250 likes | 308 Views
Learn about computer viruses, including how they operate, their types, prevention, and restoration methods. Explore various categories of noxious programs such as spyware, trojan horses, worms, and more.
E N D
Computerviruses Created by: Zoltán Homoki
It operates just like a real virus • It destroys • Frideric Cohen made the first virus in 1983 • They wanted to use it in the army • The result was shocking
Definition of viruses • Enter to the system without permission • Can reproduce itself • Destroy if the conditions materialize
Why are they noxious ? • Use lot of source of energy • Cause program or data losing • Cause detriment • Need to work with itself
Groups of the noxious programs • Viruses : - system virus - program virus - application virus • Other noxious programs : ( spyware, trojan horses, worms, ZIP-bomb, mutation viruses, hoax viruses ect. )
System viruses • It starts first (before the loading of the operation system) • It attacks the Master Boot Record • Prevention: - Checking of the MBR ( you can adjust it in the BIOS ) - Use anti-virus program • Restoration: FDISK/MBR, anti-virus program
Program virus • The virus can infect these files : - ( exe, com, sys, dll, pif, dot ect.) • The parts of the computer virus: - reproduction routine - activation routine - objective ( punitive ) routine
Groups of the computerviruses according to : • Generations • Speed of infection • Objective ( punitive ) routine • Place ( in memory, in file )
According to generations • First generation virus (simple spreading, easy decoding) • Stealth virus ( all is shown uninfected ) • Mutation virus ( while spreading it can change itself)
According to speed of infection • Viruses with slow infection : - just one or two victim • Viruses with fast infection : - it infects all opened files
According to objectiv routin • Destroyer : - physically destroying - strongly destroying - partially destroying - selectively destroying • Not Destroyer : - show a text, a music, a picture - change the keys on the keyboard - there is not objective routin in it
According to place • Resident: ( it there is in the memory till the computer is running ) • Not Resident • Mixed: ( objective routine resident, reproduction routine resident )
Other noxious programs • Trojan horse ( Backdoor virus ): - It masks itself a normal program - It opens a backdoor in the operation system • For example.: SubSeven, NetBus, Backdoor.Amasso ect.
Other noxious programs • Worm : - It use the operation system’s mistakes - It want to get information - It is not deleted - Just the operation system’s mistakes are fixed
Other noxious programs • Virusgenerator : - You not have to be a programmer
Other noxious programs • IN THE WILD ( ITW ) virus : • Circulates on the Internet • It is the most dangeruos
Other noxious programs • ZOO - virus : • These viruses are made in the laboratories • It helps with making of better anti-virus software • There aren’t perfect anti-virus programs
Other noxious programs • Hoax – virus : - These viruses make defective reports - They can’t cause mistakes
Other noxious programs • ZIP- bomb : • In fact it is a very huge file • It is packed excellently • 1050 piece A type
Other noxious programs • Spyware : ( Adware, Keylogger ) • Collectes information about you and your habits • Causes trouble ( frost the system, starts the IE with unknown home page, popup windows, strange icons on the desk ) • They are in Freeware and Shareware programs
Adware • In the most of case its serves the aim of advertisment • Sends pieces of information about the users
Keylogger • It can watch what you do on the computer • It registers the pressed down buttons • It sends the information to the sender • For example: BigBrother. FamilyCam
Other noxious programs • SPAM: • Undesirable advertisment e-mails • The quantity of spam mails always grow • The e-mail traffic’s 75 per cent is spam - It is expensive to filter the spams
Tricks of the spam senders • Open – relay ( mail server ) • Proxy server • WEB BUG • SPAM mails cheat the spam filters