Viruses And Worms

  • Uploaded by: api-3706638
  • 0
  • 0
  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Viruses And Worms as PDF for free.

More details

  • Words: 820
  • Pages: 25
Viruses And Worms Presented by, K.Thirupathirajan, India. 9894639546.

Contents  Introduction  Viruses  Worms  Examples  Properties 10/22/08

Viruses and Worms

2

Virus - Definition Computer viruses are small but efficient software programs that are designed to spread from one computer to another during file transfer and to interfere with computer operation.

10/22/08

Viruses and Worms

3

Contd… A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.

10/22/08

Viruses and Worms

4

Contd… Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.

10/22/08

Viruses and Worms

5

Contd… Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.

10/22/08

Viruses and Worms

6

Contd… To avoid viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, and that you follow a few basic rules when you surf the Internet, download files, and open attachments.

10/22/08

Viruses and Worms

7

Contd… Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.

10/22/08

Viruses and Worms

8

Worms - Definition A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention.

10/22/08

Viruses and Worms

9

Contd… Unlike a virus, it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.

10/22/08

Viruses and Worms

10

Identified Viruses in TSM Copy.exe Death W32 Nxyem Blackmal Microsoft Power Point.exe 10/22/08

Viruses and Worms

11

Contd… Winzip_Tmp.exe Trojan horse Recycler Kesanswarangal.exe Screen Saver Lsass.exe 10/22/08

Viruses and Worms

12

Contd… Natspammer Backdoor New Folder.exe(Downloader) SIV Help.exe MS Attacker

10/22/08

Viruses and Worms

13

Properties – Copy.exe Type - Worm Location - C:\Windows\System32 Consequences: – Disable all the hard drives – We can’t open them directly – Disable spoolsv.exe system file

10/22/08

Viruses and Worms

14

Preventing Methods Antivirus – AVG 7.1 Avoid Using Pen Drives Open or install any files after scan

10/22/08

Viruses and Worms

15

Properties – Death It’s really a great program based on Mouse and Key Listeners We can’t delete it simply It has the capability of initiate 432 processes in Background Make the system to hang 10/22/08

Viruses and Worms

16

Properties – W32, Black Mal Harmless in the Beginning Has the capability of corrupt the OS, Keyboard and Mouse Location – System Volume Information Change the location Every Time Antivirus – Protector Plus

10/22/08

Viruses and Worms

17

Properties – Nxyem Harmful Worm Location – System Volume Information Change the location Every Time Antivirus – Protector Plus, Kaspersky 10/22/08

Viruses and Worms

18

Properties – Winzip_Tmp Very Harmful Worm Has the Capability of Shut down a Network with 150 systems Spreads very quick in a Network Attack all the Winzip files and the Contents in it

10/22/08

Viruses and Worms

19

Prevention Techniques Avoid Downloading the Winzip files from the net. If you do the above please scan the file after save in in your system Update your Antivirus Thrice in a week atleast If your system was attacked by this virus remove Winzip from your system 10/22/08

Viruses and Worms

20

Properties – Trojan Horse Not a single one Group of Harmful viruses with different Properties Run some automatically initiated processes Easily attack the OS and System files

10/22/08

Viruses and Worms

21

Prevention Technique AVG is the best antivirus for Trojan If once it attacks the system we can remove this by AVG. But AVG cannot fully remove Trojan For that we can then uninstall AVG and reinstall it in our system

10/22/08

Viruses and Worms

22

Recycler - Properties Recycler is one of the best viruses develop by the Virus programmers It’s not easy to remove by using any of the existing Antivirus We can remove this virus by changing it’s compatibility from one platform to another and then press Shift + del key.

10/22/08

Viruses and Worms

23

Contd… It has the capability of attacking all the Macromedia files in our system It also generates a folder called Recycler on it’s own with increasing size on the disk

10/22/08

Viruses and Worms

24

Natspammer - Properties It’s not so Harmful Has the ability to corrupt the boot files

10/22/08

Viruses and Worms

25

Related Documents

Viruses And Worms
November 2019 18
Worms
April 2020 15
Worms
November 2019 18
Viruses
May 2020 21
16 Virus And Worms
May 2020 3