Preview

the top 5 malwares

Powerful Essays
Open Document
Open Document
3607 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
the top 5 malwares
CHAPTER I
INTRODUCTION
Background of the study The Internet is no longer the safe place it was years ago. Malware, or malicious software, is on the rise and can be found in all corners of the Web. By simply navigating to a website or opening an email, you are at risk infecting your computer. Malware takes the form of code, scripts content and even the legitimate software to obtain access to your computer and the personnel information it houses. Most malware programs will reinstall themselves even after you think they have been removed. They typically hide deep within the Windows registry making them difficult to manually remove. When this occurs, your computer may become so unstable that installing a malware removal tool may be impossible. Based on our research, it is difficult to pinpoint exactly when root kits were first used by malicious hackers who compromising windows machines (after all, the goal of a root kit is to allow the malicious hackers to go undetected for as long as possible), but it has become generally accepted that one of the first individuals to thrust root kit technology for windows into the limelight was Greg Hoglund, when he posted a description of an NT-based root kit to the Phrack online magazine in fall of 1999. This posting not only attempted to describe and further refine the definition of a root kit for windows , but it is also described a simple 4-byte patch that could be made to the window NT kernel to disable access and security checks allowing unprivileged users access to privileged. From there Hoglund went to create what is generally considered to be one of the first true Windows NT kernel-mode root kits and register the domain rootkit.com in March 1999; and he helped create an actively growing online community of people devoted to furthering work in the area of achieving and maintaining stealth. He also teaching classes entitled “Aspects of offensive root kit Technology” that taught students how to develop their own kernel



References: Vermaat, Shelly. 2010. Discovering Computers Fundamentals 5th edition. International Student Edition. p.364 Vermaat, Shelly AP”Computer virus causes havoc on systems worldwide”. The Manila Bulletin. (May 06, 2000). p.329 (6):1-6 AP”Love bug variant wreaks more havoc” AP”FBI warms of new computer virus”. The Philippine Star. (May 28, 2000).p. (303):5 Meyer, Henry “New Internet worm from Russian ISPS?” Nazareno, rocky ‘Love bug’ suspect detained’. The Philippine Daily Inquirer. (May 09, 2000).p.15 (151) Ocampo, Jurep “Cashing in on the Love Bug’, The Philippine Star Ofrin, Roderico H. “Will Y2K bug our health?’. The Philippine Daily Inquirer. (December 13, 1999)15 (5) C-10 Villafuerte, Nelly F Waldman, Simon “Malicious porn virus ‘Melissa’ wreaks havoc in cyberspace”. The Manila Bulletin. (April 13, 1999).p.316 (13): 55-2 Winton, Neil “Y2K bug dormant but huge cost questioned” _____ “Computer-virus threats on the rise “. The Manila Bulletin. (December 05, 1999) XIII (296): 16 Internet

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    For common indications that a virus might be present, Administrators and users need to be on the alert for missing files or programs; unexplained changes to the system’s configuration; unexpected and unexplained displays, messages, or sounds; new files or programs that suddenly appear with no explanation; memory “leaks or unexplained use of disk space; and any other odd behavior of programs or the operating system. If a virus is suspected, a good antivirus program should be installed and run to scan the system for viruses and attempt to remove or quarantine any that are found. in case all these measures fail, all mission-critical or irreplaceable data should be backed up on a regular basis.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    BUS 520 Case 1 1

    • 1885 Words
    • 6 Pages

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly spread out, so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her. The Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees would be more talented towards fixing these problems. Each employee has their own job; some people are managers who are responsible for responding to new security threats, some write research papers, some develop tools that will be used to fight the viruses and even some who find out about the new viruses. Symantec never stops meaning that the labs switch when they are done for the day. Vincent Weafer wants to have a well-defined process for dealing with the viruses that are found every day.…

    • 1885 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Base on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Lab 4

    • 1087 Words
    • 3 Pages

    4. What Trends were tracked when it came to Malicious Code in 2009 by the Symantec Report researched during this lab?…

    • 1087 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    References: Hinde, Stephen. "Spyware: The Spy In The Computer." Computer Fraud & Security 2004.12 (2004): 15-16. Academic Search Premier. Web. 15 June 2013.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Global Crime Analysis

    • 1152 Words
    • 5 Pages

    • Viruses created just for computers sent from the Philippines caused computers to crash with numerous United States government entities for a week long.…

    • 1152 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Pop-up ads invade my time and my life with nonsense and risks. They gather information that sends my personal data out into the vortex of the cyber world for anyone to access, with a few key strokes. Privacy on the internet seems to be non-existent with the developments of ad-based web sites, which use pop-ups, banner ads and video commercials, utilizing surveys and polls to gather census-like data to help fund these ads sites. I do not agree with being forced to provide personal information, such as my income, family head count, gender, religion, etc. in order to fund a service that does not interest me. Some of these invasive ads can crash my computer with just a simple click, or even drop hundreds of viruses onto my system without my knowledge.…

    • 1187 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    A network of compromised machines (bots) controlled by a bot master Responsible for (non-exhaustive list): Large-scale network probing (i.e., scanning activities) Launching Distributed Denial of Service (DDoS) attacks Sending large-scale unsolicited emails (SPAM) Click-fraud campaign Information theft Shift from a for-fun activity towards a profit-oriented business…

    • 11343 Words
    • 46 Pages
    Good Essays
  • Powerful Essays

    human resource management

    • 1706 Words
    • 7 Pages

    The following report outlines the extent of the global spread of Compal Electronic 's listed as 468 of…

    • 1706 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Beside, the whole society seem to be running in a strict mechanism which is facilitated by the computer system. If there appear a problem, this system will collapse rapidly. It can be easily seen many cases of computer hacking which cause great damage to the society and business, for example the virus " love" , originated in the Philippines caused great damage on the global scale in the United States and in south east Asia. The power of the damage is very strong.…

    • 366 Words
    • 2 Pages
    Satisfactory Essays

Related Topics