Вы находитесь на странице: 1из 2

TROJAN

HORSE
This is a destructive virus that requires
user execution to activate. Once the virus is
installed (by opening it) and the server is
started, it could start sending that same
copy of the virus to other computers from
your computer.
HOW TO GET INFECTED
You can get infected by executable files such
as .exe, .vbs, .com, and .bat. But some docu-
ments can infect you even if the file is not
executable (for example, a document).
10,560,000 COMPUTERS
Over 10 million computers have been
known to have been infected by malware,
specifically by a Trojan Horse.
PAYLOADS
The Trojan can do many things such as data
destruction, remote accessing (spying), auto
-downloading software, disable your securi-
ty and more.
The ultimate anti-hacker guide.
#KNOWLEDGEISPOWER

VIRUSES
COMPUTER
By: Mogen Cheng
@MogenIsMe
2014 Edition
AVG Anti-Virus is
one of the most
popular main-
stream antivirus
software . AVG protects over 187 million
active users world-wide. Features include
Antivirus, Link protection, File Shredder,
Online Shield, DataSafe, Anti-Spam and
Firewall.
Bitdefender Anti-
Virus is awarded best
anti-virus of 2014. On
a ratings test, it out-
performed many in
real-life tests according and had the least
performance impact (kept your computer
fast while protecting). Features include Anti-
virus Antispyware, Bitdefender Safepay,
Online Privacy Protection, File Shredder,
Two-way firewall, Antispam, Secure Online
Storage and Device Anti-Theft.
AVAST Anti-Virus,
another main-stream
popular software pro-
tects over 200 million
devices, protecting data
for 25 years. Features
include Antivirus, Anti-
malware, SafeZone (safe
banking), Silent Firewall, Anti-spam, Data
Shreddder and AccessAnywhere PC.
PROTECTION
SOFTWARE
WORK CITED
Strickland, Johnathan. "HowStuffWorks "10 Worst Computer
Viruses of All Time"" HowStuffWorks. HowStuffWorks. Web. 20
May 2014.
"CAIDA Analysis of Code-Red." CAIDA Analysis of Code-Red.
Cooperative Association for Internet Data Analysis. Web. 20 May
2014.
Fuller, John. "HowStuffWorks "Protecting Yourself from Trojan
Horses""HowStuffWorks. HowStuffWorks. Web. 20 May 2014.
COPYRIGHT MOGEN CHENG
SPYWARE
Spyware is another type of malicious soft-
ware that spies on other computers. The
virus is found in most free software that
show advertising in your computer. It caus-
es advertising to pop up (adware), it col-
lects your personal information and
even changes the configuration of your
computer.
HOW TO GET INFECTED
You can get this virus by downloading free
trials of programs such as anti-virus soft-
ware that may be infected, or fake versions
of a software.
ADDITIONAL WEBSITES
http://bit.ly/mogen11
The top 10 Worst Computer Viruses
of All Time. This website will give
you more information on malware and
computer infections.
http://bit.ly/mogen22
More Information on Spyware. Great way
to learn more about one of the most easily
convinced viruses.
http://bit.ly/mogen33
Great site on an in-depth explanation of
Worm viruses, and how they specifi-
cally work.
HOW IT IS SPREAD
Worms exploit a vulnerability on target computer by
tricking users into opening their program. For exam-
ple, fake versions of Adobes Flash player or any other
program that is not straight from the publisher web-
site can potentially harm your computer.
SAPPHIRE/SQL
SLAMMER
This virus was introduced and created in 2003 and
spread to half the computers in America in less than
15 minutes. It is a web server computer worm that
dramatically slowed down internet traffic and dou-
bled its targets (exponential growth). It exploited a
buffer overflow bug in Microsofts SQL server which
practically all the computers at the time used.
WHAT IT AFFECTED
Many commercial services such as ATM machine,
some 911 services in Seattle and the Continental Air-
lines has been affected by the virus. All-in-all this has
caused over $1 billion in damages. The only way you
can get infected is through chance as the virus
spread, and once you got it there was nothing you
could do about it.
WORMS
A nasty, nasty virus that comes in the name of
Worm. This type of virus hates your computer
and replicates copies of itself . Because a warm is
hosted from a standalone file (one file), it does
not require any other type of software or human
assistance.
Worms exploits loopholes in security systems by
searching for unprotected or outdated systems.
Each unprotected system found, the worm would
replicate itself automatically.
CODE RED WORM
This virus was created in 2001 and searched for
unprotected/outdated servers to infected them.
The virus did 3 things:
The virus replicated itself
replaced web pages with Hacked by Chi-
nese
Attempted to attack the white house
This virus infected over 360,000 throughout its
lifetime.

#STOPTHEINFECTION

Вам также может понравиться