer and its resources remotely”
  • 26. INSTALL A RELIABLE ANTIVIRUS
  • 29.
  • 30.
  • 31. Computer Virus • Memory Resident Virus • Companion Viruses • Direct Action Viruses • FAT Virus • Overwrite Viruses • Multipartite Virus • Boot Sector Virus • Web Scripting Virus • Macro Virus • Worms • Directory Virus • Trojans • Polymorphic Virus • Logic Bombs • Rootkits
  • 32. Viruses can • slow down your computer • corrupt your system files • make some programs faulty or corrupt • damage your boot sector • Tie up Internet traffic • turn your computer into a slave • steal important information from your computer • change the power ratings and blast your computer • worst case can make your computer unusable