Abstract
Abstract
Submitted
by :
AMAN
KUMAR
Roll no :
0701216177
7th sem ,
CSE
CONTENTS
• Introduction
• Infectants
• Working phases
• Viruses – what & how they infect
• Good Viruses and Anti-Virus Software
• Approaches to detect viruses
• Developing an effective strategy
• Lines of defence
• Anti-Virus Research
• Conclusions
INTRODUCTION
In the today’s world , if there is one word that can strike fear
in the heart of any computer user , especially the one who
accesses the internet is the “ VIRUS”.
These generate so much fear in the cyber world that the
news of a new virus is often spreading faster than the virus
itself . So the companies produces various Anti-Virus
softwares for the computer industry to protect the devices
from various infectants.
INFECTANTS
These are the malicious programs that causes damage to
the system or computer. There are different types of
infectants and knowing those differences , can help us to
better protect our system from their often damaging effects.
TYPES OF INFECTANTS
antivirus
program
A utility that
searches a
hard disk for
viruses and
removes any
that are
found.
A Trojan Horse is full of as much trickery as the mythological
Trojan Horse it was named after. The Trojan Horse, at first
glance will appear to be useful software but will actually do
damage once installed or run on your computer. Those on the
receiving end of a Trojan Horse are usually tricked into opening
them because they appear to be receiving legitimate software
or files from a legitimate source. When a Trojan is activated on
your computer, the results can vary. Some Trojans are designed
to be more annoying than malicious (like changing your
desktop, adding silly active desktop icons) or they can cause
serious damage by deleting files and destroying information on
your system. Trojans are also known to create a backdoor on
your computer that gives malicious users access to your
system, possibly allowing confidential or personal information to
be compromised. Unlike viruses and worms, Trojans do not
reproduce by infecting other files nor do they self-replicate.
.exe file
• A .exe file is the most common type of program in the PC world.
Though they are not as compact as .com programs, they provide
a great deal of functionality and flexibility in terms of what they
can accomplish. Viruses that can infect .exe files generally have
a better chance of surviving because there are more places in an
.exe file for a virus to hide. All .exe files begin with a header
that tells the program how large it is an how much memory it
needs to allocate. After the header there is a blank space,
usually about 512 bytes long, that contains nothing but blank
characters. This space is a perfect place for a virus to hide itself.
Since the virus is simply filling a blank space in the file, the size
of the infected file does not change, making the infection much
more inconspicuous .
GOOD VIRUSES :
To prevent infection and overcome all these viruses , its very
important to develop an Antivirus Strategy . The most important
weapon in our Antivirus arsenal is a clean , write-protected bootable
system diskette . No virus scanner or cleaner of any quality will run
if there is virus in memory because more programs can be infected
by the virus as scanner opens the files to check them . Clean
backup of hard drive is the Effective defence against virus .
ANTI-VIRUS SOFTWARE :
It is a software that detects and removes viruses
APPROACHES TO DETECT
VIRUSES
Here Buster is the scientist who checks which virus is
affecting the concerned file in one of the 3 methods :-
DEVELOPING AN EFFECTIVE
ANTIVIRUS STRATEGY :
Anyone who does a lot of downloading, or accesses diskettes from the
outside world on a regular basis should develop an antivirus strategy.
The most important weapon in your antivirus arsenal is a clean, write-
protected bootable system diskette. Booting from a clean write-
protected diskette is the only way to start up your system without any
viruses in memory. No virus scanner/cleaner of any quality will run if
there is a virus in memory because more programs can be infected by
the virus as the scanner opens the files to check them. This diskette
should also contain a record of your hard disk's master boot record,
partition table, and your computer's CMOS data. Most antivirus
packages contain utilities that can store this information for you.
Lastly, this diskette should contain your favorite scanning/cleaning
software because a virus may have infected this program on your hard
drive. Running it from a clean diskette will ensure that you're not
spreading the virus further.
LINES OF DEFENCE
I personally use three antivirus packages concurrently. The
first is viruscan from Mcafee Associates. I use it mainly
because when my company started to become virus-
conscious we wanted to get a comprehensive package to
guard against them. Everybody we knew seemed to use
Mcafee so that's what we bought. I must tell you that after
seeing what some other products can do I am not that
impressed with Mcafee anymore. One reason is that Mcafee
tends to mis-diagnose some viruses. This is a problem
because if your computer is infected with virus A, but Mcafee
thinks it's virus B, it will attempt to disinfect a virus that's
not there, which can badly mess things up on your system. I
will say that if you are a casual computer user, Mcafee is
probably all you'll ever need because it is easy to use and it
does a good job disinfecting most common viruses. I still use
Mcafee just because it's there, but I never take its word as
gospel.
freenet.victoria.bc.ca
Log in as "guest" and type "go virus" from the main menu.
LISTSERV@LEHIGH.EDU
A listing of additional sources of virus and antivirus
information, including the virus-l/comp.virus FAQ, can be
found at the end of this document.
Myths & Pointers
fdisk /mbr
And what about the Good News or Good Times virus? It's a
big hoax!!! Every few months a wide-spread panic arises on
the internet when the news of a horrific virus that is hidden
in email is forwarded and reforwarded through cyberspace.
The warning is basically the same every time. A seemingly
reliable source, such as the FCC or IBM has issued a
statement that if you were to download a message
containing the subject line, "good news", or, "good times"
your whole hard drive would be erased. The truth is that the
concept of infecting your computer by reading the text of an
email message is an impossibility, because no virus can hide
itself in an email message. This is because messages are in
text format, and there is no way to catch a virus or harm
your system in any way by reading text. A binary program (a
designation that includes Word documents and Excel
spreadsheets) can not be hidden in a plain text message.
Even if you received a text message containing a binary
program encoded by NetSend, you are still safe. This is
because when you type, "text" to produce the encoded
program, the program is not executed. You still have to type
the program's name to run it. Of course, if you receive a
program like this you should scan it for viruses after
decoding it, but before running it. The same rule applies to
programs sent to you as attachments--scan them before
running them. In short, if you receive an email message with
no attachments, it does not contain a virus, no matter what
the subject line reads. If it does contain an attachment, scan
the attachment for viruses before running the program,
opening the Word document in Word, or the Excel
spreadsheet in Excel.
Tool Box
Virus Removal Tools
Download the latest virus removal tools from McAfee
Security. These tools automatically perform virus detection
and removal tasks for specific viruses. If your system is
infected, the tools will remove the virus and repair any
damage.
Virus Map
Get a real-time, bird’s-eye view of where the latest viruses
are infecting computers worldwide.
Regional Virus Info
Find out which viruses are infecting PCs in your
neighborhood and around the world.
Virus Calendar
Be prepared for the next scheduled virus payloads strike
with the help of this comprehensive calendar.
TSR
TSR stands for terminate, but stay resident. A TSR program will
remain resident in your computer's memory after it executes.
Programs such as memory managers, disk caching software, and
device drivers reserve a section of your computer's memory so
that they can continue to perform their function for the whole
time your system is turned on. Many viruses, (particularly boot
sector viruses), will stay resident in memory so they can spread
to other disks and programs much faster and more
transparently. In addition, once a virus becomes memory-
resident it is much harder to detect because it can monitor every
action taken by your computer and cover its tracks accordingly
ANTI-VIRUS RESEARCH
• IBM has been preparing a Defence against Fast
spreading viruses
• It has built the First Commertial – grade immune
system that can find , analyze and cure previously
unknown viruses
• Analysis centre can analyze most viruses
automatically . It has greater speed and precision than
the human analysts can
• Runs the virus in the virtual environment
• End – to – End security of the system allows the safe
submission of virus samples and ensures authentication
of new virus definitions
CONCLUSIONS
• Viruses have stimulated scientific thinking and ideas
• Some ideas can also be exported to medical science
• All about information gave scope for further
improvement & research
• Good Viruses can also be put to constructive use
• Each user must realize the great danger posed by
viruses
• Steps should be taken to prevent infection & incase of
infection , proper & safe ways should be taken to deal
with the infection
THANK YOU
REFERENCES :
• www.wikipediaonline.com
• www.alta_vista.com
• www.seminarsonly.com