04-04-2011, 11:30 AM
PRESENTED BY:
Venugopal reddy
venus final tech.ppt (Size: 2.02 MB / Downloads: 104)
Computer Viruses
Introduction
Computer virus have become today’s headline news
With the increasing use of the Internet, it has become easier for virus to spread
Virus show us loopholes in software
Most virus are targeted at the MS Windows OS
Definition
Þ Virus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own with out traveling to a new host.
Background
There are estimated 30,000 computer viruses in existence
Over 300 new ones are created each month
First virus was created to show loopholes in software
Virus Languages
ANSI COBOL
C/C++
Pascal
VBA
Unix Shell Scripts
JavaScript
Basically any language that works on the system that is the target
Symptoms of Virus Attack
Computer runs slower then usual
Computer no longer boots up
Screen sometimes flicker
PC speaker beeps periodically
System crashes for no reason
Files/directories sometimes disappear
Virus through the Internet
Today almost 87% of all viruses are spread through the internet (source: ZDNet)
Transmission time to a new host is relatively low, on the order of hours to days.
Classifying Virus - Types
Trojan Horse
Worm
àTrojan Horse
Covert
Leaks information
Usually does not reproduce
Trojan Horse
Features of Trojans:
◦ pings and query servers
◦ reboot or lock up the system
◦ display system information
◦ logs keystrokes
◦ server control
àWorms
Spread over network connection
Worms replicate
First worm released on the Internet was called Morris worm, it was released on Nov 2, 1988.
Worms
Features of worms:
◦ requires WSL (windows scripting language), Outlook or Outlook Express, and IE5
◦ Does not work in Windows NT
◦ Effects Spanish and English version of Windows
◦ 2 variants have been identified
◦ Is a “latent virus” on a Unix or Linux system
Worms
How Worms works
◦ worm is embedded within an email message of HTML format.
◦ a VbScript while the user views a HTML page
◦ a file named “Update.hta” is placed in the start up directory
◦ upon reboot worms executes
Protection/Prevention
Knowledge
Proper configurations
Run only necessary programs
Anti-virus software
Different anti-virus programs
There are three different kind of anti-viral packages:
activity monitors,
authentication or change-detection software, and
scanners.
Each type has its own strengths and weaknesses. Commercial anti-viral programs have a combination of the above mentioned functions.
Top ten Antiviral programs
Data Fellows F-Prot
EliaShim ViruSafe
ESaSS ThunderBYTE
IBM Antivirus
McAfee Scan
Microsoft Anti-Virus
Symantec Norton Antivirus
S&S Dr S&S Dr Solomon's AVTK.
Bit Defender 2008
Conclusion
You know know more about virus and how:
◦ viruses work through your system
◦ to make a better virus
Have seen how viruses show us a loophole in popular software
Most viruses show that they can cause great damage due to loopholes in programming
Venugopal reddy
venus final tech.ppt (Size: 2.02 MB / Downloads: 104)
Computer Viruses
Introduction
Computer virus have become today’s headline news
With the increasing use of the Internet, it has become easier for virus to spread
Virus show us loopholes in software
Most virus are targeted at the MS Windows OS
Definition
Þ Virus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own with out traveling to a new host.
Background
There are estimated 30,000 computer viruses in existence
Over 300 new ones are created each month
First virus was created to show loopholes in software
Virus Languages
ANSI COBOL
C/C++
Pascal
VBA
Unix Shell Scripts
JavaScript
Basically any language that works on the system that is the target
Symptoms of Virus Attack
Computer runs slower then usual
Computer no longer boots up
Screen sometimes flicker
PC speaker beeps periodically
System crashes for no reason
Files/directories sometimes disappear
Virus through the Internet
Today almost 87% of all viruses are spread through the internet (source: ZDNet)
Transmission time to a new host is relatively low, on the order of hours to days.
Classifying Virus - Types
Trojan Horse
Worm
àTrojan Horse
Covert
Leaks information
Usually does not reproduce
Trojan Horse
Features of Trojans:
◦ pings and query servers
◦ reboot or lock up the system
◦ display system information
◦ logs keystrokes
◦ server control
àWorms
Spread over network connection
Worms replicate
First worm released on the Internet was called Morris worm, it was released on Nov 2, 1988.
Worms
Features of worms:
◦ requires WSL (windows scripting language), Outlook or Outlook Express, and IE5
◦ Does not work in Windows NT
◦ Effects Spanish and English version of Windows
◦ 2 variants have been identified
◦ Is a “latent virus” on a Unix or Linux system
Worms
How Worms works
◦ worm is embedded within an email message of HTML format.
◦ a VbScript while the user views a HTML page
◦ a file named “Update.hta” is placed in the start up directory
◦ upon reboot worms executes
Protection/Prevention
Knowledge
Proper configurations
Run only necessary programs
Anti-virus software
Different anti-virus programs
There are three different kind of anti-viral packages:
activity monitors,
authentication or change-detection software, and
scanners.
Each type has its own strengths and weaknesses. Commercial anti-viral programs have a combination of the above mentioned functions.
Top ten Antiviral programs
Data Fellows F-Prot
EliaShim ViruSafe
ESaSS ThunderBYTE
IBM Antivirus
McAfee Scan
Microsoft Anti-Virus
Symantec Norton Antivirus
S&S Dr S&S Dr Solomon's AVTK.
Bit Defender 2008
Conclusion
You know know more about virus and how:
◦ viruses work through your system
◦ to make a better virus
Have seen how viruses show us a loophole in popular software
Most viruses show that they can cause great damage due to loopholes in programming