Viruses And Worms Presented by, K.Thirupathirajan, India. 9894639546.
Contents Introduction Viruses Worms Examples Properties 10/22/08
Viruses and Worms
2
Virus - Definition Computer viruses are small but efficient software programs that are designed to spread from one computer to another during file transfer and to interfere with computer operation.
10/22/08
Viruses and Worms
3
Contd… A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
10/22/08
Viruses and Worms
4
Contd… Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.
10/22/08
Viruses and Worms
5
Contd… Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
10/22/08
Viruses and Worms
6
Contd… To avoid viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, and that you follow a few basic rules when you surf the Internet, download files, and open attachments.
10/22/08
Viruses and Worms
7
Contd… Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.
10/22/08
Viruses and Worms
8
Worms - Definition A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention.
10/22/08
Viruses and Worms
9
Contd… Unlike a virus, it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.
10/22/08
Viruses and Worms
10
Identified Viruses in TSM Copy.exe Death W32 Nxyem Blackmal Microsoft Power Point.exe 10/22/08
Viruses and Worms
11
Contd… Winzip_Tmp.exe Trojan horse Recycler Kesanswarangal.exe Screen Saver Lsass.exe 10/22/08
Viruses and Worms
12
Contd… Natspammer Backdoor New Folder.exe(Downloader) SIV Help.exe MS Attacker
10/22/08
Viruses and Worms
13
Properties – Copy.exe Type - Worm Location - C:\Windows\System32 Consequences: – Disable all the hard drives – We can’t open them directly – Disable spoolsv.exe system file
10/22/08
Viruses and Worms
14
Preventing Methods Antivirus – AVG 7.1 Avoid Using Pen Drives Open or install any files after scan
10/22/08
Viruses and Worms
15
Properties – Death It’s really a great program based on Mouse and Key Listeners We can’t delete it simply It has the capability of initiate 432 processes in Background Make the system to hang 10/22/08
Viruses and Worms
16
Properties – W32, Black Mal Harmless in the Beginning Has the capability of corrupt the OS, Keyboard and Mouse Location – System Volume Information Change the location Every Time Antivirus – Protector Plus
10/22/08
Viruses and Worms
17
Properties – Nxyem Harmful Worm Location – System Volume Information Change the location Every Time Antivirus – Protector Plus, Kaspersky 10/22/08
Viruses and Worms
18
Properties – Winzip_Tmp Very Harmful Worm Has the Capability of Shut down a Network with 150 systems Spreads very quick in a Network Attack all the Winzip files and the Contents in it
10/22/08
Viruses and Worms
19
Prevention Techniques Avoid Downloading the Winzip files from the net. If you do the above please scan the file after save in in your system Update your Antivirus Thrice in a week atleast If your system was attacked by this virus remove Winzip from your system 10/22/08
Viruses and Worms
20
Properties – Trojan Horse Not a single one Group of Harmful viruses with different Properties Run some automatically initiated processes Easily attack the OS and System files
10/22/08
Viruses and Worms
21
Prevention Technique AVG is the best antivirus for Trojan If once it attacks the system we can remove this by AVG. But AVG cannot fully remove Trojan For that we can then uninstall AVG and reinstall it in our system
10/22/08
Viruses and Worms
22
Recycler - Properties Recycler is one of the best viruses develop by the Virus programmers It’s not easy to remove by using any of the existing Antivirus We can remove this virus by changing it’s compatibility from one platform to another and then press Shift + del key.
10/22/08
Viruses and Worms
23
Contd… It has the capability of attacking all the Macromedia files in our system It also generates a folder called Recycler on it’s own with increasing size on the disk
10/22/08
Viruses and Worms
24
Natspammer - Properties It’s not so Harmful Has the ability to corrupt the boot files
10/22/08
Viruses and Worms
25