computer virus by imran

Upload: imran-hussain

Post on 04-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Computer Virus by IMRAN

    1/16

    1

    INTRODUCTION-

    This document covers the basics on computer viruses.Computer Virus is a kind of malicious

    software written intentionally to enter a computer without the users permission or knowledge, with

    an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can

    cause severe harm or adversely affect program and performance of the system. A virus should never

    be assumed harmless and left on a system.You have heard about them, read the news reports about

    the number of incidents reported, and the amount of damage they inflict. Maybe you have even

    experienced one firsthand. And ifyou havent, count yourself fortunate. Computer viruses are real

    and theyre costly. Springing up seemingly from nowhere, spreading like wildfire; computer viruses

    attack computer systems lightly or heavily, damaging files and rendering computers and networks

    unusable. They proliferate through e-mail, Internet file downloads, and shared diskettes. And they

    dont play favorites; your home computer is just as likely as a Fortune 500 companys netw ork to

    experience an infection.

    WHAT IS A COMPUTER VIRUS?

    A computer virus is a computer program. , a block of executable code, which attach itself to,

    overwrite or otherwise replace another program in order to reproduce itself without a knowledge of

    a PC user .The term "virus" is also commonly but erroneously used to refer to other types of

    malware, including but not limited to adware and spyware programs that do not have the

    reproductive ability. A true virus can spread from one computer to another (in some form of

    executable code) when its host is taken to the target computer; for instance because a user sent it

    over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD,

    or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on

    a network file system or a file system that is accessed by another computer.

    As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include

    all types of malware, even those that do not have the reproductive ability. Malware includescomputer viruses, computer worms, Trojan horses, spyware, dishonest adware and other malicious

    and unwanted software, including true viruses. Viruses are sometimes confused with worms and

    Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread

    itself automatically to other computers through networks, while a Trojan horse is a program that

    appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a

    computer system's data or performance. Some viruses and other malware have symptoms noticeable

    to the computer user, but many are surreptitious or simply do nothing to call attention to

    themselves. Some viruses do nothing beyond reproducing themselves.

    http://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Codehttp://en.wikipedia.org/wiki/Network_file_systemhttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Network_file_systemhttp://en.wikipedia.org/wiki/Codehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Adware
  • 7/31/2019 Computer Virus by IMRAN

    2/16

    2

    HISTORY-

    The first academic work on the theory of computer viruses (although the term "computer

    virus" was not invented at that time) was done by John von Neumann in 1949 who, held lectures at

    the University of Illinois about the "Theory and Organization of Complicated Automata". The work of

    von Neumann was later published as the "Theory of self-reproducing automata". In his essay von

    Neumann postulated that a computer program could reproduce.

    The actual term 'virus' was first used in David Gerrold's 1972 novel, When HARLIE Was One. In

    that novel, a sentient computer named HARLIE writes viral software to retrieve damaging personal

    information from other computers to blackmail the man who wants to turn him off.

    TIMELINE OF VIRUS PROGRAMS

    1970-1979

    The Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBNTechnologies. Creeper infected DECPDP-10 computers running the TENEX operating system.

    Creeper gained access via the ARPANET and copied itself to the remote system where the

    message, "I'm the creeper, catch me if you can!" was displayed. The Reaperprogram was later

    created to delete Creeper.

    1980-1989

    The Brain boot sector virus (aka Pakistani flu) was released. Brain is considered the first IBM PCcompatible virus and the program responsible for the first IBM PC compatible virus epidemic. The

    virus is also known as Lahore, Pakistani, Pakistani Brain, as it was created in Lahore, Pakistan by

    19 year old Pakistani programmer, Basit Farooq Alvi, and his brother, Amjad Farooq Alvi.

    Ralf Burger presented the Virdem model of programs at a meeting of the underground ChaosComputer Club in Germany. The Virdem model represented the first programs that could

    replicate themselves via addition of their code to executable DOS files in COM format.

    Appearance of the Vienna virus, which was subsequently neutralizedthe first time this hadhappened on the IBM platform.

    Christmas Tree EXEC was the first widely disruptive replicating network program, which paralyzedseveral international computer networks in December 1987.

    http://en.wikipedia.org/wiki/(c)Brainhttp://en.wikipedia.org/wiki/Boot_sectorhttp://en.wikipedia.org/wiki/Boot_sectorhttp://en.wikipedia.org/wiki/(c)Brain
  • 7/31/2019 Computer Virus by IMRAN

    3/16

    3

    1990-1999

    Mark Washburn working on an analysis of the Vienna and Cascade viruses with Ralf Burgerdevelops the first family of polymorphic virus: the Chameleon family.

    In 1995 the first Macro virus, called "Concept," is created. It attacked Microsoft Word documents. "Ply" - DOS 16-bit based complicated polymorphic virus appeared with built-in permutation

    engine.

    2000 and later

    2000

    The I LOVE YOU worm appears. As of 2004 this was the most costly virus to businesses, causingupwards of 5.5 to 10 billion dollars in damage.

    2001

    February 11: The Anna Kournikova virus hits e-mail servers hard by sending e-mail to contacts inthe Microsoft Outlook address book.

    October 26: The Klez worm is first identified. It exploits vulnerability in Microsoft InternetExplorer and Microsoft Outlook and Outlook Express.

    2002

    Beast is a Windows based backdoor Trojan horse, more commonly known as a RAT (RemoteAdministration Tool). It is capable of infecting almost all Windows OS i.e. 95 through XP. Written

    in Delphi and Released first by its author Tataye in 2002, its most current version was released

    October 3, 2004

    2003

    June 13: ProRat is a Turkish-made Microsoft Windows based backdoor Trojan horse, morecommonly known as a RAT (Remote Administration Tool).

    2004

    Late January: MyDoom emerges, and currently holds the record for the fastest-spreading massmailer worm.

    August 20: Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo andsometimes referred to as MS Juan) is a Trojan Horse that is known to cause popup and advertising

    for rogue antispyware programs.

    http://en.wikipedia.org/wiki/Vundohttp://en.wikipedia.org/wiki/Vundo
  • 7/31/2019 Computer Virus by IMRAN

    4/16

    4

    2005

    Late 2005: The Zlob Trojan, also known as Trojan. Zlob is a Trojan horse which masquerades as arequired video codec in the form of ActiveX. It was first detected in late 2005.

    2005: Bandook or Bandook Rat (Bandook Remote Administration Tool) is a backdoor Trojan horsethat infects the Windows family. It uses a server creator, a client and a server to take control over

    the remote computer.

    2006

    February 16: discovery of the first-ever malware for Mac OS X, a low-threat Trojan-horse knownas OSX/Leap-A or OSX/Oompa-A, is announced.

    2007

    January 17: Storm Worm identified as a fast spreading email spamming threat to Microsoftsystems. It begins gathering infected computers into the Storm botnet. By around June 30 it had

    infected 1.7 million computers, comprised between 1 and 10 million computers by September.

    2008

    February 17: Mocmex is a Trojan, which was found in a digital photo frame in February 2008. Itwas the first serious computer virus on a digital photo frame

    March 3: Torpig, also known as Sinowal and Mebroot, is a Trojan horse that affects Windows,turning off anti-virus applications. It allows others to access the computer, modifies data, steals

    confidential information (such as user passwords and other sensitive data) and installs more

    malware on the victim's computer.

    May 6: Rustock.C, a hitherto-rumoured spambot-type malware with advanced rootkit capabilities,was announced to have been detected on Microsoft systems and analyzed, having been in the

    wild and undetected since October 2007 at the very least.

    2009

    July 15: Symantec discovered Daprosy Worm. Said Trojan worm is intended to steal online-gamepasswords on internet cafes.

    2010

    February 18: Microsoft announced that a BSoD problem on some windows machines which wastriggered by a batch of Patch Tuesday updates was caused by the Alureon Trojan

    http://en.wikipedia.org/wiki/Daprosy_Wormhttp://en.wikipedia.org/wiki/Daprosy_Worm
  • 7/31/2019 Computer Virus by IMRAN

    5/16

    5

    TYPES OF COMPUTER VIRUSES-

    There are Different Types of Computer Viruses could be classified considering origin,

    techniques, types of files they infect, where they hide, the kind of damage they cause, the type of

    operating system or platform they attack etc.

    Most common types of viruses are mentioned below:

    1.Resident Viruses

    This type of virus is a permanent which dwells in the RAM memory. From there it can

    overcome and interrupt all of the operations executed by the system: corrupting files and programs

    that are opened, closed, copied, renamed etc. examples include: Randex, CMJ, Meve, and MrKlunky.

    2.Direct Action Viruses

    the main purpose of this virus is to replicate and take action when it is executed. When a

    specific condition is met, the virus will go into action and infect files in the directory or folder that it is

    in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always

    located in the root directory of the hard disk and carries out certain operations when the computer is

    booted.

    3.Overwrite Viruses

    Virus of this kind is characterized by the fact that it deletes the information contained in the

    files that it infects, rendering them partially or totally useless once they have been infected. The only

    way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the

    original content.

    Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

    4. Boot Virus

    This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk,

    in which information on the disk itself is stored together with a program that makes it possible to

    boot (start) the computer from the disk. The best way of avoiding boot viruses is to ensure that

    floppy disks are write-protected and never start your computer with an unknown floppy disk in the

    disk drive. Examples of boot viruses include: Polyboot.B, AntiEXE.

    5. Macro Virus

    Macro viruses infect files that are created using certain applications or programs that contain

    macros. These mini-programs make it possible to automate series of operations so that they are

    performed as a single action, thereby saving the user from having to carry them out one by one.

    Examples of macro viruses: Relax, Melissa.A, Bablas, and O97M/Y2K.

  • 7/31/2019 Computer Virus by IMRAN

    6/16

    6

    6. Directory Virus

    Directory viruses change the paths that indicate the location of a file. By executing a program

    (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowinglyrunning the virus program, while the original file and program have been previously moved by the

    virus.

    Once infected it becomes impossible to locate the original files.

    7.Polymorphic Virus

    Polymorphic viruses encrypt or encode themselves in a different way (using different

    algorithms and encryption keys) every time they infect a system. This makes it impossible for anti-

    viruses to find them using string or signature searches (because they are different in each encryption)

    and also enables them to create a large number of copies of themselves. Examples include: Elkern,Marburg, Satan Bug, and Tuareg.

    8. File Infectors

    This type of virus infects programs or executable files (files with an .EXE or .COM extension).

    When one of these programs is run, directly or indirectly, the virus is activated, producing the

    damaging effects it is programmed to carry out. The majority of existing viruses belongs to this

    category, and can be classified depending on the actions that they carry out.

    9. Companion VirusesCompanion viruses can be considered file infector viruses like resident or direct action types.

    They are known as companion viruses because once they get into the system they "accompany" the

    other files that already exist. In other words, in order to carry out their infection routines, companion

    viruses can wait in memory until a program is run (resident viruses) or act immediately by making

    copies of themselves (direct action viruses).Some examples include: Stator, Asimov.1539, and

    Terrax.1069

    10. FAT Virus

    The file allocation table or FAT is the part of a disk used to connect information and is a vital

    part of the normal functioning of the computer. This type of virus attack can be especially dangerous,

    by preventing access to certain sections of the disk where important files are stored. Damage caused

    can result in information losses from individual files or even entire directories.

    11. Worms

    A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to

    negative effects on your system and most importantly they are detected and eliminated by antivirus.

    Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, and Mapson.

  • 7/31/2019 Computer Virus by IMRAN

    7/16

    7

    12. Trojans or Trojan Horses

    Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses

    do not reproduce by infecting other files, nor do they self-replicate like worms.

    13. Logic Bombs

    They are not considered viruses because they do not replicate. They are not even programs in

    their own right but rather camouflaged segments of other programs. Their objective is to destroy

    data on the computer once certain conditions have been met. Logic bombs go undetected until

    launched, and the results can be destructive.

  • 7/31/2019 Computer Virus by IMRAN

    8/16

    8

    HOW COMPUTER VIRUSES WORK AND HOW DO

    THEY SPREAD?A computer virus is, in many ways, similar to the biological viruses that attack human bodies.

    A biological virus isnt truly a living, independent entity. A virus is nothing more than a fragment of

    DNA sheathed in a protective jacket. It reproduces by injecting its DNA into a host cell. The DNA then

    uses the host cells normal mechanisms to reproduce itself. A computer virus is like a biological virus

    in that it also isnt an independent entity; it must piggyback on a host (another program or

    document) in order to propagate. Many viruses are hidden in the code of legitimate software

    programsprograms that have been infected, that is. These viruses are called file infector viruses,

    and when the host program is launched, the code for the virus is also executed, and the virus loads

    itself into your computers memory. From there, the virus code searches for other programs on your

    system that it can infect; if it finds one, it adds its code to the new program, which, now infected, canbe used to infect other computers.

    This entire process is shown in Figure

    If all a virus did, was copy itself to additional programs and computers, there would be little

    harm done, save for having all our programs get slightly larger. Unfortunately, most viruses not only

    replicate themselves, they also perform other operationsmany of which are wholly destructive. A

    virus might, for example, delete certain files on your computer. It might overwrite the boot sector of

    your hard disk, making the disk inaccessible. It might write messages on your screen, or cause yoursystem to emit rude noises. It might also hijack your e-mail program and use the program to send

    itself to all your friends and colleagues, thus replicating itself to a large number of PCs. Viruses that

    replicate themselves via e-mail or over a computer network cause the subsidiary problem of

    increasing the amount of Internet and network traffic. These fast-replicating virusescalled worms

    can completely overload a company network, shutting down servers and forcing tens of thousands of

    users offline. While no individual machines might be damaged, this type of communications

    disruption can be quite costly. As you might suspect, most viruses are designed to deliver their

    payload when theyre firstexecuted. However, some viruses wont attack until specifically prompted,

    typically on a predetermined date or day of the week. They stay on your system, hidden from sight

    virus copies itself to other programe

    virus delivers its destructive payload

    virus code is loaded into pc memory

    virus programe is lunched

  • 7/31/2019 Computer Virus by IMRAN

    9/16

    9

    like a sleeper agent in a spy novel, until theyre awoken on a specific date; then they go about the

    work they were programmed to do. In short, viruses are nasty little bits of computer code, designed

    to inflict as much damage as possible, and to spread to as many computers as possiblea particularly

    vicious combination.

    WHAT DO VIRUSES DO TO COMPUTERS?

    Viruses are software programs, and they can do the same things as any other programs

    running on a computer. The actual effect of any particular virus depends on how it was programmed

    by the person who wrote the virus. Some viruses are deliberately designed to damage files or

    otherwise interfere with your computer's operation, while others don't do anything but try to spread

    themselves around. But even the ones that just spread themselves are harmful, since they damage

    files and may cause other problems in the process of spreading. But viruses can't do any damage to

    hardware, they won't melt down your CPU or burn out your drive.

    THE HARMS CAUSED BY COMPUTER VIRUSES-

    Not a month goes by without another big-time virus scare. Tens of millions of computers are

    infected by computer viruses every year. In 2001, 2.3 million computers were infected by the SirCam

    virus, and another million computers were hit by CodeRed. Even worse, the LoveLetter virus hit an

    estimated 45 million computerson a single day in 2000. ICSA Labs (www.icsalabs.com), a leading

    provider of security research, intelligence, and certification, found that the rate of virus infection in

    North America in 2001 was 113 infections per 1000 computersmeaning that more than 10% of all

    computers they surveyed had been hit by a virus. And this rate is increasing; ICSA says that the

    likelihood of contracting a computer virus has doubled for each of the past five years. Viruses hit the

    corporate world especially hard; a single infected computer can spread the virus among the entire

    corporate network. McAfee.com (www.mcafee.com), a company specializing in virus protection,

    estimates that two-third of U.S. companies are attacked by viruses each year. A third of those

    companies reported that viruses knocked out their servers for an average of 5.8 hours per infection,

    and 46% of the companies required more than 19 days to completely recover from the virus incident.

    These incidents come with a heavy cost. The research firm Computer Economics (www

    .computereconomics.com) estimates that companies spent $10.7 billion to recover from virus attacks

    in 2001. Technology magazine The Industry Standard (www.thestandard.com) puts the cost much

    higher, at upwards of $266 billion. Whatever the real number, its clear that computer viruses are

    costly to all concernedin terms of both money and the time required to clean up after them. Just

    look at the costs inflicted by individual viruses. For example, Computer Economics estimates that the

    Nimda virus alone cost companies $590 million in cleanup costs; CodeRed and LoveLetter were even

    more costly, running up costs of $2.6 billion apiece. To an individual company, these costs can be

  • 7/31/2019 Computer Virus by IMRAN

    10/16

    10

    staggering. ICSA Labs estimates that virus cleanup costs large companies anywhere from $100,000 to

    $1 million each per year. Thats real money.Unfortunately, this problem doesnt look like its going to

    go away. In fact, the problem just keeps getting worse. To date, more than 53,000 different viruses

    have been identified and catalogued with another half-dozen or so appearing every day.

    Diagnosing a Virus Infection-

    How does one know if his/her computer has been infected with a virus? In short, if it starts

    acting funny, doing anything it didnt do before, then a probable cause is some sort of computer

    virus. Here are some symptoms to watch for:

    Programs quit working or freeze up. Documents become inaccessible. Computer freezes up or wont start properly. The CAPS LOCK key quits workingor works intermittently. Files increase in size. Frequent error messages appear onscreen. Strange messages or pictures appear onscreen. Your PC emits strange sounds. Friends and colleagues inform you that theyve received strange e-mails from you, that

    You dont remember sending.

  • 7/31/2019 Computer Virus by IMRAN

    11/16

    11

    HOW CAN YOU PROTECT YOURSELF?

    With dangerous viruses on the network, what can computer users do to protect their

    systems? Here are just a few hints:

    Dont assume anything. Make some time to learn about securing your system. Acquire and use a reliable antivirus program. Select an antivirus that has a consistent track

    record.

    Acquire and use a reliable firewall solution. Again, independent reviewers are your best betfor reasonable choices. Some operating systems come with a firewall which only filters

    incoming traffic. Use a firewall that can control both incoming and outgoing Internet traffic.

    Do not open e-mails coming from unknown or distrusted sources. Many viruses spread via e-mail messages so please ask for a confirmation from the sender if you are in any doubt.

    Do not open the attachments of messages with a suspicious or unexpected subject. If youwant to open them, first save them to your hard disk and scan them with an updated antivirus

    program.

    Delete any chain e-mails or unwanted messages. Do not forward them or reply to theirsenders. This kind of messages is considered spam, because it is undesired and unsolicited

    and it overloads the Internet traffic.

    Avoid installing services and applications which are not needed in day-by-day operations in adesktop role, such as file transfer and file sharing servers, remote desktop servers and the

    like. Such programs are potential hazards, and should not be installed if not absolutely

    necessary.

    Update your system and applications as often as possible. Some operating systems andapplications can be set to update automatically. Make full use of this facility. Failure to patch

    your system often enough may leave it vulnerable to threats for which fixes already exist.

    Do not copy any file if you don't know or don't trust its source. Check the source (provenance)of files you download and make sure that an antivirus program has already verified the files at

    their source.

    Make backups of important personal files (correspondence, documents, pictures and such) ona regular basis. Store these copies on removable media such as CD or DVD. Keep your archive

    in a different location than the one your computer is in.

  • 7/31/2019 Computer Virus by IMRAN

    12/16

    12

    HOW DOES ANTI-VIRUS SOFTWARE WORK?

    An anti-virus software program is a computer program that can be used to scan files to

    identify and eliminate computer viruses and other malicious software (malware).

    Anti-virus software typically uses two different techniques to accomplish this:

    Examining files to look for known viruses by means of a virus dictionary Identifying suspicious behavior from any computer program which might indicate

    infection

    Most commercial anti-virus software uses both of these approaches, with an emphasis on the virus

    dictionary approach.

    VIRUS DICTIONARY APPROACH-

    In the virus dictionary approach, when the anti-virus software examines a file, it refers to a

    dictionary of known viruses that have been identified by the author of the anti-virus software. If a

    piece of code in the file matches any virus identified in the dictionary, then the anti-virus software

    can then either delete the file, quarantine it so that the file is inaccessible to other programs and its

    virus is unable to spread, or attempt to repair the file by removing the virus itself from the file. To be

    successful in the medium and long term, the virus dictionary approach requires periodic online

    downloads of updated virus dictionary entries. As new viruses are identified "in the wild", civically

    minded and technically inclined users can send their infected files to the authors of anti-virus

    software, who then include information about the new viruses in their dictionaries.

    Dictionary-based anti-virus software typically examines files when the computer's operating

    system creates, opens, and closes them; and when the files are e-mailed. In this way, a known virus

    can be detected immediately upon receipt. The software can also typically be scheduled to examine

    all files on the user's hard disk on a regular basis. Although the dictionary approach is considered

    effective, virus authors have tried to stay a step ahead of such software by writing "polymorphic

    viruses", which encrypt parts of themselves or otherwise modify themselves as a method of disguise,

    so as to not match the virus's signature in the dictionary.

  • 7/31/2019 Computer Virus by IMRAN

    13/16

    13

    SUSPICIOUS BEHAVIOR APPROACH-

    The suspicious behavior approach, by contrast, doesn't attempt to identify known viruses, but

    instead monitors the behavior of all programs. If one program tries to write data to an executableprogram, for example, this is flagged as suspicious behavior and the user is alerted to this, and asked

    what to do.

    Unlike the dictionary approach, the suspicious behavior approach therefore provides

    protection against brand-new viruses that do not yet exist in any virus dictionaries. However, it also

    sounds a large number of false positives, and users probably become desensitized to all the warnings.

    If the user clicks "Accept" on every such warning, then the anti-virus software is obviously useless to

    that user. This problem has especially been made worse over the past 7 years, since many more

    nonmalicious program designs chose to modify other .exes without regards to this false positiveissue. Thus, most modern antivirus software uses this technique less and less.

    OTHER WAYS TO DETECT VIRUSES -

    Some antivirus-software will try to emulate the beginning of the code of each new executable

    that is being executed before transferring control to the executable. If the program seems to be using

    self-modifying code or otherwise appears as a virus (it immediately tries to find other executables),

    one could assume that the executable has been infected with a virus. However, this method results in

    a lot of false positives.Yet another detection method is using a sandbox. A sandbox emulates the operating system

    and runs the executable in this simulation. After the program has terminated, the sandbox is

    analyzed for changes which might indicate a virus. Because of performance issues this type of

    detection is normally only performed during on-demand scans.

  • 7/31/2019 Computer Virus by IMRAN

    14/16

    14

    ISSUES OF CONCERN-

    Macro viruses, arguably the most destructive and widespread computer viruses, could be

    prevented far more inexpensively and effectively, and without the need of all users to buy anti-virussoftware, if Microsoft would fix security flaws in Microsoft Outlook and Microsoft Office related to

    the execution of downloaded code and to the ability of document macros to spread and wreak

    havoc. User education is as important as anti-virus software; simply training users in safe computing

    practices, such as not downloading and executing unknown programs from the Internet, would slow

    the spread of viruses, without the need of anti-virus software. Computer users should not always run

    with administrator access to their own machine. If they would simply run in user mode then some

    types of viruses would not be able to spread.

    There are various methods of encrypting and packing malicious software which will make

    even well-known viruses undetectable to anti-virus software. Detecting these "camouflaged" virusesrequires a powerful unpacking engine, which can decrypt the files before examining them.

    Unfortunately, many popular anti-virus programs do not have this and thus are often unable to

    detect encrypted viruses. Companies that sell anti-virus software seem to have a financial incentive

    for viruses to be written and to spread, and for the public to panic over the threat.

  • 7/31/2019 Computer Virus by IMRAN

    15/16

    15

    CONCLUSION-

    Computer viruses are malicious computer programs, designed to spread rapidly and deliver

    various types of destructive payloads to infected computers. Viruses have been around almost as

    Long as computers themselves, and they account for untold billions of dollars of damage every year.

    While there are many different types of viruses, the best protection against them is to exhibit

    extreme caution when downloading files from the Internet and opening e-mail attachments and to

    religiously avail yourself of one of the many antivirus software programs currently on the market.

  • 7/31/2019 Computer Virus by IMRAN

    16/16

    16

    BIBLIOGRAPHY