Computer Virus and
Antivirus
A computer virus is a computer program that can reproduce itself and spread from one computer to another. and leaving infections as it travels, Like a human virus.
Some virus may cause only testing effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file.
It is important to note that a virus cannot be spread without a human action.
Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
COMPUTER VIRUS
It can slow down your computer. It might corrupt your system files. It might make some programs faulty or
corrupt. It might damage your boot sector creating
problems when you boot into the windows. it might steal important information from
your computer and send to some other person.
It might change the power ratings of your computer and could blast the system.
EFFECT OF COMPUTER VIRUS
Programs. Some viruses may impair your certain computer programs and applications. As a result, you may not be able to access the software or operate it smoothly.
Files. There are viruses that may modify, corrupt or delete files in your machine owing to which you may not be able to access them.
Hard disk. Some viruses may attack the data present on your computer’s hard disk, resulting in its crash. You may need to reformat the disk in such cases.
Operational impact. Some viruses may not apparently harm your system’s integrity and may limit themselves to displaying text messages, images, audio and Video.
VIRUS IMPACT ON SYSTEM ACCESSORIES
To take control of a computer and use it for specific tasks
To generate money
To steal sensitive information (credit card numbers, passwords, personal details, data etc.)
To prove a point, to prove it can be done, to prove ones skill or for revenge purposes
WHY DO PEOPLE CREATE COMPUTER VIRUS
Hardware. No computer viruses are capable of damaging your hardware yet. They just work on all the files and data of your system, make them useless and disable them.
Speed. Your system may slow down under the influence of viruses as they consume your system’s memory for their execution.
Booting. Your system may suddenly restart and at times may not load properly. In few cases, you may not be able to access your disk drives.
Applications. Viruses may modify, damage or delete your program files and system files because of which applications on your system may not be able to work appropriately.
VIRUS IMPACT ON SYSTEM ACCESSORIES
Reinstall. Some computer viruses are designed in the gravest way possible. They cannot be uninstalled easily from your system and some reinstall themselves even after they have been removed.
Peripherals. Some viruses may impact device driver software in your computer resulting in the relevant operational issues. For example, disturbed software setting for printer may impair its function.
VIRUS IMPACT ON SYSTEM ACCESSORIES
Elk Cloner has the distinction of being the first wild virus for a home computer.
Coded by then-high-school student, Richard Skrenta, around 1982.
who created the search engine blekko. Happy Birthday Joshi',
the virus was first discovered in India in June 1990
The first known virus was created in 1971 by Cambridge and was called the Creeper Virus.
Creeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971.
COMPUTER VIRUS HISTORY
This virus was spread using the Advanced Research Projects Agency Network (ARPANET).
It was designed not to damage but to demonstrate a mobile application. It is generally accepted to be the first computer worm, although the Concept of a "computer virus" did not exist in the 1970s
When the computers were infected, the message "I'm the creeper, catch me if you can!"
This year marks the 40th anniversary of Creeper.
COMPUTER VIRUS HISTORY
World's first computer virus was created to infect IBM PCs by two Pakistani brothers, Amjad and Basit Farooq in 1986.
While they were trying to explore their expertise and potential of MS DOS operating system, Virus travelled beyond their imagination through Asia, Europe and was picked up in USA.
Amjad and Basit Farooq Alvi
FIRST VIRUS FROM PAKISTAN
The first computer virus named “Brain” was designed by Amjad Farooq Alvi and Basit
Farooq Alvi.
"Beware of this VIRUS...Contact us for vaccination,". This message was put on the screen.
The interesting fact remains that the location of the “Brain Pvt Limited” is exactly the same where the virus was first developed.
FIRST VIRUS FROM PAKISTAN
Virus name Spreading DamageDiscovere
d
Backdoor.IRCBot.Dorkbot.A MEDIUM MEDIUM 2011 May 15
Backdoor.Lavandos.A MEDIUM HIGH 2011 Jan 06
Trojan.Android.Geinimi.A VERY LOW HIGH 2011 Jan 03
Java.Trojan.Downloader.OpenConnection.AI
HIGH MEDIUM 2010 Nov 12
Java.Backdoor.ReverseBackdoor.A LOW MEDIUM 2010 Nov 12
Win32.Ramnit.G VERY LOW VERY LOW 2010 Oct 28
Trojan.Spy.Ursnif.F MEDIUM HIGH 2010 Oct 20
Win32.Worm.Stuxnet.A HIGH MEDIUM 2010 Oct 07
Win32.Worm.Prolaco.S MEDIUM MEDIUM 2010 Oct 06
Exploit.CplLnk.Gen MEDIUM LOW 2010 Jul 19
10 LATEST COMPUTER VIRUS
Surreptitious Sircam Sircam appeared in July 2001 on PCs running Windows 95, 98, and
Me. The worm appeared in e-mail in-boxes with an attachment the body of the message was in Spanish or English. Typical greetings included "Hi! How are you?" and "Hola como
estas?”
Raid raider Code Red burned brightly in the summer of 2001, Infecting hundreds of thousands of computers--mainly on corporate networks.
WORLD’S WORST COMPUTER VIRUS
Maniacal MagistrMagistr is one of the most complex viruses to hit the Internet.
Its victims, users of Outlook Express, were hooked by an infected e-mail attachment.The virus, discovered in mid-March 2001,
Sent garbled messages to everyone in the infected user's e-mail address book
Melissa Melissa propagated via infected Microsoft Word documents and
mailed itself to Outlook contacts of the contaminated user.
WORLD’S WORST COMPUTER VIRUS
Expletive Deleted) Explorer The Explorer.zip worm appeared in the summer of 1999. The worm deleted Word, Excel, and PowerPoint files and
types of files. Explorer traveled via e-mails that appeared to be from someone
the recipient knew.
Numbing Nimda Nimda (also known as the Concept Virus) appeared in September
2001, Attacking tens of thousands of servers and hundreds of thousands
of PCs. The worm modified Web documents and executable files The worm spread as an embedded attachment in an HTML e-mail
message that would execute as soon as the recipient opened the message
WORLD’S WORST COMPUTER VIRUS
SOME COMPUTER SECURITY THREATS
Adware is software that displays advertisements on your computer.
A backdoor Trojan allows someone to take control of another user’scomputer via the internet without their permission.
Bluejacking is sending anonymous, unwanted messages to other userswith Bluetooth-enabled mobile phones or laptops.
Bluesnarfing is the theft of data from a Bluetooth phone.Like Bluejacking, Bluesnarfing depends on the ability of Bluetooth-enabled devices todetect and contact others nearby.
ADWARE
BACKDOOR TROJAN
BLUE SNARFING
BLUE JACKING
Boot sector viruses spread by modifying the program that enables your computer to start up
Browser hijackers change the default home and search pages in yourinternet browser
In electronic chain letter is an email that urges you to forward copiesto other people.
Cookies are files on your computer that enable websites to rememberyour details.
A denial-of-service (DoS) attack prevents users from accessing a computer or website.
SOME COMPUTER SECURITY THREATSBOOT SECTOR VIRUS
BROWSER HIJACKERS
CHAIN LETTER
COOKIES
DENIAL OF SERVICE
WormsWorms are programs that replicate and spread, often opening a back door to allow hackers to gain access to the computers that they infect.Worms can spread over the Internet by exploiting security flaws in the software of computers that are connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email.
ZombiesA Zombie is a hidden program that lies inactive on a computer. Zombies don’t normally damage the computer on which they reside but can damage other computers.Zombies often arrive as email attachments and when the attachment is opened they install themselves secretly and then wait to be activated.
PhishingA Phishing attack is when you are are sent an email that asks you to click on a link and re-enter your bank or credit card details. These emails can pretend to be from banks, Internet service providers, on-line stores and so on, and both the email and the web site it links to appear genuine. When you enter your bank or credit card details they are then used fraudulently.
SOME COMPUTER SECURITY THREATS
ADWARE
MALWARE
SPYWARE
TYPE OF COMPUTER WORMS
Adware, or advertising-supported software, is any
software package which automatically plays, displays, or
downloads advertisements to a computer.
These advertisements can be in the form of a pop-up.
They may also be in the user interface of the software or on a
screen presented to the user during the installation process.
The object of the Adware is to generate revenue for its author
Advertising functions are integrated into or bundled with the
software, which is often designed to note what Internet sites
the user visits
ADWARE
Malware, short for malicious software, Malware is a very general word for
software that deliberately harms, restricts, alters, or stops your computer
from working properly where the true purpose of the download or installation
is hidden or difficult to find and not clearly explained to the user .
Malware includes computer viruses, worms, trojan horses, spyware,
dishonest adware, scareware, crimeware, most rootkits, and other malicious
and unwanted software or program.
Malware can arrive through an internet download, as an email link or
attachment
as a file sent between users of instant messaging, social networking
communities, peer-to-peer file sharing programs, online games, online video
games or chatrooms or a link to a malicious webpage.
MALWARE
The best-known types of malware, viruses and worms, are
known for the manner in which they spread, rather than
any other particular behavior.
The term computer virus is used for a program that has
infected some executable software and, when run, causes
the virus to spread to other executables .
On the other hand, a worm is a program
that actively transmits itself over a network to infect other
computers
MALWARE
the browser’s home page keeps changing
Pop-up advertisements appear when your browser is closed,.
Strange icons appear on your desktop without your prompting
or knowledge of the program
The computer light is blinking (meaning that your computer is
processing information) at unusual or unexpected times.
Your browser settings keep changing, including the webpage
you designate as your internet start-up page
Files are uploaded or downloaded without your prompting or
permission.
INDICATION OF MALWARE
Spyware is Internet language for Advertising Supported
software (Adware).
Spyware is tracking software that hides itself (runs in the
background) and gathers information without the computer
owner's or user's knowledge or permission for the benefit of
someone else
The first recorded use of the term spyware occurred on 16 October
1995.
showing them pop-up ads, or altering web-browser behavior for
the financial benefit of the spyware creator.
For instance, some spyware programs redirect search engine
results to paid advertisements.
SPYWARE
Others, often called "stealware" by the media, overwrite affiliate marketing codes so that revenue is redirected to the spyware creator rather than the intended recipient.
The presence of spyware is typically hidden from the user, and can be difficult to detect
Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited,
As of 2006, spyware has become one of the preeminent security threats to computer systems running Microsoft Windows operating systems.
SPYWARE
Not opening emails or email attachments from unknown senders
Block or don’t click on suspicious pop-up windows Don’t open files that are more prone to be
associated with malware such as .bat, .pif, .txt .vbs, .htm .exe or .vbs
Don’t download or execute applications from untrusted sources.
Avoid phishing scams. Use updated anti-virus and anti-spyware software
regularly.
GUIDELINE TO AVOID SPYWARE
A utility that searches a hard disk for viruses and removes any that are
found.
Antivirus software is a computer program you install on your machine that scans
files for malicious (dangerous) programs and either deletes them or "heals" them
therefore eliminating the threat of damage to your computer.
Most antivirus programs include an auto-update feature that enables the
program to download profiles of new viruses so that it can check for the
new viruses as soon as they are discovered.
Antivirus software is a computer program that detects, prevents, and takes
action to disarm or remove malicious software programs, such as viruses
and worms.
COMPUTER ANTIVIRUS
The very first anti-virus software wasn't really an anti-virus software.It was a removal tool to remove a Polish virus named MKS vir. That removal tool was released in 1987, and the person who first had the idea of such removal tool
was Bernt Fix.
COMPUTER ANTIVIRUS HISTORY
BENEFITS FROM ANTIVIRUS
Stop Virus-Related Damage
Maintain the PC's Security
Protect Against Email Threats/Spam
Financial Savings
Protect Data and Files
Norton Antivirus Kaspersky Antivirus McAfee Antivirus Plus Avira Antivir Premium AVG Antivirus ESET NOD32 Antivirus ZoneAlarm Antvirus Panda Antivirus BitDefender Antivirus F-Secure Antivirus
TOP 10 ANTIVIRUS
A personal firewall is an application which controls network
traffic to and from a computer, permitting or denying
communications based on a security policy.
A personal firewall will usually protect only the computer on which
it is installed.
Personal firewalls may also provide some level of trouble detection
, allowing the software to terminate or block connectivity.
Allows the user to control which programs can and cannot access
the local network and/or Internet.
Provide information about the destination server with which an
application is attempting to communicate.
FIREWALL
They block other packets (usually dropping them without acknowledgment to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines.
Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules.
FIREWALL
FIREWALL PROTECTION CHART
Ankit Fadia is an independent computer
security consultant
He runs a program on computer security for
corporates in alliance with Reliance Info
He started a website called
"HackingTruths". At 15, his book on
Ethical Hacking made him the youngest
author to be published by Macmillan India.
Fadia sponsors
Singapore Management University's "Ankit
Fadia Study Award", which consists of a
$1000 cash prize and Certificate which is
annually awarded to "an outstanding student“
ANKIT FADIA
According to Wendy McAuliffe at ZDNet UK, Fadia's Hacking Truths website was judged "second best hacking site" by the Federal Bureau of Investigation, though no ranked list of "hacking sites“
Person of the Year India 2002’ by Limca Book of Records.
In December 2009 Fadia's business site, hackingmobilephones.com appeared.
Ankit Fadia’s Hacking Books--- The Unofficial Guide to Ethical Hacking Network Security: A Hacker's Perspective Hacking Mobile Phones Tips and Tricks on Linux Email Hacking
ANKIT FADIA
Top Related