A Bout Viruse

3
A BOUT VIRUSE: When the internet became more people used this is a technology and also became more advanced but unfortunately , it is also helping these viruses to spread more and infect more users are used the internet through the emails such as Melisse virus . The Melisse virus is one of the document viruses that forward itself by emails. It is used the Outlook program to send an e-mail attachment such as Microsoft Word document to anyone . After that lot's of viruses are spreading through emails in the world such as Love Bug Type of viruses: Recently, most of the viruses are increased through the internet. People who create them, they may attached viruses to email and distribute them everywhere. There are more than one virus that can replicate itself and destroy data or computer. They are different in shape and functionality. Below are the type of virus: There are 3 basic types of viruses: Trojan Horses, Worms and Email Viruses. Trojan Horses A Trojan named after the Greek army’s tactic of hiding their soldiers in a giant wooden horse that was sent as a gift to the city of Troy (In Homer’s epic Illiad) – disguises itself as a document or file of interest, e.g. a sound-bite or song for a music lover, a new patch for an MMO or game for gamers or a picture/video. These viruses do not multiply but rather make your computer’s protection weaker and thus makes your system more susceptible to viruses and other kinds of malicious software. Worms The Worm-style of virus is a program that, once inside your system, multiplies and scans for flaws or loop-holes in your security systems and protection. The Worm-style virus attempts to spread itself through a large network by taking advantage of the loop-holes and flaws that it finds or sending itself through the intranet of the network to other computers. Email Viruses Email viruses use (as suggested by the name) emails to send itself to other computers and spread itself, they often forward themselves from infected computers. How Do Viruses Spread? Computer viruses are programs that must be triggered or somehow executed before they can infect your computer system and spread to others. Examples include opening a document infected with a "macro virus," booting with a diskette infected with a "boot sector" virus, or

description

DEMo

Transcript of A Bout Viruse

  • A BOUT VIRUSE:

    When the internet became more people used this is a technology and also became more advanced

    but unfortunately , it is also helping these viruses to spread more and infect more users are used

    the internet through the emails such as Melisse virus . The Melisse virus is one of the document

    viruses that forward itself by emails. It is used the Outlook program to send an e-mail attachment

    such as Microsoft Word document to anyone . After that lot's of viruses are spreading through

    emails in the world such as Love Bug

    Type of viruses:

    Recently, most of the viruses are increased through the internet. People who create them, they

    may attached viruses to email and distribute them everywhere. There are more than one virus

    that can replicate itself and destroy data or computer. They are different in shape and

    functionality. Below are the type of virus:

    There are 3 basic types of viruses: Trojan Horses, Worms and Email Viruses.

    Trojan Horses A Trojan named after the Greek armys tactic of hiding their soldiers in a giant

    wooden horse that was sent as a gift to the city of Troy (In Homers epic Illiad) disguises itself

    as a document or file of interest, e.g. a sound-bite or song for a music lover, a new patch for an

    MMO or game for gamers or a picture/video. These viruses do not multiply but rather make your

    computers protection weaker and thus makes your system more susceptible to viruses and other

    kinds of malicious software.

    Worms The Worm-style of virus is a program that, once inside your system, multiplies and

    scans for flaws or loop-holes in your security systems and protection. The Worm-style virus

    attempts to spread itself through a large network by taking advantage of the loop-holes and flaws

    that it finds or sending itself through the intranet of the network to other computers.

    Email Viruses Email viruses use (as suggested by the name) emails to send itself to other

    computers and spread itself, they often forward themselves from infected computers.

    How Do Viruses Spread?

    Computer viruses are programs that must be triggered or somehow executed before they can

    infect your computer system and spread to others. Examples include opening a document

    infected with a "macro virus," booting with a diskette infected with a "boot sector" virus, or

  • double-clicking on an infected program file. Viruses can then be spread by sharing infected files

    on a diskette, network drive, or other media, by exchanging infected files over the Internet via e-

    mail attachments, or by downloading questionable files from the Internet.

    Anti-virus software:

    Anti-virus Software is a program installed onto your computer. It helps protect your computer

    from viruses and also can scan, detect and remove the viruses. It is supported by firewall

    software (which protects against hackers and some viruses) and can do several functions to

    protect your computer from viruses such as

    It protects against Viruses ,Spyware , Trojan horses and Warms.

    It protects against web based attacks and latest threats

    It helps secure and monitory your network.

    It prevents others from taking control of your computer and using it to attack other

    computers.

    Best antivirus prevalent in the world

    - McAfee Antivirus .

    - ESET NOD32 Antivirus .

    - Norton 360 .

    - Avira Antivirus .

    - Kaspersky Internet Security .

    - AVG Antivirus .

    - Trend micro Antivirus .

    Prevention of virus infection

    1- Check all the disks( CDs,HDD,Floppyetc) that were used in other PCs before using

    them.

    2- Non-implementation of any program is taken from public networks such as the

    Internet before the examination.

    3- The use of original software, or licensed.

    4- Use a password to prevent hackers to access in your PC or copy important data .

    5- To keep multiple backup copies of all your files before installing any new programs.

    6- Processing computer with an anti-virus and always updated to ensure that detect new

    viruses.

  • 7- Always updated operating system and support it by the windows defender .

    8- Do not open any Email does not know the sender .

    9.0 Literature Review