1 / 12

Computer Baddies

Jason Long IST 110 Zachary Ziobro 5/31/09. Computer Baddies. Objectives. To Differentiate between different types of computer malware Specifically to differentiate between Trojan Horse’s and Worms

maisie
Télécharger la présentation

Computer Baddies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Jason Long IST 110 Zachary Ziobro 5/31/09 Computer Baddies

  2. Objectives • To Differentiate between different types of computer malware • Specifically to differentiate between Trojan Horse’s and Worms • To give specific examples of aforementioned malware and to give removal instructions for each.

  3. Trojan Horse • A Trojan Horse is aptly named, it functions much like the Trojan horse of mythology. • A Trojan appears to be performing a desirable computer function. • But, in the background it is busy stealing data, destroying data, and performing other unsanctioned activities.

  4. Zlob Trojan • The Zlob Trojan first appeared in 2005 but gained much attention in 2006 • The Zlob Trojan appears to be a needed video component • However, it creates pop-ups, similar to normal windows pop-ups, that auto-download fake anti-virus software

  5. Removal • The Zlob Trojan is removed in the following manner, similar to many trojans. • 1: Disable System Restore, this trojan plants itself in the restore points. • 2: Update your anti-virus • 3: Run a full system scan • 4: Then you must manually delete a number of registry valuesthat the Trojan has created.

  6. Worms • Worms are malicious computer programs that active and attempt to replicate themselves across as many computers a possible. • Worms are different from normal computer viruses in that they do not need a host computer program to operate and spread, they can do it autonomously. Though commonly they attempt to hide other malicious files within themselves.

  7. Koobface • The Koobface worm targets myspace and facebook users. • It attempts to get users to download “a flash player update.” When in reality the link downloads the worm which seeks out credit card numbers. • It then sends messages to facebook and myspace accounts in an attempt to get other users to download it.

  8. Removal • The Koobface worm is removed in the following manner, similar to a number of other worms. • 1: Disable System Restore, this trojan plants itself in the restore points. • 2: Update your anti-virus • 3: Run a full system scan • 4: Then you must manually delete a registry valuethat the worm has created.

  9. Synopsis 1 in 4 computers in the United States is infected with some sort of malware, including Trojans and worms. This Chart illustrates that number.

  10. Conclusion • Trojans are Worms are very insidious types of malware, that are dangerous for your computer and also can scam away your personal information. • You should take measures to protect yourself from these malware with some kind of anti-virus.

  11. Refrences • http://en.wikipedia.org/wiki/Trojan_Horse • http://www.symantec.com/security_response/writeup.jsp?docid=2008-080315-0217-99&tabid=3 • http://www.symantec.com/security_response/writeup.jsp?docid=2005-042316-2917-99&tabid=3 • http://en.wikipedia.org/wiki/Computer_worm • http://www.theinquirer.net/inquirer/news/1044664/four-computers-infected • http://hypertextbook.com/facts/2004/DianeEnnefils.shtml

  12. The End

More Related