Virus_ Worm_ Trojan Horse by dfhdhdhdhjr


									Viruses, Malware, Adware/Spyware,
       Worms, Trojan Horse

               QuickTime™ an d a
      TIFF (Uncompressed) decompressor
         are need ed to see this p icture .

                                 ~ Malicious Programs~
Viruses, malware, adware/spyware,
worms and Trojan Horses are all
malicious programs that can cause
damage to your computer, but there are
differences among the them, and
knowing those differences can help you
better protect your computer from their
often damaging effects.
                    What is a Virus?
A computer virus attaches itself to a program or file enabling it
to spread from one computer to another, leaving infections as it

Like a human virus, a computer virus can range in severity:
some may cause only mildly annoying effects while others can
damage your hardware, software or files.
                                                                           QuickTime™ and a
Almost all viruses are attached to an executable file, whichTIFF (Uncompressed) decompressor
                                                               are needed to see this picture.
means the virus may exist on your computer but it actually
cannot infect your computer unless you run or open the
malicious program.

It is important to note that a virus cannot be spread without a
human action, (such as running an infected program) to keep it
going. Because a virus is spread by human action people will
unknowingly continue the spread of a computer virus by sharing
infecting files or sending emails with viruses as attachments in
the email.
            What is a Malware?
• Along with viruses, one of the biggest threats to computer
  users on the Internet today is malware. It can hijack your
  browser, redirect your search attempts, serve up nasty pop-
  up ads, track what web sites you visit, and generally screw
  things up.

• Malware programs are usually poorly-programmed and can
  cause your computer to become unbearably slow and
  unstable in addition to all the other havoc they wreak.Many
  of them will reinstall themselves even after you think you
  have removed them, or hide themselves deep within
  Windows, making them very difficult to clean.
                                                             QuickTime™ and a
                                                    TIFF (Uncompressed) decompressor
                                                       are neede d to see this picture.
         QuickTime™ and a
TIFF (Uncompressed) decompressor
   are need ed to see this picture.

                                      What is a Malware?
•     Malware often comes bundled with other programs (Kazaa, iMesh, and
      other file sharing programs seem to be the biggest bundlers). These
      malware programs usually pop-up ads, sending revenue from the ads
      to the program's authors. Others are installed from websites,
      pretending to be software needed to view the website.

•     Still others, install themselves through holes in Internet Explorer like a
      virus would, requiring you to do nothing but visit the wrong web page to
      get infected.

•     The vast majority, however, must be installed by the user.
      Unfortunately, getting infected with malware is usually much easier
      than getting rid of it, and once you get malware on your computer it
      tends to multiply.
                           What is a Adware?

• Adware is the class of programs that place advertisements on your
  screen. These may be in the form of pop-ups, pop-unders,
  advertisements embedded in programs, advertisements placed on
  top of ads in web sites, or any other way the authors can think of
  showing you an ad. The pop-ups generally will not be stopped by
  pop-up stoppers, and often are not dependent on your having
  Internet Explorer open. They may show up when you are playing a
  game, writing a document, listening to music, or anything else.
  Should you be surfing, the advertisements will often be related to the
  web page you are viewing.
                                         QuickTime™ and a
                               TIFF (Un compresse d) decompressor
                                  are needed to se e this picture.

               What is Spyware?
•   Spyware: Programs classified as spyware send information about you
    and your computer to somebody else. Some spyware simply relays the
    addresses of sites you visit or terms you search for to a server
    somewhere. Others may send back information you type into forms in
    Internet Explorer or the names of files you download. Still others search
    your hard drive and report back what programs you have installed,
    contents of your e-mail client's address book (usually to be sold to
    spammers), or any other information about or on your computer - things
    such as your name, browser history, login names and passwords,
    credit card numbers, and your phone number and address.Spyware
    may also use a program that is always running in the background to
    collect data, or it may integrate itself into Internet Explorer, allowing it to
    run undetected whenever Internet Explorer is open
                  What is a Worm?
A worm is similar to a virus by design and is
considered to be a sub-class of a virus. Worms
spread from computer to computer, but
unlike a virus, it has the capability to travel
without any human action.
                                                                 QuickTime™ an d a
A worm takes advantage of file or information          TIFF (Uncompressed) decompressor
                                                          are need ed to see this p icture .

transport features on your system, which is what
allows it to travel unaided.The biggest danger
with a worm is its capability to replicate itself on
your system, so rather than your computer
sending out a single worm, it could send out
hundreds or thousands of copies of itself,
creating a huge devastating effect.
           What is a Worm?
One example would be for a worm to send a copy of itself to everyone
listed in your e-mail address book. Then, the worm replicates and
sends itself out to everyone listed in each of the receiver's address
book, and the manifest continues on down the line.

Due to the copying nature of a worm and its capability to travel across
networks the end result in most cases is that the worm consumes too
much system memory (or network bandwidth), causing Web servers,
network servers and individual computers to stop responding. In recent
worm attacks such as the much-talked-about Blaster Worm, the worm
has been designed to tunnel into your system and allow malicious
users to control your computer remotely.

                              QuickTime™ and a
                     TIFF (Uncompressed) decompressor
                        are need ed to see this picture.
         QuickTime™ and a
TIFF (Uncompressed) decompre ssor
   are neede d to see this picture.

                                         What is a Trojan
        •        The Trojan Horse, at first glance will appear to be useful software but
                 will actually do damage once installed or run on your computer.

                 Those on the receiving end of a Trojan Horse are usually tricked into
                 opening them because they appear to be receiving legitimate software
                 or files from a legitimate source.

                 When a Trojan is activated on your computer, the results can vary.
                 Some Trojans are designed to be more annoying than malicious (like
                 changing your desktop, adding silly active desktop icons) or they can
                 cause serious damage by deleting files and destroying information on
                 your system.

                 Trojans are also known to create a backdoor on your computer that
                 gives malicious users access to your system, possibly allowing
                 confidential or personal information to be compromised. Unlike viruses
                 and worms, Trojans do not reproduce by infecting other files nor do
                 they self-replicate.
           Symptoms of a Virus                                                     Quic kTim e™ and a
                                                                         TIFF (Uncompres sed) dec ompressor
                                                                            are needed to s ee this pic ture.

•   After a virus begins to spread, many program files can become
    unstable and display warnings.
•   The operating system may not launch properly, and the computer user
    may need to reboot and restart the computer frequently to ensure all
    programs are starting and working fine.                                          Quic kTime™ and a

                                                                           TIFF (Uncompres sed) dec ompress or
    Critical files may get deleted automatically, and this can happen         are needed to s ee this pic ture.

    periodically or all at once.
•   Error messages will become prevalent; it may become difficult to save
    documents, and the computer may be running slower than usual.
•   If a system or network is infected severely, it may even black out or not
    even launch the startup process.
•   Out-of-memory error messages appear, even though your computer
    has plenty of RAM.
•   Windows spontaneously restarts unexpectedly.                                      Quic kT ime™ and a
                                                                            T IF F (Unc om press ed) dec ompres sor
                                                                               are needed t o see t his pict ure.

•   Windows will not start at all, even though you have not made any
    system changes, or you have not installed or removed any programs.
•   Programs that used to run now stop responding frequently. If you try to
    remove and reinstall the software, the issue continues to occur.
                        Symptoms of a Virus
•   In addition, disk space can become overloaded and cause frequent computer
•   Viruses can duplicate large-sized programs to the point that the computer
                                                                                             Quic kTim e™ and a
    cannot handle the files. This will reduce the chances of even installing an    TIFF (Uncompres sed) dec ompressor
                                                                                      are needed to s ee this pic ture.
    antivirus program successfully, so early detection is key to detecting and
    removing the dangerous virus.
•   Lately, computer viruses have been created so they can change some of the
    core system files (Microsoft Windows) so that web sites of most of antivirus
    software companies become inaccessible. Your Internet browser will either
    switch to some other web site or simply show メnot foundモ. What is happening
    is that you are being prevented from finding a way of getting antivirus
    software cleaning your system.
                                                                                           Quic kTime™ and a
•   ・A program disappears from the computer, and it was not intentionally        TIFF (Uncompres sed) dec ompress or
                                                                                    are needed to s ee this pic ture.
•   Someone tells you that they have recently received e-mail messages from
    you containing attached files (especially with .exe, .bat, .scr , .vbs
    extensions), which you did not send
•   The computer runs very slowly and it takes a long time to start.

                                                                                                            Quic kT ime™ and a
                                                                                                  T IF F (Unc om press ed) dec ompres sor
                                                                                                     are needed t o see t his pict ure.
                     QuickTime™ and a
           TIFF (Un compressed) decompressor
                                                  How to Prevent
              are neede d to se e this picture.

                                                   Viruses Etc.
     You can prevent a computer virus from entering your machine. A virus can
     compromise your personal information and even destroy your computer
     completely. Luckily, there are many low cost things you can do to protect yourself
     and stay one step ahead of the hackers. Here are 11 things you can do to help
     prevent computer viruses from invading your computer.

1.   Install a reliable anti virus program. From the first moment you turn your
     computer on, you should have a trusted anti virus program by your side. There are
     even free anti virus programs you can download that work almost as well as
     industry giants like Norton and McAfee.

2.   Install anti-spyware and anti-malware programs. As good as the best anti virus
     programs are, they sometimes need a little bit of help. Thankfully, many of the top
     anti-spyware programs are completely free. Spybot Search and Destroy and
     CCleaner are just two free programs that can help prevent computer viruses from
     doing any damage on your machine. As helpful as these programs are, however,
     you must update them and run them on a regular basis for them to do any good.

3.   Avoid suspicious websites. A good virus protection program will alert you when
     you visit a website that attempts to install or run a program on your computer. If you
     get a warning, don’t go back, you may end up with a bug you can’t get rid of
     How to Prevent Viruses Etc.
4.   Never Open Email Attachments Without Scanning Them First. The most
     common way viruses are spread throughout the Internet is still via email. Some
     attachments, like pictures, now display in emails and donユt require an                            QuickTime™ and a
                                                                                             TIFF (Un compressed) decompressor
                                                                                                are neede d to se e this picture.

     attachment to be manually opened, but other documents do. Make sure you
     use an email client that scans all email attachments before you are allowed to
     open them. This will help prevent computer viruses from getting a foothold on
     your machine.

5.   Set up Automatic Scans. Many of the top anti virus programs, as well as the
     best anti-spyware programs, now have settings that will let them automatically
     run during down times or in the middle of the night. Of course, your computer
     must be on for this to happen, but having daily scans run when nothing else is
     going on is a great way to prevent even the latest computer viruses from                          QuickTime™ and a
                                                                                             TIFF (Un compressed) decompressor

     sticking around too long.                                                                  are neede d to se e this picture.

6.   Watch Your Downloads. Part of the fun of the Internet is downloading music,
     movies and other items. However, since these downloads are so massive, it
     can be easy to sneak a virus along for the ride. Only download these files from
     trusted sites that you can count on, or, at the very least, scan them before you
     open them.

7.   Updates, Updates, Updates. There is a reason why Windows has a feature
     called Critical Updates. There is an entire branch of Microsoft dedicated to                 QuickTime™ and a
                                                                                        TIFF (Un compressed) decompressor
                                                                                           are neede d to se e this picture.

     staying one step ahead of the hackers out there so when they manage to fix a
     possible security loophole, you need to download the patch right away. Help
     Microsoft help you prevent computer viruses from causing too much trouble.
How to Prevent Viruses Etc.
8. Know What To Look For. Even if you are just a casual computer user, you
   should have an idea of how your machine operates, what normal pop up
   windows look like and what popular viruses are out there, that way, when your
   computer begins exhibiting tell tale signs, youユll know. You can help prevent
   computer viruses by staying updated and educated.

9. Stay Away From Cracked Software. It is so secret that you can download
   illegal, cracked versions of some programs online. As tempting as it may be,
   these files are almost always infested with advanced and difficult to detect bugs.
   Play it safe and get your software from the source.

10. Install a Firewall. A firewall is a program that screens incoming Internet and
    network traffic. Along with your virus program, it can help prevent unauthorized
    access to your computer.

11. Be prepared to Lock Down. If you hear of a virus that is spreading like wildfire
    through the Internet, make an extra effort to be careful. Donユt open any
    suspicious emails or accept any downloads for a week or two until your virus
    protection program has been updated and you are, once again, safe.

              QuickTime™ and a                       QuickTime™ and a                       QuickTime™ and a
    TIFF (Un compressed) decompressor      TIFF (Un compressed) decompressor      TIFF (Un compressed) decompressor
       are neede d to se e this picture.      are neede d to se e this picture.      are neede d to se e this picture.
          Anti-Virus Programs
    If updated regularly almost all types of computer
    viruses can be removed using the following anti-virus

•   Norton
•   McAfee Virus
•   Kaspersky
•   AVG                                QuickTime™ and a
                             TIFF (Un compressed) decompressor
•   Symantec                    are neede d to se e this picture.
     Do Macs Get Viruses?                                                QuickTime™ and a
                                                               TIFF (Uncompressed) decompressor
                                                                  are needed to see this picture.

Yes. However, the likelihood of an Apple Macintosh user
getting a virus when compared to a Microsoft Windows user is
very little to none. In fact, many of the Apple Macintosh users
don't even run an antivirus protection program.Below are some
of the reasons why Apple Macintosh computers do not have as
many viruses as Microsoft Windows.

1.Newer Macintosh operating systems, such as the Mac OS X,
is built on the Unix kernel, which is one of the oldest and most
secure operating systems available.
2.Microsoft Windows is used by a lot more people than the
Apple Mac OS. Because more people use Microsoft Windows,
it is a much better target than Apple computers.
3.Most of the computer virus writers are more familiar with the
IBM platform and Microsoft Windows, which means its easier
for them create a virus for that platform.
4.Many of the tools and scripts used to help users create
viruses or other malware are designed for Microsoft Windows.
      QuickTime™ an d a
are need ed to see this p icture .

To top