Characteristics of a Computer Virus

Characteristics of a Computer Virus

We Are The Devils Of Your Computer System A Computer Virus is a program that may disturb the normal working of a computer. CHARACTERISTICS OF A COMPUTER VIRUS: ● the ability to replicate itself. ● the ability to attach itself to another computer file. For fun Release anger Take revenge For fame Antivirus market Disrupt enemy’s information and network The term "computer virus" is often used incorrectly as a catch-all phrase to include all types of Malware such as Computer Worms, Spyware, Adware, and Root kits - all of which are slightly different than Computer Viruses. What is Malware? ● Malware is a general name for all programs that are harmful: ● Virus ● Trojan Horse ● Spyware ● Adware ● Rootkits VIRUS: A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. With an ability to replicate itself, thus continuing to spread. Also, known as Malicious Software, a program that can cause damage to a computer. •Boot sector virus •Master Boot Record (MBR) virus •File infector virus •Multipartite virus •Macro virus BOOT SECTOR VIRUS: Boot sector viruses generally hide in the boot sector, either in the bootable disk or the hard drive. It attaches itself to the primary active partition of the hard disk that is read by the computer upon boot up. MASTER BOOT RECORD VIRUS: MBR viruses are memory-resident viruses that infect disks in the same manner as boot sector viruses. However it, infects the MBR of the system, gets activated when the BIOS activates the Master boot code. MBR infectors normally save a legitimate copy of the master boot record in an different location. File Infector Virus: File Infector viruses infect program files. Normally infect executable code, such as .COM, .SYS, .BAT and .EXE files. They can infect other files when an infected program is run from floppy, hard drive, or from the network. Many of these viruses are memory resident. After memory becomes infected, any uninfected executable file that runs becomes infected. Macro Virus: A macro virus is a new type of computer virus that infects the macros within a document or template. Every document you open refers to the Normal template, and hence gets infected with the macro virus. Since this virus attaches itself to documents, the infection can spread if such documents are opened on other computers. Multipartite Virus: A hybrid of Boot and Program viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then starts infecting other program files on disk. Trojan Horse Trojan horses are impostors that claim to be something desirable but, in fact, are malicious. Trojan horse programs do not replicate themselves. Trojan horses contain malicious code that when triggered cause loss, or even theft, of data. Computer Worms are reproducing programs that run independently and travel across network connections A virus is dependant upon a host file or boot sector, and the transfer of files between machines to spread, while a worm can run completely independently and spread of its own will through network connections. SPYWARE: It is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. ADWARE: It is any software package which automatically plays, displays, or downloads advertisements to a computer. It is a type of malware which steals information. Example Bonzi Buddy , an application marketed as an "Intelligent Software Agent", corrupted many of the user's system files, forcing the display of many obscene advertisements. Main mission of viruses is to spread out and then get active. Then it hack into user account and sent data to its owner or slow that machine A Computer Virus needs another program in order to be able to be activated and infect other computers files. A file containing virus is called infected file. Computer viruses usually spread in one of three ways:- From Removable media. From Downloads off the Internet. From e-mail attachments. E-mail Virus.. Removable Disc Opening and downloading an email containing virus Connecting with network that contains virus Floppy discs, CDs and flash devices Installing pirated software that contains virus Computer runs slowly Random restarts Unknown and uninstalled icons on desktop Icons change in appearance System memory and disk space is reduced New windows open up at an alarming rate Error messages on regular basis Files mysteriously disappear Make sure that it is virus and what virus it is. Companies that make anti-virus programs know what different viruses do and you can go to their web pages and read about the virus. In some cases it is not good to start your computer from hard disk, because the virus may be activated and then do some harm. Install and Update the antivirus software on the computer. Then, perform a thorough scan of the computer by using the antivirus software. Install the latest updates of your operating system to your computer . Download, install, and then run the Malicious Software Removal Tool to remove existing viruses on the computer. On the computer, turn on the firewall. Keep the computer operating system up-to-date. Use updated antivirus software on the computer Unknown emails should not be opened Unauthorized software should not be installed Your Time Is Up, My Time Is Now.... We Are The Angels Of Your Computer System. We Protect Your System Round The Clock An antivirus software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks. We should regularly run an antivirus program to scan and remove any possible virus attacks from a computer. Anti-spyware They can provide real time protection against the installation of spywares on the computer. This type of spyware protection works the same way as that of anti-virus protection. It scans and blocks all incoming network threats as it comes across. How An Antivirus Works... Using dictionary Approach: •The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary. • A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors. • Antivirus software will constantly monitors the activity of all the programs. •If any program tries to write data on an executable file, the antivirus software will flag the program having a suspicious behavior, means the suspected program will be marked as a virus. •The advantage of this approach is that it can safeguard the computer against unknown viruses also. •The disadvantage is that it may create several false alerts too. Providing regular updates for the virus dictionary. An antivirus program should provide free virus updates on a periodic basis. With the current outburst in macro and script-based viruses, virus updates that address the latest threats are essential. Most commercial antivirus software in today’s scenario provide virus updates on daily basis. •Disconnect the suspected computer system from the Internet as well as from the Local Network. •Start the system in Safe Mode or from the Windows boot disk, if it displays any problem in starting. •Take backup of all crucial data to an external drive. •Install antivirus software if you do not have it installed. •Now, download the latest virus definitions updates from the internet. •Perform a full system scan. •Repair •Quarantine •Delete •Rename •Ignore Sample of Infected Files Popular Anti-Virus And Anti-Spyware Software's Anti-Virus & Anti-Spyware Is The Bodyguard Of Your System “It Is Us Who Rules, Not Malwares” Say No To .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    49 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us