Computer Viruses: By: Angelica Jurczak Anna Rog David Brackett
Computer Viruses: By: Angelica Jurczak Anna Rog David Brackett
Computer Viruses: By: Angelica Jurczak Anna Rog David Brackett
Viruses
By: Angelica Jurczak
Anna Rog
David Brackett
What is a Computer Virus?
A computer virus is a computer program that
can copy itself and infect a computer without the
permission or knowledge of the owner.
One of the first detected virus was the Creeper
virus in the early 70’s
Before computer networks became widespread,
most viruses spread on removable media,
particularly floppy disk.
Basic Computer Viruses
Trojan Horses
appears as interesting program file but when
installed it allows intruders to access and read your
files
Worms
virus that copies and multiplies itself by
using computer networks and security
flaws
E-mail Viruses
use e-mail messages to spread which allow it to
automatically forward itself to thousands of people
Types of Viruses
Boot Sector Virus
Infects the boot or MBR of diskettes and hard drives through the
sharing of infected disks and pirated software applications
Once your hard drive is infected all diskettes that you use in your
computer will be infected
Program Virus
Becomes active when the program file (usually with extensions
.BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened
It then makes copies of itself and will infect other programs on
the computer
Multipartite Virus
Hybrid of a Boot Sector and Program viruses
It infects program files and when the infected program is active it
will affect the boot record
Types of Viruses
Stealth Virus
Disguises itself to prevent from being detected by antivirus
software
It alters its file size or conceals itself in memory
Polymorphic Virus
Act like a chameleon, changing its virus signature (binary
pattern) every time it multiples and infects a new file
Macro Virus
Programmed as a macro embedded in a document, usually
found in Microsoft Word and Excel
Once it gets in to your computer, every document you produce
will become infected
Relatively new type of virus and may slip by your antivirus
software if you don't have the most recent version installed
Signs Your Computer is Infected
Functions slower than
normal
Responds slowly and
freezes often
Restarts itself often
See uncommon error
messages, distorted
menus, and dialog boxes
Notice applications fail to
work correctly
Fail to print correctly
First half of the 70'Late 60,s, early 70,s- "Rabbits" cloned
themselves occupied system resources, slowing down the productivity.
-"The Creeper" capable of entering a network by itself and transferring a
copy of itself to the system.
Early 80,s-Increasing number of programs written by individuals not by
software companies. Programs caused miner viruses called "Trojan horses".
1986'Brain virus' - by Amjad and Basit Farooq Alvi.
- spread through floppy disks,
- infected boot records and not computer hard drives
Lahore, Pakistani Brain, Brain-A and UIUC virus
-took over free space on the floppy disk and hid from detection
”disguised itself by displaying the uninfected boot sector on the disk.”
1987-Lehigh virus
- the first memory resident file infector that attacked executable files and
took control when a file was opened
The Love Bug spread far faster than Melissa. Unlike Melissa,
it would mail itself to everyone in your Outlook address book
-- most of whom would probably be delighted to read about
how you love them -- not just the first fifty. Moreover, it would
gobble up certain media files stored on your hard drive.
Did you know?
One German newspaper
tragically lost 2,000
pictures from its archive.
The perpetrator turned out
to be a 23-year-old Filipino
computer science student
who more or less
plagiarized all of his code.
The lack of laws in the
Philippines covering
computer crimes, he pretty
much got away with his
crime.
Prevention
Upload and use antivirus
software
Be aware of the e-mails
and attachments you
open
Check for updates on
antivirus software
regularly
Make sure antivirus
software is installed
correctly
Sources
http://www.tech-faq.com/history-of-computer-viruses.shtml
http://spamlaws.com/history.html
http://en.wikipedia.org/wiki/Computer_virus#History
http://www.infoplease.com/ipa/A0872842.html
References
http://www.spamlaws.com/protect.html
http://www.spamlaws.com/virus-types.html
http://www.spamlaws.com/virus-comtypes.html
http://www.spamlaws.com/federal/index.shtml
http://www.spamlaws.com/virus-types.html
Wikipedia
www.suggestafix.com
www.microsoft.com