0% found this document useful (0 votes)
46 views5 pages

What Is A Virus

1. A virus is a small program that can destroy files and computer systems even when not actively running. 2. Viruses are typically delivered as attachments to emails from spammers or hackers and use email addresses from contacts lists to appear more legitimate. 3. To identify virus attachments, be wary of small files with certain file extensions like .scr or .exe that claim to be videos or pictures. Subject lines may also contain unusual words to attract clicks. Always have up-to-date antivirus software installed.

Uploaded by

G
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views5 pages

What Is A Virus

1. A virus is a small program that can destroy files and computer systems even when not actively running. 2. Viruses are typically delivered as attachments to emails from spammers or hackers and use email addresses from contacts lists to appear more legitimate. 3. To identify virus attachments, be wary of small files with certain file extensions like .scr or .exe that claim to be videos or pictures. Subject lines may also contain unusual words to attract clicks. Always have up-to-date antivirus software installed.

Uploaded by

G
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

WHAT IS A VIRUS?

by admin —

Explanation about viruses

1. Virus is a little program that its activity can destruct/destroy some files and a
computer system. If you don't open this program, it still inactive and could not destroy
anything.

2.       The virus program brought to you by an email as attachment, sent by spammer or 
known as cracker. It has a server itself (virus server).  Virus attachment cannot go into
another email then become attachment of that another email, such as an email was sent by
user (netter), members of group, moderator etc. It must be brought to you by email virus
itself, that's why, we called them VIRUS EMAIL or VIRUS SPAM.

3.       VIRUS EMAIL would be sent by any email address of any account, because some
crackers always search through over the internet zone and catch emails addresses on
boxes FROM, TO: and CC: of sending email. They also search to found out addresses
book from mailbox of users anywhere, So that why the virus email looks like was sent
by our friend, our member friends, our moderator etc...and might be able even by email
address yourself.

4.       To identification of virus attachment:

it has a small size (181-285 KB) it has extension file name as the following list (don't open it)

*.scr 
*.pif  
*.zip 
*.HQX
*.MQX
*.mim
*.bat
*.exe
*.com
*.txt
*.doc
*.clp
*.lhz
*.rhz

And so on..Also the sender often use a fake name like this HotMovie.MPEG__________scr.
Actually that file is a virus file with extension .scr  NOTE: Be aware, safe to be safe is that
just open only *.JPG , *.JPG, *.JPG files.

5) By having experience you could identified an email virus from their SUBJECT,
most of them contains an amazing statement or unusual word,  such as the following
examples (don't open it):
Hi :)
Pictures.
Weah ^_^ :))
Hokki=)
ello!=))
Hello -:))
Hey, dude, it's me ^_^
Will you be my valentine?
See you to night.
I love you with all my heart.
access Mpeg
Re:your text
Re:Text message
Re:Msg reply
Re:Is that your document?
Re:Hot Movie(MPEG)
Re:Information...
Re;Important info
Re:This is your photos!:)

and more, ... then be aware that since currently year there is a new one , a virus type of
warm was able to copy your sending email included your name, email address and
subject line repeatedly, and that copied email then consist of virus attachment attached by
sender. And then this emails are send for flying over the internet zone.  If mailbox of
someone have ever infected by this virus, when they sent an email to you or to any group or
anyone else, so you or any group or anyone else said above will receive that virus copied
emails, usually every time and repeatedly the same email. This is difference from spam
email that sent by personal address which no virus attachment, but many, many unexpected
email from your friends or or anyone else or advertising sender...
There for users internet must be ready and must have good software anti virus, anti spy-ware,
anti spam even though they must still to delete some unexpected emails they received every
day.. When you received virus email, delete it straight away. Don't open it otherwise the
virus sender will see your account is still active. 

NOTE:
If you write an email, don't write subject line with words look like virus email or your email
will be deleted by recipients who understand about email virus.

BEWARE it's dangerous.

*** If one of your files has an infected virus, it could infect other files and then all files
in your hard drive when you opened or accessed it.

*** Don't open or reply virus email otherwise the sender will see the account still
active..
Trojan horse (computing)
From Wikipedia, the free encyclopedia
Jump to: navigation, search

Beast, a Windows-based backdoor trojan horse

A Trojan horse (sometimes shortened to trojan[ 1]), is non-self-replicating malware that


n

appears to perform a desirable function for the user but instead facilitates unauthorized access
to the user's computer system. The term is derived from the Trojan Horse story in Greek
mythology.

Contents
[hide]

 1 Purpose and operation


 2 Installation and distribution
 3 Removal
 4 Current use
 5 See also
 6 Notes
 7 References
 8 External links

[edit] Purpose and operation

Trojan horses are designed to allow a hacker remote access to a target computer system. Once
a Trojan horse has been installed on a target computer system, it is possible for a hacker to
access it remotely and perform various operations. The operations that a hacker can perform
are limited by user privileges on the target computer system and the design of the Trojan
horse.

Operations that could be performed by a hacker on a target computer system include:


 Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed
Denial-of-service (DDoS) attacks)
 Data theft (e.g. passwords, credit card information, etc.)
 Installation of software (including other malware)
 Downloading or uploading of files
 Modification or deletion of files
 Keystroke logging
 Viewing the user's screen
 Wasting computer storage space

Trojan horses require interaction with a hacker to fulfill their purpose, though the hacker need
not be the individual responsible for distributing the Trojan horse. In fact, it is possible for
hackers to scan computers on a network using a port scanner in the hope of finding one with a
Trojan horse installed, that the hacker can then use to control the target computer.[1]

A trojan differs from a virus in that only a file specifically designed to carry it can do so.

[edit] Installation and distribution

Trojan horses can be installed through the following methods:

 Software downloads (i.e. a Trojan horse included as part of a software application


downloaded from a file sharing network)
 Websites containing executable content (i.e. a Trojan horse in the form of an ActiveX
control)
 Email attachments
 Application exploits (i.e. flaws in a web browser, media player, messaging client, or other
software that can be exploited to allow installation of a Trojan horse)

Also, there have been reports of compilers that are themselves Trojan horses.[citation needed] While
compiling code to executable form, they include code that causes the output executable to
become a Trojan horse.

[edit] Removal

Antivirus software is designed to detect and delete Trojan horses, as well as preventing them
from ever being installed. Although it is possible to remove a Trojan horse manually, it
requires a full understanding of how that particular Trojan horse operates. In addition, if a
Trojan horse has possibly been used by a hacker to access a computer system, it will be
difficult to know what damage has been done and what other problems have been introduced.
In situations where the security of the computer system is critical, it is advisable to simply
erase all data from the hard disk and reinstall the operating system and required software.

[edit] Current use

Due to the growing popularity of botnets among hackers, Trojan horses are becoming more
common. According to a survey conducted by BitDefender from January to June 2009,
"Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected
in the wild".[2]

You might also like