Computer viruses

Disponível somente no TrabalhosFeitos
  • Páginas : 6 (1369 palavras )
  • Download(s) : 0
  • Publicado : 15 de março de 2012
Ler documento completo
Amostra do texto
Universidade Presbiteriana Mackenzie

COMPUTER VIRUSES: TO WORRY OR NOT TO WORRY ABOUT

Turma 01G

Universidade Presbiteriana Mackenzie

Computer viruses:
to worry or not to worry about




Trabalho exigido pela
Disciplina de INGLÊS
TÉCNICO I, orientado
pela Prof.ª Ms.
Mônica V. de Alice
Caio Henrique Conz Lazareti
Luis Guilherme Segretti
Fernando Lopes DiehlMarco Antonio Tavares Silva
Rafael Cantoni Augusto
Rafael Gustavo Furlan




São Paulo, Junho de 2009
Index

Introduction...........................................................................................................................4
Definition of Viruses, Trojan horses and Worms……………………………………………………………....4
Timeline of notable Viruses, Trojan horses andWorms…………………………………………………….4
Definition of Hacker, Wormer and Cracker..……………………………………………………………………..5
Notable People………………………………………………………………………………………………………………….6
Social Engineering……………………………………………………………………………………………………………..6
Conclusion…………………………………………………………………………………………………………………………8
Bibliography……………………………………………………………………………………………………………………..9

Introduction
Computer viruses have received a lot of attention lately becauseof the huge number of PCs that people own, and since we have signs of computer viruses, companies that offer security services have been growing up. But, before bumping into this world of replication and file infection, where social engineers claim to have the best antivirus program in the world, some things need to be cleared like: What’s a virus? What’s the difference between viruses, Trojanhorses and worms? What are hackers and wormers? And what’s social engineering?

Definition of Viruses, Trojan horses and Worms
The first thing we have to understand is that a virus is a programming technique that falls in the realm of “Trojan Horses”. All viruses are Trojan Horses, but very few Trojan Horses can be called a virus. So, a Trojan horse can be defined as a generic term describing aset of computer instructions purposely hidden inside a program, and this horse tells a program to do things people won’t expect it to do. The great difference between the Trojan horse and the virus is that viruses have the power to spread to other computers by secretly “infecting” other programs with a copy of itself. If it doesn’t meet this definition, then it isn’t a virus.
The worm is similarto the Trojan horse, with a screaming difference: Worms can bypass the defense. An example of worm is an unauthorized program designed to spread itself by exploiting a bug in a network software package. Such programs can also contain a virus that is activated when it reaches the computer.

Timeline of notable Viruses, Trojan horses and Worms
In the 70’s, there were mainly two virus that wereheard of. The first one was the Creeper virus. It was an experimental self-replicating program written by Bob Thomas at BBN in 1971. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The second wasn’t truly a virus; it was a “fork bomb”, a program that multiplies copies itself into the computer bya recursive function, where it calls itself for opening.
The first large-scale computer virus outbreak in history was done by Richard Skrenta in 1981. His virus, named Elk Cloner, with its design combined with the public ignorance about malware at the time, led him to that “prize”.
In October 1987, the Jerusalem virus was unleashed, and it had the power to destroy every executable file in theinfected PC upon every occurrence of Friday the 13th (except Friday 13 November 1987, making its first trigger date May 13, 1988).
In 1990, Mark Washburn developed the first family of polymorphic viruses: the Chameleon family, having the 1260 as the first virus of this family to be released, and in 1995 the first macro virus was created, which attacked Microsoft Word...
tracking img