250 likes | 300 Views
Computerviruses. Created by: Zoltán Homoki. It operates just like a real virus It destroys Frideric Cohen made the first virus in 1983 They wanted to use it in the army The result was shocking. Definition of viruses. Enter to the system without permission Can reproduce itself
E N D
Computerviruses Created by: Zoltán Homoki
It operates just like a real virus • It destroys • Frideric Cohen made the first virus in 1983 • They wanted to use it in the army • The result was shocking
Definition of viruses • Enter to the system without permission • Can reproduce itself • Destroy if the conditions materialize
Why are they noxious ? • Use lot of source of energy • Cause program or data losing • Cause detriment • Need to work with itself
Groups of the noxious programs • Viruses : - system virus - program virus - application virus • Other noxious programs : ( spyware, trojan horses, worms, ZIP-bomb, mutation viruses, hoax viruses ect. )
System viruses • It starts first (before the loading of the operation system) • It attacks the Master Boot Record • Prevention: - Checking of the MBR ( you can adjust it in the BIOS ) - Use anti-virus program • Restoration: FDISK/MBR, anti-virus program
Program virus • The virus can infect these files : - ( exe, com, sys, dll, pif, dot ect.) • The parts of the computer virus: - reproduction routine - activation routine - objective ( punitive ) routine
Groups of the computerviruses according to : • Generations • Speed of infection • Objective ( punitive ) routine • Place ( in memory, in file )
According to generations • First generation virus (simple spreading, easy decoding) • Stealth virus ( all is shown uninfected ) • Mutation virus ( while spreading it can change itself)
According to speed of infection • Viruses with slow infection : - just one or two victim • Viruses with fast infection : - it infects all opened files
According to objectiv routin • Destroyer : - physically destroying - strongly destroying - partially destroying - selectively destroying • Not Destroyer : - show a text, a music, a picture - change the keys on the keyboard - there is not objective routin in it
According to place • Resident: ( it there is in the memory till the computer is running ) • Not Resident • Mixed: ( objective routine resident, reproduction routine resident )
Other noxious programs • Trojan horse ( Backdoor virus ): - It masks itself a normal program - It opens a backdoor in the operation system • For example.: SubSeven, NetBus, Backdoor.Amasso ect.
Other noxious programs • Worm : - It use the operation system’s mistakes - It want to get information - It is not deleted - Just the operation system’s mistakes are fixed
Other noxious programs • Virusgenerator : - You not have to be a programmer
Other noxious programs • IN THE WILD ( ITW ) virus : • Circulates on the Internet • It is the most dangeruos
Other noxious programs • ZOO - virus : • These viruses are made in the laboratories • It helps with making of better anti-virus software • There aren’t perfect anti-virus programs
Other noxious programs • Hoax – virus : - These viruses make defective reports - They can’t cause mistakes
Other noxious programs • ZIP- bomb : • In fact it is a very huge file • It is packed excellently • 1050 piece A type
Other noxious programs • Spyware : ( Adware, Keylogger ) • Collectes information about you and your habits • Causes trouble ( frost the system, starts the IE with unknown home page, popup windows, strange icons on the desk ) • They are in Freeware and Shareware programs
Adware • In the most of case its serves the aim of advertisment • Sends pieces of information about the users
Keylogger • It can watch what you do on the computer • It registers the pressed down buttons • It sends the information to the sender • For example: BigBrother. FamilyCam
Other noxious programs • SPAM: • Undesirable advertisment e-mails • The quantity of spam mails always grow • The e-mail traffic’s 75 per cent is spam - It is expensive to filter the spams
Tricks of the spam senders • Open – relay ( mail server ) • Proxy server • WEB BUG • SPAM mails cheat the spam filters