Virus

76
and Removin g Detectin g Management , Virus

description

Types of Virus

Transcript of Virus

Slide 1

and

RemovingDetectingManagement, Virus

What is avirus?

They are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".

4 Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a destructive payload or attempt to hide themselvesthe defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. Virus writers use social engineering and exploit detailed knowledge of security vulnerabilities to gain access to their hosts' computing resources. The vast majority of viruses target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software.

Motives for creating viruses can include seeking profit, desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore artificial life and evolutionary algorithms.Computer viruses currently cause billions of dollars worth of economic damage each year, due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-source antivirus tools have been developed, and a multi-billion dollar industry of antivirus software vendors has cropped up, selling virus protection to users of various operating systems of which Android and Windows are among the most victimized.

Unfortunately, no currently existing antivirus software is able to catch all computer viruses (especially new ones); computer security researchers are actively searching for new ways to enable antivirus solutions to more effectively detect emerging viruses, before they have already become widely distributed.What do computer

Viruses

do?Through the course of using the Internet and your computer, you may have come in to contact with computer viruses. Many computer viruses are stopped before they can start, but there is still an ever growing concern as to what do computer viruses do and the list of common computer virus symptoms. A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it.

Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.

To help avoid computer viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, run your computer as a standard user (not as administrator), and that you follow a few basic rules when you surf the Internet, download files, and open attachments.Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.

Types ofViruses

1. Memory Resident Virus

These viruses fix themselves in the computer memory and get activated whenever the OS runs and infects all the files that are then opened.Hideout: This type of virus hides in the RAM and stays there even after the malicious code is executed. It gets control over the system memory and allocate memory blocks through which it runs its own code, and executes the code when any function is executed.Target: It can corrupt files and programs that are opened, closed, copied, renamed, etc.Examples: Randex, CMJ, Meve, and MrKlunkyProtection: Install an antivirus program.2. Direct Action Viruses

The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that are specified in the AUTOEXEC.BAT file path. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.Find First/Find Next technique is used where the code selects a few files as its victims. It also infects the external devices like pen drives or hard disks by copying itself on them.Hideout: The viruses keep changing their location into new files whenever the code is executed, but are generally found in the hard disk's root directory.Target: It can corrupt files. Basically, it is a file-infector virus.Examples: Vienna virusProtection: Install an antivirus scanner. However, this type of virus has minimal effect on the computer's performance.3. Overwrite Viruses

A virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.Hideout: The virus replaces the file content. However, it does not change the file size.Examples: Way, Trj.Reboot, Trivial.88.DProtection: The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.However, it is very easy to detect this type of virus, as the original program becomes useless.

4. Boot Sector Virus

This type of virus affects the boot sector of a hard disk. This is a crucial part of the disk, in which information of the disk itself is stored along with a program that makes it possible to boot (start) the computer from the disk. This type of virus is also called Master Boot Sector Virus or Master Boot Record Virus.Hideout: It hides in the memory until DOS accesses the floppy disk, and whichever boot data is accessed, the virus infects it.Examples: Polyboot.B, AntiEXEProtection: The best way of avoiding boot sector viruses is to ensure that floppy disks are write-protected. Also, never start your computer with an unknown floppy disk in the disk drive.

5. Macro Virus

Macro viruses infect files that are created using certain applications or programs that contain macros, like .doc, .xls, .pps, .mdb, etc. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one. These viruses automatically infect the file that contains macros, and also infects the templates and documents that the file contains. It is referred to as a type of e-mail virus.Hideout: These hide in documents that are shared via e-mail or networks.Examples: Relax, Melissa.A, Bablas, O97M/Y2KProtection: The best protection technique is to avoid opening e-mails from unknown senders. Also, disabling macros can help to protect your useful data.6. Directory Virus

Directory viruses (also called Cluster Virus/File System Virus) infect the directory of your computer by changing the path that indicates the location of a file. When you execute a program file with an extension .EXE or .COM that has been infected by a virus, you are unknowingly running the virus program, while the original file and program is previously moved by the virus. Once infected, it becomes impossible to locate the original files.Hideout: It is usually located in only one location of the disk, but infects the entire program in the directory.Examples: Dir-2 virusProtection: All you can do is, reinstall all the files from the backup that are infected after formatting the disk.

7. Polymorphic Virus

Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. This makes it impossible for antivirus software to find them using string or signature searches (because they are different in each encryption). The virus then goes on to create a large number of copies.Examples: Elkern, Marburg, Satan Bug and TuaregProtection: Install a high-end antivirus as the normal ones are incapable of detecting this type of virus.

8. Companion Viruses

Companion viruses can be considered as a type of file infector virus, like resident or direct action types. They are known as companion viruses because once they get into the system they 'accompany' the other files that already exist. In other words, to carry out their infection routines, companion viruses can wait in memory until a program is run (resident virus), or act immediately by making copies of themselves (direct action virus).Hideout: These generally use the same filename and create a different extension of it. For example: If there is a file "Me.exe", the virus creates another file named "Me.com" and hides in the new file. When the system calls the filename "Me", the ".com" file gets executed (as ".com" has higher priority than ".exe"), thus infecting the system.Examples: Stator, Asimov.1539 and Terrax.1069Protection: Install an antivirus scanner and also download Firewall.

9. FAT Virus

The file allocation table (FAT) is the part of a disk used to store all the information about the location of files, available space, unusable space, etc.Hideout: FAT virus attacks the FAT section and may damage crucial information. It can be especially dangerous as it prevents access to certain sections of the disk where important files are stored. Damage caused can result in loss of information from individual files or even entire directories.Examples: Link VirusProtection: Before the virus attacks all the files on the computer, locate all the files that are actually needed on the hard drive, and then delete the ones that are not needed. They may be files created by viruses.

10. Multipartite Virus

These viruses spread in multiple ways possible. It may vary in its action depending upon the operating system installed and the presence of certain files.Hideout: In the initial phase, these viruses tend to hide in the memory as the resident viruses do; then they infect the hard disk.Examples: Invader, Flip and TequilaProtection: You need to clean the boot sector and also the disk to get rid of the virus, and then reload all the data in it. However, ensure that the data is clean.

11. Web Scripting Virus

Many web pages include complex codes in order to create an interesting and interactive content. This code is often exploited to bring about certain undesirable actions.Hideout: The main sources of web scripting viruses are the web browsers or infected web pages.Examples: JS.Fortnight is a virus that spreads through malicious e-mails.Protection: Install the Microsoft tool application that is a default feature in Windows 2000, Windows 7 and Vista. Scan the computer with this application.12. Worms

A worm is a program very similar to a virus; it has the ability to self-replicate and can lead to negative effects on your system. But they can be detected and eliminated by an antivirus software.Hideout: These generally spread through e-mails and networks. They do not infect files or damage them, but they replicate so fast that the entire network may collapse.Examples: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, MapsonProtection: Install an updated version of antivirus.

13. Trojans

Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses, do not reproduce by infecting other files, nor do they self-replicate like worms. In fact, it is a program which disguises itself as a useful program or application. Beware of the fact that these viruses copy files in your computer (when their carrier program is executed) that can damage your data, and even delete it. The attacker can also program the Trojans in such a manner that the information in your computer is accessible to them.14. Logic Bombs

They are not considered viruses because they do not replicate. They are not even programs in their own right, but rather camouflaged segments of other programs. They are only executed when a certain predefined condition is met. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, the results can be destructive, and your entire data can be deleted!

Key System Files

protectingKey system

The KeY tool is used in formal verification of Java programs. It accepts both specifications written in JML or OCL to Java source files. These are transformed into theorems of dynamic logic and then compared against program semantics which are likewise defined in terms of dynamic logic. KeY is significantly powerful in that it supports both interactive (i.e. by hand) and fully automated correctness proofs. Failed proof attempts can be used for a more efficient debugging or verification-based testing. It can be integrated into CASE tools to extract specifications. There have been several extensions to KeY in order to apply it to the verification of C programs or hybrid systems.

Safe

ComputingChecklist Get and install an antivirus program. Same with a firewall---get one and install it! Familiarize yourself with the manual for both. (If you dont know how to use it, how do you know its protecting you?) Update both regularly to combat new threats. Scan any media (floppy disk, CDs, and downloads) before software installation) Be wary of unsolicited attachments arriving via email---delete! Beware of hoax emails. Dont reply to them, just delete.

Your Defense Against the Marauders at the Gate

There are few things you can do and use that will help you to harden your defenses and so make you too tough a victim for the hackers, who will move on to easier targets. Here are the tools that you need:Common senseFirewall protectionAntivirus protection

The first line of defense when it comes to PC security is common sense, and it can protect you from many of the problems and security issues that seem to plague computers today.

Common Sense

Firewalls

A firewall is software or hardware that sifts through data being passed between the Internet and a PC (or PCs on a network), and it examines the data being transferred to and from the PC. Hardware firewalls are common in a corporate environment but not in the small office or home. Far more common on the SOHO (small office, home office) PC and on the home PC are software firewalls that are installed on the PC.

The job of a firewall (whether hardware of software) is to look at all the data passing from an insecure environment (usually the Internet or another network) and decide whether the source is authentic and whether its safe or not. On the home PC, a firewall is usually used to examine Internet traffic to the PC (data) for suspicious packets (bits of data). Packets are deemed to be suspicious if the address that they came from is not one that is expected, or if the packet has a signature that matches those previously determined as suspect.There are many good software firewall options available, both free and for sale. Also, Windows XP comes complete with a firewall.

antivirus protection

Anti-Virus

Deciding whatProgram to Install"keep in mind"

How to choose? What features should good Antivirus Software contain? There are many factors that show whether any particular antivirus is the best choice for your particular needs. These factors are performance, features, help and support.

Performance Performance is the most important product-selection criteria. Antivirus software should be able to do more than simply block malware thats already been flagged as dangerous, and malicious in databases maintained by the software provider. Antivirus software should also identify fresh threats as potentially damaging, as well as neutralize threats that manage to sneak by the filters and begin to behave maliciously on your computer.

Features If you are satisfied with the performance of your soon to be new Antivirus software, you should also consider the features you need and the features that would be nice to have. You should make sure that the product also protects your computer from phishing, flags threats in email and instant messages, and recognizes when you insert a thumb drive so it can scan it for threats.

Help & Support After you identify the best Antivirus software for your needs considering features and aspects of performance you should check the client support level. Most of the products offer 24/7 support through email and call centre.

Recommendations:

1. AVG Anti-Virus

AVG has revolutionized the world of low cost antivirus and has recently come out with a full product line that is everything a antivirus should be and nothing it shouldnt. AVG delivers superior total amount defense for your desktop computer systems. They have additionally ramped up their checking engine which ought to minimize time needed to finish a pc virus and spyware check. They similarly discussed a general reduction in total system resource use,

2. Bit Defender

This recently upgraded variation of Bit Defender has a brand-new approach to ensure protection while not permitting pop-ups throughout day. They still provide all the options you would expect for a top 10 antivirus for such as personal privacy protection and web browsing. It was rewarded a close second in the virus self defense evaluations because it is easy to put in and use; its overall efficiency, can be updated often, and has fantastic help.3. Kasperskyhas in fact gotten leading ratings for the same above-mentioned elements such as effectiveness and help. This software program has really obtained numerous honors from leading companies. It is just one of the most cutting-edge products easily offered on the marketplace today; it would definitely be an ideal choice to shield your computer system from malware.

4. F Secure Anti-virus

The safety protection offered by F-Secure are utilized by both desktop computer individuals and sizable companies on their huge networks. They make every effort to make certain that their antivirus is the standard for internet security preventative measures. Prospective threats caused by an insufficient safety plan No more. Overall F-Secure offers an impressive plan.

5. ESET Nod32

This is mentioned because it is easy, yet a rather extensive security self defense option. They received the greatest score on effectiveness, aid, and easy installment. In 2013, the ESET Nod32 obtained huge updates while keeping the greater requirements of security and self defense. This is the best Nod32 version to date by far.

6. McAfee Virus Scan

McAfee is a leading anti-virus software application carrier. This software application now comes tailored up with added attributes, a big on is their an e-mail scanning device. It is not the very finest security option in my viewpoint nevertheless preferred none the much less. Many large organizations use McAfee, but it just does not score as well as some of the others.

507. Norton Antivirus

Norton Anti-virus is an extremely commonly household antivirus scanning device and has been around for great deals of years. Symantec is a highly recognized defense software program carrier and routinely makes every effort to upgrade and boost the software program they supply to their customers

8. Panda Anti-virus

If you are desiring to simply discover and take out infections on your computer system, this might be a great alternative you would certainly intend to consider. This is the highlight of this item and it does not include extra diagnosis capacities.

9. Trend Micro

Although this software application might trigger a mild decrease in effectiveness of some standard residence Computers. Trend Micro has a great online scanner and has been ranked very highly on AV comparatives ranks.

Malware, Adware, spywareViruses

MALWARE

or malicious code comes from two words, malicious and software. Although originally intended to be inoffensive jokes, malware has evolved into an intrusion of an unsuspecting persons computer system via the Internet.

Malwares effect on the unaware users PC includes taking control of the system undetected while generating an automatic sending of email spam. Certain emails promote iPads and HDTVs while others may try to trick the user with tempting offers from UPS, FedEx, FBI or even the IRS. If a user visits a website where malware is attached, the user becomes infected once the site is entered. The malware is so notorious that it can even invade the computers hard drive causing an eventual loss of data.

ADWARE

Software that is unknowingly installed on your computer to show you advertisements. Adware are software that display unsolicited advertisements, that pop-up at occasional intervals and unnecessarily pester the user. Some adware are also types of spyware, especially when they interpret the users web surfing history and send pertinent promotions only. Adware also reports a users website visits with data collected and used for ad brands selected to be directed at the user.

The objective of adware creators is not to harm, but adware can be annoying with ongoing pop ups. Adware distributing companies make money from their adware, or why else would they participate.

SPYWARE

Software illegally installed on your computer to spy on you and report this data to people willing to pay for it. Spyware generally applies to privacy invading software. Spyware is a for-profit malware that is encrypted to track users Internet habits and display unwanted announcements, with the purpose of forwarding users to other sites, making money for the spyware creator. Spyware is not spread like viruses; they are installed on a computer through security loopholes and operating system defects. They can also come in bundles with other friendly software and then, undetected, get activated on the users computer when the software is installed.Their dangers include unwanted and erratic computer behavior, unwanted CPU activity, additional usage of memory and an unnecessary increase in network traffic, along with problems like application freezing, booting failures, system-wide crashes, etc.

Installing anti-malware, Adware, spywareProgram.

What is the best anti-spyware, adware or anti-malware software?

It depends if you are trying to remove viruses and malware or if you are trying to stay protected from it. The best free antivirus's are :

Avast Free Antivirus: all you have to do is register and bam free for a year. Microsoft Security Essentials.

Malware BytesSpybot Search and DestroySuper Anti SpywareKaspersky Free Virus Removal ToolIf you are looking for programs to remove malware, try these :

preventing

Virus

InfectionsStep 1...Don't open unknown attachments in emails or do a virus scan after opening them. (If you get an email from a person that contains one or more viruses, the viruses may infect files in the computer. The viruses might also send emails to people from your email address book or email folders automatically).

Step 2...Download files only from trusted sites. If you download a program or a data file from the Internet or other shared networks, viruses might be transferred to your computer. Sometimes the free software programs on the Internet have viruses especially if you are downloading from sources such as Torrent or Usenet newsgroups.

Step 3...Remember to do a virus scan for them after peripheral devices are connected to your computer. The devices such as MP3 players, USB thumb drives, memory cards or CD drives are also means of spreading viruses.

symptoms

Infectedof anComputer

1. My computer speaks to me. There are all types of pop-ups and messages on the desktop either advertising things, saying that the PC is infected and needs protection This is a typical, surefire case of an infection. There is either spyware on the computer, or it has been infected by a fake antivirus (also called rogueware).

2. My computer is running extremely slowly. This could be a symptom of many things, including infection by a virus. If it has been infected by a virus, worm or Trojan, among other things, which are running on the computer, they could be running tasks that consume a lot of resources, making the system run more slowly than usual.

3. Applications won't start. How many times have you tried to run an application from the start menu or desktop and nothing happens? Sometimes another program might even run. As in the previous case, this could be another type of problem, but at the very least it's a symptom that tells you that something is wrong.

4. I cannot connect to the Internet or it runs very slowly. Loss of Internet communication is another common symptom of infection, although it could also be due to a problem with your service provider or router. You might also have a connection that runs much more slowly than usual. If you have been infected, the malware could be connecting to a URL or opening separate connection sessions, thereby reducing your available bandwidth or making it practically impossible to use the Internet.

5. When I connect to the Internet, all types of windows open or the browser displays pages I have not requested. This is another certain sign of infection. Many threats are designed to redirect traffic to certain websites against the users will, and can even spoof Web pages, making you think you are on a legitimate site when really you have been taken to a malicious imitation.

6. Where have my files gone? Hopefully nobody will be asking this type of question, although there are still some threats around designed to delete or encrypt information, to move documents from one place to another- If you find yourself in this situation, you really ought to start worrying.

7. My antivirus has disappeared, my firewall is disabled. Another typical characteristic of many threats is that they disable security systems installed on computers. Perhaps if one thing shuts down it might just be a specific software failure; but if all your security components are disabled, you are almost certainly infected.

8.My computer is speaking a strange language. If the language of certain applications changes, the screen appears back-to-front, strange insects start eating the desktop... you might just have an infected system.9. Library files for running games, programs, etc. have disappeared from my computer. Once again, this could be a sign of infection, although it could also be down to incomplete or incorrect installation of programs.

10. My computer has gone mad... literally. If the computer starts acting on its own, you suddenly find your system has been sending emails without your knowledge, Internet sessions or applications open sporadically on their own - your system could be compromised by malware.

Thankfor

Listening.

you9-alcaraZGroup 6