[go: up one dir, main page]

0% found this document useful (0 votes)
55 views6 pages

Virus, Worms and Vaccines

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 6

Computer Virus, worms and Vaccines

1. Worms :
Worms are similar to a virus but it does not modify the program. It replicates
itself more and more to cause slow down the computer system. Worms can
be controlled by remote. The main objective of worms is to eat the system
resources. The WannaCry ransomware worm in 2000 exploits the Windows
Server Message Block (SMBv1) which is a resource-sharing protocol.
2. Virus :
A virus is a malicious executable code attached to another executable file
that can be harmless or can modify or delete data. When the computer
program runs attached with a virus it performs some action such as deleting
a file from the computer system. Viruses can’t be controlled by remote. The
ILOVEYOU virus spreads through email attachments.

Sr.No.Basis of WORMS VIRUS


Comparison
1. Definition A Worm is a form of malware A Virus is a malicious
that replicates itself and can executable code
spread to different computers attached to another
via Network. executable file which can
be harmless or can
modify or delete data.
2. Objective The main objective of worms is The main objective of
to eat the system resources. It viruses is to modify the
consumes system resources information.
such as memory and
bandwidth and made the
system slow in speed to such
an extent that it stops
responding.
3. Host It doesn’t need a host to It requires a host is
replicate from one computer to needed for spreading.
another.
4. Harmful It is less harmful as compared. It is more harmful.
5. Detection and Worms can be detected and Antivirus software is
Protection removed by the Antivirus and used for protection
firewall. against viruses.
6. Controlled by Worms can be controlled by Viruses can’t be
remote. controlled by remote.
7. Execution Worms are executed via Viruses are executed via
weaknesses in the system. executable files.
8. Comes from Worms generally comes from Viruses generally comes
the downloaded files or from the shared or
through a network connection. downloaded files.
9. Symptoms  Hampering computer Pop-up windows linking
performance by slowing down to malicious websites
it  Hampering computer
 Automatic opening and performance by slowing
running of programs down it
 Sending of emails without After booting, starting of
your knowledge unknown programs.
 Affected the performance of Passwords get changed
web browser without your knowledge
 Error messages concerning
to system and operating
system
10. Prevention  Keep your operating system Installation of Antivirus
and system in updated state software
 Avoid clicking on links from Never open email
untrusted or unknown attachments
websites  Avoid usage of pirated
 Avoid opening emails from software
unknown sources  Keep your operating
 Use antivirus software and a system updated
firewall  Keep your browser
updated as old versions
are vulnerable to linking
to malicious websites
11. Types Internet worms, Instant Boot sector virus, Direct
messaging worms, Email Action virus,
worms, File sharing worms, Polymorphic virus,
Internet relay chat (IRC) Macro virus, Overwrite
worms are different types of virus, File Infector virus
worms. are different types of
viruses
12. Examples Examples of worms include Examples of viruses
Morris worm, storm worm, etc. include Creeper, Blaster,
Slammer, etc.
13. Interface It does not need human action It needs human action to
to replicate. replicate.
14. Speed Its spreading speed is faster. Its spreading speed is
slower as compared to
worms.

Some Known Viruses & Worms


A program positioned into another program is called a virus though it is due
to the host program any program gets activated, and it copies itself and
opens it out to others through floppy transfer. Every time the user will run the
malicious application a virus will infect the information Or program Or data
and the virus take advantage & copy itself.
Some Popular Viruses :
1. Central Processing Unit-Brain Virus –
At a disposable price in January 1986 Amjad and Basit the two Pakistani
brothers created this program this is done to discourage people from
purchasing unauthorized software as this virus damaged various devices
and this virus was popularly known for its cause. Well it’s used was to
stay in a foot sector of a disc or drive, or it could be near to zero sectors
and if you will boot with a malicious floppy or drive the virus will enter into
the machine’s memory.
2. Brandow Virus –
Only the Apple Macintosh devices are harmed by the virus not much
destruction was reported because of this virus. On any capable PCs or
IBM this was not noticed, but we can see a displayed message of peace
on the monitor which killed itself. More information is not available on this
virus.
3. Scores Affecting Macintosh –
Only on Apple Macintosh pc, this virus turned into additionally located this
virus turned into first located in March 1987 if it affected then specifically
packages inside Electronic Data Systems Corp. In this virus now no
longer a great deal of statistics is available.
4. Cascade –
The compatibles, IBM, PCs are attacked via way of means of Cascade
virus. After the virus picked them off in alphabetical order the letter at the
display screen can be visible losing vertically right all the way down to the
backside of display screen. We can name it a parasitic virus because it
attaches itself to different applications and receives activated while the
host software is executed. When this system is copied it receives a copy
to different PCs.
5. Logic Bomb Dos Virus –
This virus was designed to activate solely on Friday, found in 1987 at
Hebrew University Jerusalem in January thirteen and delete all files dead
thereon day and date so infects COM and EXE files to break the data.
6. Data crime or Columbus or October the 13th virus –
In October 1989 information wrongdoing infection is like Jerusalem and
was programmed to assault this track 0 of PC hard plate is obliterated
and the substance of circle and delivered unintelligible. This infection
harms the hard circle as it enters the EXE and COM documents a cure
called V checker and was created by the American Computer Society. In
March 1989 this infection was found and harm revealed after October 13
was insignificant and the Royal National Institute for the Blind, UK was the
most exceedingly awful hit and much information was accounted for to be
lost.
7. Win32/Patched (Patch EXE) –
Like a Patch COM virus this attack only EXE files as effect both COM and
EXE files.
8. Stoned –
In October 1989 this infection was found in Bangalore it lives in the boot
area of tainted floppy. The infection enters the hard palate and a few
areas’ designation tables (FAT) are harmed when the PC is booted
through the contaminated floppy. At whatever point the PC is booted from
the hard plate as regular the infection duplicates itself onto both areas of
the floppy diskette in drive An and spread to another PC this sort of
infection won’t enter the hard circle except if it is booted through the
tainted floppy plate.
9. Bomb –
This sort of infection is known as rationale bomb or delayed bomb an
occasion set off through 3 out of a program that makes program crash
whenever characterized as a bomb for the most part bomb is a product
embedded in a program by an individual working in the organization any
disappointed developer can make a program to erase all the organization
documents on the off chance that he gets and sign that I might be sacked
or moved somewhere else
10. Bell Labs Virus –
Each time another variant of the working frameworks is made a compiler
program which makes an interpretation of a software engineer’s
guidelines into to numbers that a PC can peruse it has been adjusted, so
it inserted a covered up hidden entryway this is changed the frameworks
notwithstanding ordinary clients secret phrase it would perceive
mysterious passwords known just two one people.
Some better-known Worms :
As we all know worms could be a self-propagating program that damages,
and it doesn’t need any host to activated somebody must insert a worm
directly into a network of interconnected computers dare messages may be
sent from one to a different and information files and program exchange as
an example network where everything is shared and has its own files
program business enterprise system in the hard disc.
1. XerPARC –
Xerox town center in 1980 John Shock devised a worm wriggled through
giant ADP system searching for machines that weren’t being employed
and harnessing them to assist an outsized downside. This might take over
a complete system.
2. Individual Worm –
During this, a worm whose sole purpose is to remain alive wherever it
runs no substantive computer program because the CO Monster worm at
university was one like it would show a screen Pine Tree States sage-like
“I am a worm kill me if you can!”.
3. Terror Clock Worm –
One equipped with electronic equipment a worm that reaches out through
the network to an outgoing terminal and places wakeup calls to an
inventory of users.
4. Gladiator Worms –
During this, the article is to put in writing a worm program which will
replicate itself quicker than another worm program bit and eat it this sort
of worm was given by Bill Buckley and James Mauser developed Core
Wars this one was alive at the finish wins a number of the win programs
have chromosomes consisting of solely four lines of code. Longer genes
cannot execute as quickly as short ones therefore I tend to induce
weedless out.

Vaccines
Vaccines or Antivirus software is a computer program that detects, prevents,
and takes action to disarm or remove malicious software programs, such as
viruses and worms. New viruses, worms, and other threats are created by
cyber terrorists and discovered every day. So updating antivirus software is
periodically mandatory. List of some top Anti Virus Programs which are very
useful to users:

Norton AntiVirus – Norton AntiVirus is the most popular and secure virus
scanner for checking boot sector records at startup. The live update feature
automatically installs new updates for regular protection against viruses.

Quick Heal- It is designed to protect computers from malware such as


viruses, spyware, trojans, worms, rootkits, and other malicious software. It
provides real-time protection from potential threats and can scan, detect, and
remove viruses from your computer. It also offers a firewall to protect system
from unauthorized access. Additionally, Quick Heal can also scan and block
potentially malicious websites. It also includes anti-spam and parental control
features to help keep system safe and secure.

AVG Free Edition – AVG Resident Shield provides real-time protection


executions of files and programs. It features a smart e-mail scanner, virus
updates and virus vault for secure handling of the files which are infected by
viruses. The base version for windows is Free for private and non-
commercial use.

McAfee VirusScan for Windows: This antivirus package detects all virus
types, including Word and Excel macros; boot-sector infections; and file,
multipartite, stealth, polymorphic, and encrypted viruses. Kaspersky Anti-
Virus Personal Pro – It is a commonly used virus protection solution offering
full protection against macroviruses and unknown viruses.
ESET NOD32 Antivirus – ESET NOD32 Anti-virus is available as an anti-
virus for small businesses, individuals and for large networks.

avast! Home Edition – A free antivirus solution for scanning disk, CDs, and
E-mail.

Panda Antivirus Platinum – It is a complete virus protection package for


home and business users. It comes with an easy installation and automatic
protection from latest viruses. Avira - Windows and Linux anti virus, firewall,
anti spam, recovery solutions against malware infection

You might also like