140 likes | 214 Views
Computer and other malware. By : Rishika , Autumn and Melissa. http://www.youtube.com/watch?y=c34QwtY40g. Virus ?. . Viruses are small pieces of software .They attach themselves to programs and stay there .When the program runs the virus runs too
E N D
Computer and other malware By : Rishika ,Autumn and Melissa http://www.youtube.com/watch?y=c34QwtY40g
Virus ? .Viruses are small pieces of software .They attach themselves to programs and stay there .When the program runs the virus runs too .They reproduce and spread to other files .You can send them to other people accidentally .They can steal and/or delete your files/information .Security programs can delete viruses
Viral history is a mystery • 10 most destructive and popular virus : (1999-2010) • Stuxnet(Malware) • Conficker (Virus) • Agent (Malware) • Zeus (Malware) • PoisonIvy(Malware) • Storm (Worm) • Sasser (Worm) • Nimda virus • Morris (worm) • Conflicker(Malware)
The Trojan horse • A Trojan horse is a computer virus, that looks like another file or document on your computer. • This a evil and 1 of the most popular computer virus. • There is a good part about this famous virus it doesn’t duplicate itself • There is one and only but just one is destructive enough. • This all famous virus uses devious and vile techniques to get into your system software usually it pops up as warning that something is trying to invade your computer and that a certain program can fix it for you but in real this so called ‘’ antivirus’’ is actually putting the virus in the software . • This is why you have to beware about all the pops you get ONE WRONG CLICK and its invaded.
Computer Worms What Is It? A malware computer program Can independently replicate itself Independently sends copies of itself; Using a computer network
Computer Worms How are they Spread? • MS outlook services • Immediate contact to SMTP servers • Through SMTP API of their own • Windows MAPI functions
Computer Worms What are the Different Kinds of Worms? • Instant Messaging worms • Internet worms • IRC worms • File Sharing Network worms
adware attacks .Happen mostly when online .Usually don’t notice until it’s too late .Virus attaches to your hard drive .Attach instantly and go through your files .Often disguised as adware protection
Spam: What is it? message sent to a group of people Same message Large group On the internet
Virus protection How can you Protect your Computer? 1) Firewall Prevents malware or malicious software from gaining access to it 2) Virus Protection Protects against viruses and other security threats
Virus protection 3) Spyware and other malware protection -antispyware software -Protects against spyware
Upgrades & Purchases Upgrades: -once a week -automatically or manually Where to purchase protection: -purchase at a computer retail store -Ex: Future Shop, Apple, etc.
Rootkits • Provides a root/path for hackers • Allows hackers to access your network • Hackers install hidden programs on your computer • They can access your data and personal information • You usually don’t even notice • .Rootkits don’t go away on their own • You need to look into security software • They will give you helpful options
bibliography • http://www.google.ca/search?q=wikipedia&rls=com.microsoft:en-ca&ie=UTF-8&oe=UTF-8&startIndex=&startPage=1&redir_esc=&ei=5mh1UYn8BM23qAH4koGABQ • http://images.google.ca/ • http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer-Viruses.html?c=y&page=2 • http://www.worsetech.com/hack/hacker-attack/top-5-most-deadly-viruses-1102431.html • http://en.wikipedia.org/wiki/Rootkit • http://www.streetdirectory.com/travel_guide/136873/security/how_adware_attacks__internet_surfing__adware_infection.html