Project Report
Project Report
Project Report
A computer virus is a computer program that can copy itself and infect a computer.
The term virus is also commonly but erroneously used to refer to other types of malware,
including but not limited to adware and spyware programs that do not have the
reproductive ability. A true virus can spread from one computer to another when its host
is taken to the target computer for instance because a user sent it over a network or the
Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB
drive.
Viruses can increase their chances of spreading to other computers by infecting files
on a network file system or a file system that is accessed by another computer.
As stated above, the term computer virus is sometimes used as a catch-all phrase to
include all types of malware, even those that do not have the reproductive ability.
Malware includes computer viruses, computer worms, Trojan horses, most rootkits,
spyware, dishonest adware and other malicious and unwanted software, including true
viruses. Viruses are sometimes confused with worms and Trojan horses, which are
technically different. A worm can exploit security vulnerabilities to spread itself
automatically to other computers through networks, while a Trojan horse is a program
that appears harmless but hides malicious functions. Worms and Trojan horses, like
viruses, may harm a computer system's data or performance. Some viruses and other
malware have symptoms noticeable to the computer user, but many are surreptitious or
simply do nothing to call attention to themselves. Some viruses do nothing beyond
reproducing themselves.
age 1
TYPE OF VIRUSES
Trojan Horse:
A trojan horse program has the appearance of having a useful and desired function.
While it may advertise its activity after launching, this information is not apparent to the
user beforehand. Secretly the program performs other, undesired functions. A Trojan
Horse neither replicates nor copies itself, but causes damage or compromises the security
of the computer. A Trojan Horse must be sent by someone or carried by another program
and may arrive in the form of a joke program or software of some sort. The malicious
functionality of a Trojan Horse may be anything undesirable for a computer user,
including data destruction or compromising a system by providing a means for another
computer to gain access, thus bypassing normal access controls.
Worms:
A worm is a program that makes and facilitates the distribution of copies of itself; for
example, from one disk drive to another, or by copying itself using email or another
transport mechanism. The worm may do damage and compromise the security of the
computer. It may arrive via exploitation of a system vulnerability or by clicking on an
infected e-mail.
Bootsector Virus:
A virus which attaches itself to the first part of the hard disk that is read by the
computer upon bootup. These are normally spread by floppy disks.
Macro Virus:
Macro viruses are viruses that use another application's macro programming language
to distribute themselves. They infect documents such as MS Word or MS Excel and are
typically spread to other similar documents.
age 2
Signature based detection is the most common method. To identify viruses and
other malware, antivirus software compares the contents of a file to a dictionary
of virus signatures. Because viruses can embed themselves in existing files, the
entire file is searched, not just as a whole, but also in pieces.
MyDoom used infected computers to flood the SCO software company's website with
data, making the site unusable.
Let other users hack your computer.
Some viruses place backdoor trojans on the computer, allowing the virus writer to
connect to your computer and use it for their own purposes.
Corrupt data.
The compatable virus makes changes to the data in excel spreadsheets.
Delete data.
The sircam worm may attempt to delete or overwrite the hard disk on a certain day.
Emailing itself will search for anything fitting an email address abc.com and then
send itself there.
Infecting a clean file without the owners knowledge lots of viruses can be spread
this way, by people downloading files from safe sources that have been hacked by
people intent on spreading viruses.
age 4
age 5
REFERENCES
age 6
http://en.wikipedia.org/wiki/Computer_virus
http://www.webopedia.com/TERM/V/virus.html
http://www.ust.hk/itsc/antivirus/general/whatis.html