120 likes | 258 Views
Jason Long IST 110 Zachary Ziobro 5/31/09. Computer Baddies. Objectives. To Differentiate between different types of computer malware Specifically to differentiate between Trojan Horse’s and Worms
E N D
Jason Long IST 110 Zachary Ziobro 5/31/09 Computer Baddies
Objectives • To Differentiate between different types of computer malware • Specifically to differentiate between Trojan Horse’s and Worms • To give specific examples of aforementioned malware and to give removal instructions for each.
Trojan Horse • A Trojan Horse is aptly named, it functions much like the Trojan horse of mythology. • A Trojan appears to be performing a desirable computer function. • But, in the background it is busy stealing data, destroying data, and performing other unsanctioned activities.
Zlob Trojan • The Zlob Trojan first appeared in 2005 but gained much attention in 2006 • The Zlob Trojan appears to be a needed video component • However, it creates pop-ups, similar to normal windows pop-ups, that auto-download fake anti-virus software
Removal • The Zlob Trojan is removed in the following manner, similar to many trojans. • 1: Disable System Restore, this trojan plants itself in the restore points. • 2: Update your anti-virus • 3: Run a full system scan • 4: Then you must manually delete a number of registry valuesthat the Trojan has created.
Worms • Worms are malicious computer programs that active and attempt to replicate themselves across as many computers a possible. • Worms are different from normal computer viruses in that they do not need a host computer program to operate and spread, they can do it autonomously. Though commonly they attempt to hide other malicious files within themselves.
Koobface • The Koobface worm targets myspace and facebook users. • It attempts to get users to download “a flash player update.” When in reality the link downloads the worm which seeks out credit card numbers. • It then sends messages to facebook and myspace accounts in an attempt to get other users to download it.
Removal • The Koobface worm is removed in the following manner, similar to a number of other worms. • 1: Disable System Restore, this trojan plants itself in the restore points. • 2: Update your anti-virus • 3: Run a full system scan • 4: Then you must manually delete a registry valuethat the worm has created.
Synopsis 1 in 4 computers in the United States is infected with some sort of malware, including Trojans and worms. This Chart illustrates that number.
Conclusion • Trojans are Worms are very insidious types of malware, that are dangerous for your computer and also can scam away your personal information. • You should take measures to protect yourself from these malware with some kind of anti-virus.
Refrences • http://en.wikipedia.org/wiki/Trojan_Horse • http://www.symantec.com/security_response/writeup.jsp?docid=2008-080315-0217-99&tabid=3 • http://www.symantec.com/security_response/writeup.jsp?docid=2005-042316-2917-99&tabid=3 • http://en.wikipedia.org/wiki/Computer_worm • http://www.theinquirer.net/inquirer/news/1044664/four-computers-infected • http://hypertextbook.com/facts/2004/DianeEnnefils.shtml