Second term e-learning note



Download 0.59 Mb.
Page22/32
Date03.02.2024
Size0.59 Mb.
#63415
1   ...   18   19   20   21   22   23   24   25   ...   32
2ND DATA PROCESSING ss3
Affiliate Marketing Introduction
Trojans or Trojan Horses

Trojans do not reproduce themselves by infecting other files nor can they replicate like worm but they will actually do damage once installed in the system. Sometimes they appear to be useful software but when it is activated the result can be annoying ( adding silly active desktop icons), or deletion of files and information on the system. Hacker utilizes viruses or Trojans to gain access to your computer, to steal data, invade privacy or use computer for their evil purposes. e.g: Netbus, subseven, Beast, Zeus, Flashback Trojan, ProRat, ZeroAccess etc.

  • LOGIC BOMBS

They are not really a virus parse because they lack the ability of replicating themselves. They can camouflage segments of other programs, despite the fact that they are not programs. Their aim is to destroy data on the computer once certain conditions have been met.

  • Adware and spyware

They usually come together with other programs that seem to be harmless. These programs are not as dangerous as virus but also collect data of your computer and send it “home” which is in most cases a company uses this information to spam you with advertising E-mails. Spyware can track internet searching habits and possibly redirect web site activity. e.g. The red sheriff and BESS.


Examples of Computer Virus
Macro viruses Nuclear.DMV.Word concept
Boot viruses Form, Disk Killer, Michelangelo, Stone virus
Active X and JAVA viruses
Stealth viruses Frodo, Joshi, whale
Program viruses Cascade, Sunday
Polymorphic viruses- cascade, pround, EvilVirus 101, phoenix, stimulate, involuntary
Multipartite viruses, Tequila, invader, Flip


GENERAL EVALUATION

  1. Define computer virus.

  2. State five types of computer virus.

  3. Mention six examples of computer virus.




Download 0.59 Mb.

Share with your friends:
1   ...   18   19   20   21   22   23   24   25   ...   32




The database is protected by copyright ©ininet.org 2024
send message

    Main page