Professional Documents
Culture Documents
COMPUTER VIRUSES
BY AREEBA A. BHUTTO
OUTLINE:
INTRODUCTION.
HISTORY .
CATEGORIES OF COMPUTER DISRUPT
SOFTWARES.
TYPES & EXAMPLES.
VIRAL LANGUAGE.
PREVENTION FROM VIRUS ATTACKS.
ANTI-VIRUS.
CONCLUSION.
PHISHING:
VIRUS HISTORY:
COMPUTER VIRUSES:
INTRODUCTION
MALWARE:
Malware, short for malicious software, is
software used to disrupt computer operation,
gather sensitive information, or gain access to
private computer systems.
MACRO VIRUS:
MELISSA VIRUS
The Melissa virus, written by David L
Smith in homage to a Florida stripper,
was the first successful email-aware virus
and inserted a quote from The Simpsons
in to Word documents. Smith was later
sentenced to jail for causing over $80
million worth of damage.
TROJAN HORSES:
OSX/RSPLUG TROJAN
COMPUTER WORMS:
STORM WORM
D
I
F
F
E
R
E
N
C
E
Trojan Horses
are sneaky:
while they
appear
harmless, they
really are
programs that
hide all sorts of
malicious
goodies. Trojan
Horses do not
replicate
themselves the
way viruses and
worms do.
Computer
viruses attach
themselves to
files or
programs,
often through
email
attachments
which means a
person has to
actually run
the program
for the virus to
become active
and spread.
ROOTKITS:
SPYWARE:
Spyware is software that aids in gathering
information about a person or organization
without their knowledge and that may send such
information to another entity without the
consumer's consent.
Spyware can collect almost any type of data,
including personal information like Internet
surfing habits, user logins, and bank or credit
account information.
CRIMEWARE:
ADWARE:
E-MAIL VIRUSES:
SPAMMING:
IN WHICH PROGRAMMING
LANGUAGES A VIRUS CAN BE
CREATED?
ANTI-VIRUS TIPS
Do not open any files attached to an email from an unknown,
suspicious or untrustworthy source.
Do not open any files attached to an email unless you know what it
is.
Do not open any files attached to an email if the subject line is
questionable or unexpected.
Delete chain emails and junk email. Do not forward or reply to
any to them. These types of email are considered spam - unsolicited,
intrusive messages that clog up the inboxes and networks.
Do not download any files from strangers.
Exercise caution when downloading files from the Internet.
Ensure that the source is a legitimate and reputable one. Verify
that an anti-virus program checks the files on the download site.
Update your anti-virus software regularly.
Back up your files on a regular basis. If a virus destroys your
files, at least you can replace them with your back-up copy. You
should store your backup copy in a separate location from your work
files, one that is preferably not on your computer.
CONCLUSION: