Preview

Top 20 Most Active Viruses

Good Essays
Open Document
Open Document
2089 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Top 20 Most Active Viruses
Top 20 Most Active Viruses

Conficker.C
• Conficker.C is a worm. Designed to spread by exploiting a vulnerability in the Windows Server Service which allows remote code execution. It is the vulnerability MS08-067. • It disables the following services: • Windows update, disabling the Windows updates. • BITS (Background Intelligent Transfer Service), which is a service to transfer Windows files. • Error reporting service, which allows to send Microsoft information about errors occurring in the operating system, Windows components and programs. • It modifies the security policies of the user accounts. In order to access the user accounts, it uses the dictionary of weak passwords. • It prevents the user and the computer from connecting to the websites that are security related preventing anti-virus programs from updating.

Spy.YK
• Spy.YK is a trojan. It allows hackers to get into and carry out dangerous actions in affected computers, such as capturing screenshots, stealing personal data, etc. • It does not spread automatically using its own means. It needs the attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.

• A virus that also has the characteristics of a worm. • It inserts its code in other files and programs. It has damaging effects on the affected computer. • It spreads and affects other computers by creating copies of itself. • It does not spread automatically using its own means. It needs the attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.

Vobfus.gen

Downloader.MDW
• It is a trojan. Allows hackers to get

You May Also Find These Documents Helpful

  • Satisfactory Essays

    SQL Slammer worm caused a denial of service on Internet host and slowed down general internet traffic. On January 25, 2003 it spread rapidly and infected 75,000 victims in ten minutes. The worm exploited the buffer overflow and would generate random IP addresses, send itself out to those addresses. If one of those addresses happens to belong to a host that is running an unpatched copy of Microsoft SQL Server Resolution Service, the host becomes infected and sprays the Internet with more copies of the worm.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |E-mail worms – A worm that spreads through the user of the user’s email account(s). |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    network sniffing capabilities, was installed that captured the keystrokes of the user, thus obtaining user…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Internet worms – A worm that self-replicates and self-distributes copies of itself to its host network.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    For common indications that a virus might be present, Administrators and users need to be on the alert for missing files or programs; unexplained changes to the system’s configuration; unexpected and unexplained displays, messages, or sounds; new files or programs that suddenly appear with no explanation; memory “leaks or unexplained use of disk space; and any other odd behavior of programs or the operating system. If a virus is suspected, a good antivirus program should be installed and run to scan the system for viruses and attempt to remove or quarantine any that are found. in case all these measures fail, all mission-critical or irreplaceable data should be backed up on a regular basis.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Better Essays

    A piece of unwanted computer software or code introduced into another program, attached to a document or exists on its own, for malicious purposes.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Virus Quiz

    • 602 Words
    • 3 Pages

    A virus may not kill a host cell but may become inactive for a period…

    • 602 Words
    • 3 Pages
    Good Essays
  • Good Essays

    * This worm spreads itself by sending an instant message to people in your contact list. When they receive the connection the worm establishes a connection to the remote computer to move itself on the clean remote computer.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays