Beruflich Dokumente
Kultur Dokumente
......................................................................................
Guess who created the 1st PC Virus? In 1986 two Pakistani Brothers Amjad and Basit Alvi
developed a method of infecting the boot sector of Floppy disks with the virus called
“Brain”. The intent was to ascertain th extent of Software piracy in Pakistan.
=======================================================================================
2) Replicatioin:
----------------
The Virus spreads from one file to another by creating either exact or modified copies of
itself on the infected System.
.......................................................................................
A virus uses host program on the infected Pcs like word to Replicate and each time file
is opened the virus executes along with it . Unlike a Virus , a worm replicates through
computer networks usually by exploiting the vulnerablilities of the operating system
that are invisible to user. Trojan horses don’t replicate.
.......................................................................................
E-mail Virus:
Virii usually spread through e-mail attachments . some of these also act as worms and
self-forward themselves to everyone in the victim’s address book.
Example
The recent Sobig.F virus spreads through e-mail attacments and contains randomly
generated subjects lines such Thank You!, Re : That Movie etc
......................................................................................
Boot Sector Virus:
The virus affects the boot records of the hard disks and floppies.
Example
The name Michelangelo virus was given by a researcher who noticed that its trigger date
was the same as Michelangelo’s birthday, 6 March (1475).
................................................................................ ..
2
Also known as program virii, these attach to the executable files on the system.
Example
The chernobyl virus has the destructive cpability of deleting the entire hard drive
along with overwriting the BIOS chip.
=======================================================================================
3) Activation:
--------------
Virii usually have damage routines that activate when certain conditions such as a
particular date or whwn the user performs certain actions are met.
................................................................................
Marco Virus:
This virus infects the applications that use macros such as MS word and excel.
Example
In Dec 1999 computer programmer David L. Smith was jailed for 20 months for creating
the Melissa macro virus.
................................................................................
Multipartite Virii:
These have properties of both boot sector viruses and file viruses.
Example
The Tequila virus displayed crude Mandelbrot on the screen with a message ‘Loving
thoughts to L.I.N.D.A BEER and TEQUILLA forever!’ Along with swiss P.O.box number.
................................................................................
Hoax Virii:
Example
The C-NILE virus hoax contains the text. “ It seeems that there is a virus out there
called the C-NILE virus that even Norton cannot take care of . it appears to affect
those of us who were born before 1948.
=======================================================================================
3
4) Discovery:
-------------
................................................................................
................................................................................
AVG Anti-Virus:
http://www.grisoft.com/
================================================================================
5) Eradication:
---------------
On installing the update of their antivirus software the user should be able to wipe
out any virus . Virii do not diappear completely from the internet but cease to become
a threat.
================================================================================