Professional Documents
Culture Documents
ON
COMPUTER VIRUSES
TRAINING PROGRAMME
(ICITSS)
CONDUCTED BY,
ALAPPUZHA
SUBMITTED BY
ALAN GEORGE
SRO 0542692
UNDER GUIDANCE OF
Mrs. Sabitha.S
1|Page
ACKNOWLEDGEMENT
I express my humble gratitude to the Almighty God for the constant help and providence with
which he has accompanied me.
I would like to take up the opportunity to express my profound gratitude towards everyone who
generously gave their time, energy and resources in order to contribute to my success.
In addition, I address my special thanks to our faculty Mrs.Nandu Das, Mrs.Sabitha.S especially
for their commitments to guide me throughout the research.
I am extremely grateful to the ICAI Alappuzha branch, the chairman CA Vasudevan Potti.N the
faculty members and staff members for providing the facilities.
Last but not the least; I thank my batch mates for their valuable support & encouragement.
Alan George
2|Page
FEATURES USED
Microsoft Word 2010
a. Font
Alignments-Justified
Bullets
Line Spacing
c. Insert
Page Number
Table
Cover page
d. Page Layout
Orientation- portrait
Page borders
3|Page
CONTENTS
10
11
12
13
4|Page
Introduction
A computer virus is a computer program that can copy itself and infect a
computer. The term "virus" is also commonly but erroneously used to
refer to other types of malware, including but not limited to adware and
spyware programs that do not have the reproductive ability. A true virus
can spread from one computer to another (in some form of executable
code) when its host is taken to the target computer; for instance because
a user sent it over a network or the Internet, or carried it on a removable
medium such as a floppy disk, CD, DVD, or USB drive. Viruses can
increase their chances of spreading to other computers by infecting files
on a network file system or a file system that is accessed by another
computer. As stated above, the term "computer virus" is sometimes used
as a catch-all phrase to include all types of malware, even those that do
not have the reproductive ability. Malware includes computer viruses,
computer worms, Trojan horses, most rootkits, spyware, dishonest
adware and other malicious and unwanted software, including true
viruses. Viruses are sometimes confused with worms and Trojan horses,
which are technically different. A worm can exploit security
vulnerabilities to spread itself automatically to other computers through
networks, while a Trojan horse is a program that appears harmless but
hides malicious functions. Worms and Trojan horses, like viruses, may
harm a computer system's data or performance. Some viruses and other
malware have symptoms noticeable to the computer user, but many are
5|Page
surreptitious or simply do nothing to call attention to themselves. Some
viruses do nothing beyond reproducing themselves.
Types Of Viruses
Not all computer viruses behave, replicate, or infect the same way.
There are several different categories of viruses and malware. Below I
list and discuss some of the most common types of computer viruses.
Trojan Horse: A trojan horse program has the appearance of having a
useful and desired function. While it may advertise its activity after
launching, this information is not apparent to the user beforehand.
Secretly the program performs other, undesired functions. A Trojan
Horse neither replicates nor copies itself, but causes damage or
compromises the security of the computer. A Trojan Horse must be sent
by someone or carried by another program and may arrive in the form of
a joke program or software of some sort. The malicious functionality of
a Trojan Horse may be anything undesirable for a computer user,
including data destruction or compromising a system by providing a
means for another computer to gain access, thus bypassing normal
access controls. Worms: A worm is a program that makes and facilitates
the distribution of copies of itself; for example, from one disk drive to
another, or by copying itself using email or another transport
mechanism. The worm may do damage and compromise the security of
the computer. It may arrive via exploitation of a system vulnerability or
by clicking on an infected e-mail.
6|Page
Bootsector Virus: A virus which attaches itself to the first part of the
hard disk that is read by the computer upon bootup. These are normally
spread by floppy disks. Macro Virus: Macro viruses are viruses that use
another application's macro programming language to distribute
themselves. They infect documents such as MS Word or MS Excel and
are typically spread to other similar documents. Memory Resident
Viruses: Memory Resident Viruses reside in a computers volitale
memory (RAM). They are initiated from a virus which runs on the
computer and they stay in memory after it's initiating program closes.
Rootkit Virus:
A rootkit virus is an undetectable virus which attempts to allow
someone to gain control of a computer system. The term rootkit comes
from the linux administrator root user. These viruses are usually
installed by trojans and are normally disguised as operating system files.
Antivirus software
Identification methods
writer to connect to your computer and use it for their own purposes.
It can slow down your computer. It might corrupt your system files.
It might damage your boot sector creating problems when you boot
into the windows.
11 | P a g e
it might steal important information from your computer and send
to some other person.
It might change the power ratings of your computer and could blast
the system.
It might give you sleepless nights and nightmares if you are able to
sleep.
You might wake up in bad mood and that will affect your family
and your society.
12 | P a g e
Plus it undermines the faith of the people over the law and order
situation.
13 | P a g e
wireless network is infected, this type of virus will infect every
computer on that network if not blocked by a suitable firewall.
14 | P a g e
There are lots of viruses in the world and new viruses are coming up every
day. There are new anti-virus programs and techniques developed too. It is
good to be aware of viruses and other malware and it is cheaper to protect
you environment from them rather then being sorry.
It is good to be a little suspicious of malware when you surf in the Internet and
download files. Some files that look interesting might hide a malware.
A computer virus is a program that reproduces itself and its mission is to spread
out. Most viruses are harmless and some viruses might cause random damage
to data files.
A trojan horse is not a virus because it doesn't reproduce. The trojan horses are
usually masked so that they look interesting. There are trojan horses that steal
passwords and formats hard disks.
Marco viruses spread from applications which use macros. Macro viruses
spreads fast because people share so much data, email documents and use the
Internet to get documents. Macros are also very easy to write.
15 | P a g e
Some people want to experiment how to write viruses and test their
programming talent. At the same time they do not understand about the
consequences for other people or they simply do not care.
Viruses mission is to hop from program to other and this can happen via floppy
disks, Internet FTP sites, newsgroups and via email attachments. Viruses are
mostly written for PC-computers and DOS environments.
Viruses are not any more something that just programmers and computer
specialist have to deal with. Today everyday users have to deal with viruses.
16 | P a g e
17 | P a g e
18 | P a g e
19 | P a g e
20 | P a g e
Types Of Viruses
Not all computer viruses behave, replicate, or infect the same way. There are several different
categories of viruses and malware. Below I list and discuss some of the most common types of
computer viruses. Trojan Horse: A trojan horse program has the appearance of having a useful
and desired function. While it may advertise its activity after launching, this information is not
apparent to the user beforehand. Secretly the program performs other, undesired functions. A
Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security
of the computer. A Trojan Horse must be sent by someone or carried by another program and
may arrive in the form of a joke program or software of some sort. The malicious functionality of
a Trojan Horse may be anything undesirable for a computer user, including data destruction or
compromising a system by providing a means for another computer to gain access, thus
bypassing normal access controls. Worms: A worm is a program that makes and facilitates the
distribution of copies of itself; for example, from one disk drive to another, or by copying itself
using email or another transport mechanism. The worm may do damage and compromise the
security of the computer. It may arrive via exploitation of a system vulnerability or by clicking
on an infected e-mail.
Bootsector Virus: A virus which attaches itself to the first part of the hard disk that is read by the
computer upon bootup. These are normally spread by floppy disks. Macro Virus: Macro viruses
are viruses that use another application's macro programming language to distribute themselves.
They infect documents such as MS Word or MS Excel and are typically spread to other similar
documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale
memory (RAM). They are initiated from a virus which runs on the computer and they stay in
memory after it's initiating program closes.
Rootkit Virus:
A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a
computer system. The term rootkit comes from the linux administrator root user. These viruses
are usually installed by trojans and are normally disguised as operating system files.
21 | P a g e
22 | P a g e
23 | P a g e