1 / 19


VIRUS HOAX + BOTS. Group Members. Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad. Topics To Be Covered. Virus Definition Kinds of Viruses Virus Hoax Popular Virus Hoaxes Protection Against Virus Hoax Virus Bots How BOTS Work ? Protection Against BOTS. Virus Definition.

Télécharger la présentation


An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.


Presentation Transcript


  2. Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad

  3. Topics To Be Covered • Virus Definition • Kinds of Viruses • Virus Hoax • Popular Virus Hoaxes • Protection Against Virus Hoax • Virus Bots • How BOTS Work ? • Protection Against BOTS

  4. Virus Definition In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.

  5. Kinds of Viruses • Virus Hoax • Malware • Trojan • Spyware • Polymorphic • Macro Viruses • Boot Sector Viruses • Cavity Viruses

  6. Virus Hoax A virus hoax is a false warning about a computer virus. Typically, the warning arrives in an e-mail note or is distributed through a note in a company's internal network.

  7. History of Virus Hoax • The first Internet virus hoax appeared in 1988. Emails were sent out with the subject line stating that a Really Nasty Virus was on its way. • In 1994, the Good Times Virus Hoax managed to scare quite a bit of people. The worst thing is that this same hoax is still floating around today, often under the same name.

  8. Popular Virus Hoaxes • Intel special offer hoax • Internet flower hoax • Happy new year hoax • Windows 98 warning hoax • ICE virus mobile phone hoax

  9. How Virus Hoax Works? • Virus Hoax travel through e-mails. These e-mails contain information e.g. false story circulated that Blue Mountain greeting cards contained a virus, and many people ceased to do business with this company based on a hoax.

  10. Protection Against Virus Hoax • Having knowledge about file origins • Buy Antivirus programs that scan e-mails • Scan e-mail attachments • Report as spam unrecognized sender of virus notification e-mails

  11. Protection Against Virus Hoax • Don’t automatically assume that any email you receive is accurate. • Finally, knowledge is the key to stopping hoaxes and myths. Stay information. Don’t believe everything you read or hear until you check it out with another source. Be a shepherd, not a sheep

  12. Virus Bots "Bot" is derived from the word "robot" and is an automated process that interacts with other network services. Bots often automate tasks and provide information or services that would otherwise be conducted by a human being.

  13. Virus Bots • Bots are scripts that run and accomplish something. • That something can be as benign as crawling websites and indexing information to something awful like an email harvester that will collect addresses to spam. 

  14. History of Bots • Eggdrop was one of the first Bot  developed in 1993. • Shortly after more malicious IRC bots emerged to attack other IRC users/servers

  15. How BOTS Work ? A malicious bot is self-propagating malware designed to infect a host and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices, or "botnet." With a botnet, attackers can launch broad-based, "remote-control," flood-type attacks against their target(s).

  16. Bots • The distinction of Bots is not cleared. • Bots can be both good and bad. • Bots that were created for good purposes turn into surveillance bots. 

  17. Protection Against BOTS • Ensuring that your OS is up to date • Install most recent patches and fixes provided by OS vendor • Have an Antivirus program • Frequently download and install latest antivirus updates • Make sure that your antivirus program can scan e-mails and their attachments • Buy a powerful Firewall program

More Related