08 Computer Virus
08 Computer Virus
08 Computer Virus
Introduction
A logic bomb employs code that lies inert until specific condition are met.
Logic bombs may reside within standalone programs, or they may part of
worms or viruses.
An example of a logic bomb would be a virus that waits to execute until it
has infected a certain number of hosts.
A time bomb is a subset of logic bomb, which is set to trigger on a
particular date & or time.
Their objective is to destroy data on the computer once certain conditions
have been met.
Logic bombs go undetected until launched, and the result can be
destructive.
An example of a time bomb is the infamous ‘Friday the 13th’ virus.
7 Master Boot Record/Boot Sector Viruses
Boot sector viruses alters or hide the boot sector, usually the Ist
sector of a bootable disk (hard drive, floppy disk|). or
Boot Sector Viruses infect the boot sector of a hard disk or floppy
disk.
They can also affect the Master Boot Record (MBR) of the hard disk.
The MBR is the first software loaded onto your computer.
The MBR resides on either a hard disk or floppy disk and when your
computer is turned on, the hardware locates and runs the MBR.
This program then loads the rest of the operating system into
memory.
Without a boot sector, computer software will not run.
8 Master Boot Record/Boot Sector Viruses
Boot sector virus (Apple Viruses 1,2,3, “Elk Cloner”), Pakistani Brain (x86),
Polyboot.B, AntiEXE.
9 Multipartite Viruses
Polymorphic Viruses change their own code each time they duplicate
themselves.
In this way, each new copy is a variation of the original virus, in order to
evade detection by antivirus software.
Polymorphic viruses encrypt or encode themselves in a different way (using
different algorithms and encryption keys) every time they infect a system.
This makes it impossible for antivirus to find them using string or
signature searches (because they are different in each encryption) and
also enables them to create a large number of copies of themselves.
Some examples include: Elkern, Marburg, Satan Bug, Tuareg and Dark
Avenger.
11 File infectors
The Trojan Horse gets its name from Greek history and the story of
Trojans war.
Greek warriors hide inside a wooden horse, which the Trojans took
within the walls of the city of Troy.
When night fell and the Trojans were asleep, the Greek warrior came
out of the horse and open the gates to the city, letting the Greek
army enter the gates and destroy the city of Troy.
14 Worms Attacks
A virus can only spread from one computer to another when its hosts
is taken to the uninfected computer, for instance by a user sending it
over a network or carrying it on a removable medium such as a floppy
disk, CD, or USB drive.
Additionally, viruses can spread to other computes by infecting files
on a network file system or a file system that is accessed by another
computer.
Today’s viruses may also take advantage of network services such as
the World Wide Web, e-mail and file sharing systems to spread.
If we want to protect our computer from computer viruses than we
must have to install Antivirus Software and must update it from
internet on regular basis.
19 Antivirus Software
Antivirus software consist of computer programs that attempt to
identify and eliminate computer viruses and other malicious
software (malware).
Antivirus software typically uses two different techniques to
accomplish this:
Examining (scanning) files to look for known viruses matching
definitions in a virus dictionary.
Identifying suspicious behavior from any computer program
which might indicate infection.
Such analysis may include data captures, port monitoring and
other methods.
Most commercial antivirus software uses both of these approaches
with an emphasis on the virus dictionary approach.
20 Antivirus Software Options
Available antivirus software solutions. Compare these to see which might meet the
needs of your organization.
Aladdin Knowledge Systems - http://www.esafe.com
Frisk Software International - http://www.complex.is
Alwil Software - http://www.avast.com
Kaspersky Lab - http://www.kaspersky.com
AVG Antivirus - http://www.grisoft.com
McAfee - http://www.mcafee.com
Central Command, Inc. - http://www.centralcommand.com
Network Associates, Inc. - http://www.nai.com
Command Software Systems, Inc. - http://www.commandcom.com
Computer Associates International - http://www.cai.com
Panda Software - http://www.pandasoftware.com
Data Fellows Corporation - http://www.datafellows.com
Dr. Solomon's Software, Inc. - http://www.drsolomon.com
ESET Software - http://www.mod32.com
Symantec Corporation - http://www.symantec.com
Finjan Software - http://www.finjan.com
21 Firewalls
Some software firewall also include parental controls to manage what kind
of websites the children visit.
Some package will also allow you to block photos and specific text content
that you do not want your children to view.
23 Kerberos