1 / 26

V irus and Hacking

V irus and Hacking. Virus. A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. . What harm can it do?. A computer virus may: corrupt or delete data on a computer

prentice
Download Presentation

V irus and Hacking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Virus and Hacking

  2. Virus • A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation.

  3. What harm can it do? • A computer virus may: • corrupt or delete data on a computer • use an e-mail program to spread the virus to other computers • delete everything on the hard disk. 

  4. How are they spread • Computer viruses are most easily spread by • attachments in e-mail messages and instant messaging messages. • Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. • Computer viruses also spread by using downloads on the Internet. • Computer viruses can be hidden in pirated software or in other files or programs that you may download. 

  5. Symptoms of a Virus • The computer runs slower than usual. • The computer stops responding, or it locks up frequently. • The computer crashes, and then it restarts every few minutes. • The computer restarts on its own. Additionally, the computer does not run as usual. • Applications on the computer do not work correctly. • Disks or disk drives are inaccessible. • You cannot print items correctly. • You see unusual error messages. • You see distorted menus and dialog boxes. • There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension. • An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted. • An antivirus program cannot be installed on the computer, or the antivirus program will not run. • New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs. • Strange sounds or music plays from the speakers unexpectedly. • A program disappears from the computer even though you did not intentionally remove the program.

  6. Protection against Viruses • Use anti-virus software • Do not download illegal or pirated software • Only download files from reputed sites

  7. Firewalls • A fire wall is a system designed to prevent unauthorized access to a private network, especially intranets. The firewall reads each message and blocks the ones which do not meet the security criteria.

  8. Types of Firewalls

  9. Trojan Horse • A trojan horse is a program that looks useful but actually compromises the security of a computer. • It may be disguised as a game, a joke program, or any other “useful” program. • The name of this virus comes from an ancient story in which a giant wooden horse was gifted to the trojan tribes.

  10. Worms • A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.

  11. Phishing • Phishing is an e-mail fraud method in which the sender sends out legitimate-looking email in an attempt to gather personal and financial information from recipients.It usually imitates famous companies like Microsoft, Yahoo, or banking companies.

  12. Pharming • Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. Pharming has been called "phishing without a lure."

  13. Hacking • a hacker is someone who breaks into computers and computer networks. Hacking is illegal.

  14. Why do people hack • Hackers may be motivated by a multitude of reasons, including profit, protest, or just because of the challenge • Some famous recent hackings were the Play Station Network and the Iran version of Google. The Playstationdiaster cost Sony more than 1.7 million USD!!

  15. Is hacking always bad? • Sometimes, hacking is not always bad. Major companies organise competitions for hacking into their networks. This allows the companies to find potential threat to their security and fix it before any real damage is done.

  16. Famous hackers • Jonathin James- He stole 1.7 million doallr from NASA. At the age of 16! • Robert Morris- Creator of the first computer worm • Adrian Lamo- The “Homeless Hacker” , he lived and hacked from a cyber café. • John Draper- A legend in phone hacking, created the blue box, and was close college friends with Steve job • Gary McKinnon-Hacked into 97 US military networks and NASA computers.

  17. Minimizing the Risk of Hacking the famous Stuxnet virus was delivered by installing it on thumb drives, and then dropping them in the parking lot. Happy with their new, free, thumb drives, engineers carried them into the high security building, plugged them in, and the rest is history. • Using firewalls • Frequent change of hard-to-guess passwords. • Back up the computers • Don’t open junk email or download junk files Encryption and back up does not minimise the risk of getting hacked. It only minimizes the damage done by a hacker.

  18. Encryption • Encryption makes files unreadable if they are accessed illegally. • It does not prevent hacking, but makes it harder for hackers to do damage.

  19. Health and safety

  20. Health • A number of health realated problems can occur due to incorrect or overuse of computers. These problems can be extremely harmful so we must take certain precautionary methods to prevent them from harming us.

  21. Common health problems • Repeated strain Injury • Bad posture • Eye strain • Pain in neck, back, wrist, and fingers. • Stress • Other mental or psychological problems. • Carpal Tunnel syndrome Did you know that more than 215,00 people suffer from RSI !

  22. Addiction The most common physiological problem is addiction. Addiction is the over use of computers to an extent where other work is neglected. Addiction can be overcome by limiting the amount of time on a computer. If this does not work, one must undergo counseling or therapy.

  23. How to use the computer correctly • Adjust the brightness controls to suit the room • Make sure the text is large enough to read • Noisy machines should be covered to reduce noise • Laptops should not be placed on laps due to radiation risks. • Pregnant women should not use computers • Take long and frequent breaks while using a computer • Blink often • Do not stare at the screen

  24. Correct posture

  25. Did you know: A Chinese man was electrocuted by a computer by excessive sweating Safety aspects

  26. Thank You !!!

More Related