computer virus
Download
Skip this Video
Download Presentation
Computer Virus

Loading in 2 Seconds...

play fullscreen
1 / 5

Computer Virus - PowerPoint PPT Presentation


  • 322 Views
  • Uploaded on

Computer Virus Software programs written by someone that needs to get a life Can range from being a nuisance to causing major destruction and recovery time Software packages can be infected Viruses Hide in:

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Computer Virus' - Jimmy


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
computer virus
Computer Virus
  • Software programs written by someone that needs to get a life
  • Can range from being a nuisance to causing major destruction and recovery time
  • Software packages can be infected
viruses hide in
Viruses Hide in:
  • Another computer program that executes so that the virus program can be placed into main memory.
  • Typically, viruses come from programs on floppy disks or networks.
  • Very complex viruses can write themselves in between hard disk sectors making them very difficult to detect.
virus types
Virus Types
  • Trojan Horse - contained inside of another “host” program. Often date activated. White collar sabotage.
  • Worms - may not be an executable program itself but duplicates in main memory and hard disk space. Slows down the operating system.
  • Stealth virus - pretends to be another program that should be on the computer
virus components
Virus Components:
  • Replication code - how it does what it does
  • Marker - set of codes that virus looks at to determine if the file has been infected
  • Kernel - code that controls task manipulation and replication
  • Overwriting vs non-overwriting: replaces an existing program file vs appending to it
elimination and protection
Elimination and Protection
  • Scanner software - “shield” software scans all data coming into a computer system looking for known or suspected viruses. Known viruses are detected by some recognizable “character string” in the virus computer code. Suspected viruses are detected whenever the virus program tries to do something weird, like attach to an existing program or reuse disk space reserved for the operating system.
  • Cleaner software - can try to restore infected files back to a useable state. Requires booting from a clean, write protected floppy disk May take a lot of time.
  • Detection software - detects the presence of a virus on an infected disk
  • Typical packages: McAfee, Dr. Solomon, etc
ad