Professional Documents
Culture Documents
WHO I AM ??
Capable of spreading through an entire network of computers, infecting every machine thats incapable of protecting itself. Can destroy important files, corrupt data, slow down the speed of infected computer, unexpectedly closes the important programs. Capable of infecting other computer programs by modifying them to include a copy of itself.
VIRUSES: Know Your Enemy
MACRO VIRUSES
NETWORK VIRUSES E-mail VIRUSES
Affects the boot sector of a hand disk. Virus loads into memory during every boot sequence. Examples of boot sector virus are-
Polyboot.B, AntiEXE
VIRUSES: Know Your Enemy
programs that contain macros. It includes Microsoft Office Documents such as Word documents Excel Spreadsheets PowerPoint presentations Access databases and other similar application files. Examples of macro virus are Relax, Bablas.
VIRUSES: Know Your Enemy
internet Spreads through shared resources such as shared drives and folders. Examples of network viruses are Nimda and SQLSlammer
address book. Spreads to the new hosts address book contacts and then proceeds to send itself to all those contacts as well. Examples of E-mail viruses are SirCam virus
Trojan Horses
Trojans dont spread themselves. Trojans horses disguise themselves as useful software available for download on the internet. Native users download and run them and realise their mistakes later. WormsCan invade computers usually via a network. Deny service to legitimate users by inordinate amounts of processing and communication resources for self propagation. SpywareSlow down computers with their semi-intensive usage of processing power. Bringing up annoying pop-up windows at the most inappropriate VIRUSES: Know Your Enemy times
9
because it will help us if the need ever arises. Use of well reputed antivirus and update it daily . Make sure that antivirus automatically scans any newly inserted discs for viruses, especially if we tend to exchange data between our office and home computers. Avoid opening mails with attachments unless we are absolutely sure that they are from trusted sources. Keep all the documents and important programs backed up on a CD, Pen drives, or any other storage media.
10
This could also take place due to corruption of an essential file required by that software.
When we receive an e-mail message that has a strange attachment.
When we open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
There is a double extension on an attachment that we recently open
11
examined and a signature file is created that will help the antivirus program identify and deal with it. This inoculation is added to the antivirus software database and is used when scanning computers to identify and destroy viruses. computer and if a program showing virus like behaviour, a red flag is raised and the program or file is destroyed or quarantined, and reported to the user .
VIRUSES: Know Your Enemy
12
background? Q- Does this entitle me to free customer support? Q- How regularly are the virus signature updates released? Q- How easy is it to update? Q- Does it integrate with my e-mail program? Q- How easy is it to scan files? Q- Is it bootable?
13
14
Panda ActiveScan
www.pandasoftware.com/activescan/ Features No need to install any programs. Scans, disinfects and eliminates over 90,000 viruses worms and Trojans from all system devices, hard disks, compressed files and all our e-mail folders. Updated every day, so each scan will able to detect even a latest viruses. GFI Online Trojan Scan www.windowsecurity.com/trojanscan/ Features Specialized in detection and removal of Trojans from our computers. VIRUSES: Know Your Enemy
15
Norton Antivirus 2005 Pros- Excellent interface; great virus definition support. Cons- Significantly system heavy; no real-time spyware detection. McAfee Virus Scan Home 9.0 Pros- Improved interface; not too heavy on system resources.
NOD32 Antivirus System 2.0 Pros- very light on the system; excellent heuristic engines, frequent
Avast!4 Home Edition Pros- Free; light ion the system and very effective against
viruses. Cons- Barebones antivirus with no frills such as a firewall or spyware VIRUSES: Know Your Enemy scanner.
16
17