computer technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · infects...
TRANSCRIPT
![Page 1: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/1.jpg)
Computer Technology
![Page 2: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/2.jpg)
Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other files
It can ◦ Corrupt files
◦ Destroy data
◦ Display irritating messages
◦ Corrupt computer systems
![Page 3: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/3.jpg)
Viruses spread because people distribute infected files by exchanging disks and CDs, sending e-mail attachments, and downloading documents from the Internet.
Viruses attach themselves to files with .exe, .com, or .vbs filename extensions
When you open the infected file, the virus opens and waits to infect the next program you run or disk you use
![Page 4: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/4.jpg)
Viruses have the ability to lurk in a computer for days or months, quietly replicating themselves
You may not even know your computer has a virus, thus making it easier to spread the virus
![Page 5: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/5.jpg)
An event that activates a task often associated with a computer virus
Time Bomb ◦ Watches for the PC clock to reach a certain date to activate
the virus
Example
Michelangelo virus
Damages files on March 6 the artist’s birthday
Logic Bomb ◦ Watches for a specific set of input to activate the virus
![Page 6: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/6.jpg)
![Page 7: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/7.jpg)
Virus that attaches to an application program ◦ Example
Chernobyl
Notorious for overwriting a section of the hard disk, making it impossible to access data
Written by Chen Ging Hau of Taiwan in 1998. One of the most damaging viruses.
![Page 8: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/8.jpg)
Infects the system files that your computer uses every time it is turned on
Cause widespread damage and recurring problems ◦ Example
Stoned Virus
Every time you turn on your computer the virus is activated and infects any non-write-protected files including your hard disk
Created in 1987, written by a university student in Wellington, New Zealand. One of the very first viruses
![Page 9: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/9.jpg)
Macro ◦ A miniature program that usually contains
legitimate instructions to automate a document or task. Infects data files—chiefly files created in Word, Excel, Power Point, and even Access
This virus infects a macro ◦ Example
Melissa Virus Attaches itself to Microsoft Word documents
Codemas Virus Attaches itself to Microsoft Excel spreadsheets
![Page 10: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/10.jpg)
![Page 11: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/11.jpg)
Computer program that seems to perform one function while actually doing something else ◦ Different from a virus because it does not make
copies of itself
Different tasks that can be affected ◦ Stealing passwords
◦ Deleting files
![Page 12: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/12.jpg)
![Page 13: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/13.jpg)
Software program designed to enter a computer system usually through a network, through security holes and then replicate itself
Spreads from computer to computer
![Page 14: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/14.jpg)
![Page 15: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/15.jpg)
Antivirus software ◦ Set of utility programs that looks for and eradicates
a wide spectrum of problems, including viruses, Trojan horses, and worms
◦ Example McAfee Virus Scan
Don’t open e-mails attachments that have strange names or are from people you don’t recognize
![Page 16: Computer Technologystimothy.weebly.com/uploads/6/2/0/9/6209893/presentation_-_viruse… · Infects the system files that your computer uses every time it is turned on Cause widespread](https://reader034.vdocument.in/reader034/viewer/2022050420/5fab467e8eb5dd7d410f3695/html5/thumbnails/16.jpg)
Guymon, M. Pleasant Grove High School. 2003.
Parsons, June Jamrich, and Dan Oja. Computer Concepts. Boston: Course Technology - Thompson Learning, 2002.