My Laptop Under the Microscobe

Post on 20-Mar-2016

216 views 0 download

Tags:

description

How do computer virus and bug look like ?

Transcript of My Laptop Under the Microscobe

MY LAPTOP UNDER THE MICROSCOPE

MY LAPTOP UNDER THE MICROSCOPE

>COMPUTER VIRUS

A computer virus is the little thing that has reproductive ability. It lives inside your computer and it can spread from one computer to another through air or through your fingers.

>COMPUTER VIRUS

0o o

01/ ZeusZeus is the go-to tool for many of today’s cyber criminals and is readily available for sale in the cyber crime underworld. It can be used to pilfer passwords as well as files, helping to create a literal underground economy for compromised identities that can be bought and sold for as little 50 cents

02/ mydoomMyDoom muscled its way into the malware world in 2004, quickly infecting some one million computers and launching a massive distributed denial of service attack, which overwhelms a target by flooding it with information from multiple systems.

03/ StuxnetThe arrival of Stuxnet was like a cartoon villain come to life: it was the first computer virus designed specifically to cause damage in the real, as opposed to virtual, world. While previous malware programs may have caused secondary physical problems,

04/ agent.btzThis piece of malware’s claim to fame is that it temporarily forced the Pentagon to issue a blanket ban on thumb drives and even contributed to the creation of an entirely new military department, U.S. Cyber Command. Agent.btz spreads through infected thumb drives, installing malware that steals data.

04/ WelchiaWelchia remains one of the most unusual worms in history, as it was designed to help instead of hurt. A response to the Blaster worm, Welchia infected computers, cleared out the Blaster infestation, and then deleted itself.

06/ Leap=AIn 2006, the Leap-A virus, also known as Oompa-A, debuted. It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list. The message contains a corrupted file that appears to be an innocent JPEG image.

07/ The KlezThe Klez is a computer Virus which spreads through email having one or couple of attached files which spreads like fire in the system and start damaging files again and again. Sometimes the antivirus is not able to fix it.

08/ MellisaThe name looks very attractive and interesting but in reality it was one of the earliest mass mailing virus which was created by David L Smith. He created Melissa in the memory of a famous lap dancer who he liked. When the pc is affected by Melissa virus, it mainly targets Microsoft office files

>COMPUTER _BUGS

Computer bugs are tiny little which get stuck inside and your computer. They bite and cause a mess inside. They also like to fly around and crash your softwares. Look careful inside your computer because they may make a nest in there already, you may need to call Pest Control

>COMPUTER _BUGS

0D D>

01/ Soviet Gas ExplosionCIA operatives (allegedly) introduced a bug into the Canadian built system that would pass Soviet inspection but fail when in operation.

The largest non-nuclear explosion in the planet’s history. And a new-found respect of the CIA.

02/ Ariane 5 Flight 501In 1996, Europe’s newest unmanned satellite-launching rocket, the Ariane 5, reused working software from its predecessor, the Ariane 4. After 36.7 seconds into its maiden launch, the self destruct safety mechanism was activated due to the computer failures, and the spacecraft disintegrated in a spectacular fireball.

03/ The Ping of DeathA lack of error handling in the IP fragmentation reassembly code makes it possible to crash many Windows, Macintosh, and Unix operating systems by sending a malformed “ping” packet from anywhere on the Internet.

04/ Buffer overflowThe first internet worm infects between 2,000 and 6,000 computers in less than a day by taking advantage of a buffer overflow. The specific code is a function in the standard input/output library routine called gets() designed to get a line of text over the network. Unfortunately, gets() has no provision to limit its input, and an overly large input allows the worm to take over any machine to which it can connect.

05/ Mariner I space probeA bug in the flight software for the Mariner 1 causes the rocket to divert from its intended path on launch. Mission control destroys the rocket over the Atlantic Ocean. The investigation into the accident discovers that a formula written on paper in pencil was improperly transcribed into computer code, causing the computer to miscalculate the rocket’s trajectory.

06/ Patriot Missile BugDuring the first Gulf War, an American Patriot Missile system was deployed to protect US Troops, allies, and Saudi and Israeli civilians from Iraqi SCUD missile attacks. A software rounding error in the one of the early versions of the system incorrectly calculated the time, causing it to ignore some of the incoming targets.