SlideShare a Scribd company logo
1 of 22
By Mr UV




Computer Viruses and Worms
Definition of Virus
Computer Virus Timeline
Worms
History of Worms
   The first worm to attract wide attention, the
    Morris worm, was written by Robert Tappan
    Morris, who at the time was a graduate
    student at Cornell University.
   It was released on November 2, 1988
   Morris himself was convicted under the US
    Computer Crime and Abuse Act and received
    three years probation, community service and
    a fine in excess of $10,000.
Worms…
   Worms – is a small piece of software that
    uses computer networks and security holes to
    replicate itself. A copy of the worm scans the
    network for another machine that has a
    specific security hole. It copies itself to the
    new machine using the security hole, and
    then starts replicating from there, as well.
   They are often designed to exploit the file
    transmission capabilities found on many
    computers.
Zombies






Typical things that some current
Personal Computer (PC) viruses do
Typical things that some current
Personal Computer (PC) viruses do
Distributed Denial of
       Service
How it works?
MyDoom
   27 January: SCO Group offers a US $250,000
    reward for information leading to the arrest of the
    worm's creator.
   1 February: An estimated one million computers
    around the world infected with MyDoom begin
    the virus's massive distributed denial of service
    attack—the largest such attack to date.
   2 February: The SCO Group moves its site to
    www.thescogroup.com.
 Traditional Viruses
 pieces of code attached to a legitimate
  program
 run when the legitimate program gets
  executed
 loads itself into memory and looks around
  to see if it can find any other programs on
  the disk
 Traditional Virus
 infect the boot sector on floppy disks and
  hard disks
 By putting its code in the boot sector, a
  virus can guarantee it gets executed
 load itself into memory immediately, and it
  is able to run whenever the computer is on
Decline of traditional viruses
   Reasons:
    – Huge size of today’s programs storing on a
      compact disk
    – Operating systems now protect the boot
      sector
E-mail Viruses
 Moves around in e-mail messages
 Replicates itself by automatically mailing
  itself to dozens of people in the victim’s e-mail
  address book
 Example: Melissa virus, ILOVEYOU virus
   March 1999
   the Melissa virus was the fastest-spreading virus
    ever seen
   Someone created the virus as a Word document
    uploaded to an Internet newsgroup
   People who downloaded the document and opened
    it would trigger the virus
   The virus would then send the document in an e-
    mail message to the first 50 people in the person's
    address book
Melissa virus
   Took advantage of the programming
    language built into Microsoft Word called
    VBA (Visual Basic for Applications)
Prevention
 Updates
 Anti-Viruses
 More secure operating systems
  e.g. UNIX
Reference
   http://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gif
   http://www.factmonster.com/ipka/A0872842.html
    http://www.faqs.org/faqs/computer-virus/new-users/
   http://www.mines.edu/academic/computer/viri-sysadmin.htm

More Related Content

What's hot

Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingmentcheauyih
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and preventionCholo Legisma
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and preventionCholo Legisma
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spreadwenxin
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Spreading virus
Spreading virusSpreading virus
Spreading virusdixitas
 
Guarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.SivakumarGuarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.SivakumarSivakumar R D .
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 

What's hot (20)

Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and prevention
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and prevention
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 
Guarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.SivakumarGuarding Against Virus - R.D.Sivakumar
Guarding Against Virus - R.D.Sivakumar
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 

Viewers also liked

Viewers also liked (6)

Virus and worms analysis
Virus and worms analysisVirus and worms analysis
Virus and worms analysis
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 

Similar to Viruses (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Virus09
Virus09Virus09
Virus09
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Virus
Virus  Virus
Virus
 

More from yuvan80

Angles and shapes
Angles and shapesAngles and shapes
Angles and shapesyuvan80
 
Area and perimeter_10_r5
Area and perimeter_10_r5Area and perimeter_10_r5
Area and perimeter_10_r5yuvan80
 
Presentation guide
Presentation guidePresentation guide
Presentation guideyuvan80
 
Impact of ict
Impact of ictImpact of ict
Impact of ictyuvan80
 
Antivirus
AntivirusAntivirus
Antivirusyuvan80
 
Network topology year 9 week 6
Network topology year 9 week 6Network topology year 9 week 6
Network topology year 9 week 6yuvan80
 
Network yr 7 week 6
Network yr 7 week 6Network yr 7 week 6
Network yr 7 week 6yuvan80
 
Social networking
Social networkingSocial networking
Social networkingyuvan80
 
Starting graph
Starting graphStarting graph
Starting graphyuvan80
 

More from yuvan80 (11)

Angles and shapes
Angles and shapesAngles and shapes
Angles and shapes
 
Area and perimeter_10_r5
Area and perimeter_10_r5Area and perimeter_10_r5
Area and perimeter_10_r5
 
Network
NetworkNetwork
Network
 
Presentation guide
Presentation guidePresentation guide
Presentation guide
 
Impact of ict
Impact of ictImpact of ict
Impact of ict
 
Antivirus
AntivirusAntivirus
Antivirus
 
Network topology year 9 week 6
Network topology year 9 week 6Network topology year 9 week 6
Network topology year 9 week 6
 
Network yr 7 week 6
Network yr 7 week 6Network yr 7 week 6
Network yr 7 week 6
 
Social networking
Social networkingSocial networking
Social networking
 
Basic 2
Basic 2Basic 2
Basic 2
 
Starting graph
Starting graphStarting graph
Starting graph
 

Recently uploaded

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Viruses

  • 1. By Mr UV Computer Viruses and Worms
  • 4.
  • 6. History of Worms  The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University.  It was released on November 2, 1988  Morris himself was convicted under the US Computer Crime and Abuse Act and received three years probation, community service and a fine in excess of $10,000.
  • 7. Worms…  Worms – is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.  They are often designed to exploit the file transmission capabilities found on many computers.
  • 9. Typical things that some current Personal Computer (PC) viruses do
  • 10. Typical things that some current Personal Computer (PC) viruses do
  • 14. 27 January: SCO Group offers a US $250,000 reward for information leading to the arrest of the worm's creator.  1 February: An estimated one million computers around the world infected with MyDoom begin the virus's massive distributed denial of service attack—the largest such attack to date.  2 February: The SCO Group moves its site to www.thescogroup.com.
  • 15.  Traditional Viruses  pieces of code attached to a legitimate program  run when the legitimate program gets executed  loads itself into memory and looks around to see if it can find any other programs on the disk
  • 16.  Traditional Virus  infect the boot sector on floppy disks and hard disks  By putting its code in the boot sector, a virus can guarantee it gets executed  load itself into memory immediately, and it is able to run whenever the computer is on
  • 17. Decline of traditional viruses  Reasons: – Huge size of today’s programs storing on a compact disk – Operating systems now protect the boot sector
  • 18. E-mail Viruses  Moves around in e-mail messages  Replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail address book  Example: Melissa virus, ILOVEYOU virus
  • 19. March 1999  the Melissa virus was the fastest-spreading virus ever seen  Someone created the virus as a Word document uploaded to an Internet newsgroup  People who downloaded the document and opened it would trigger the virus  The virus would then send the document in an e- mail message to the first 50 people in the person's address book
  • 20. Melissa virus  Took advantage of the programming language built into Microsoft Word called VBA (Visual Basic for Applications)
  • 21. Prevention  Updates  Anti-Viruses  More secure operating systems e.g. UNIX
  • 22. Reference  http://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gif  http://www.factmonster.com/ipka/A0872842.html http://www.faqs.org/faqs/computer-virus/new-users/  http://www.mines.edu/academic/computer/viri-sysadmin.htm