2. What Is Virus?
Virus is miscellaneous Application or code
that can be used for damage your system or
hack your system. Work accordingly as on
their property .
4. Worm
The entire virus works on their own property.
Property of the worm is as simple as its
name it generates or Duplicate itself and
slow down or crash your system.
5. Types of Worm
Worm
Boot Sector Command Based Macro Worm
6. Boot Sector Worm
A boot sector virus is one that infects the first
sector, i.e. the boot sector, of a floppy disk or
hard drive. Boot sector viruses can also
infect the MBR.
7. Command Based Worm
Command Base Worm means execute the
system command misplaced and Harm the
system.
8.
9. Macro worm
A Macro virus infects the data file created by
software such as Microsoft Word and
Microsoft Excel. This is a newer type of virus,
and its incidence is increasing. A Macro virus
will only begin to cause problems when the
file containing that Macro is opened.
10. Trojan Virus
A Trojan horse program has the appearance of
having a useful and desired function. While it may
advertise its activity after launching, this information
is not apparent to the user beforehand. Secretly the
program performs other, undesired functions. A
Trojan Horse neither replicates nor copies itself, but
causes damage or compromises the security of the
computer. A Trojan Horse must be sent by someone
or carried by another program and may arrive in the
form of a joke program or software of some sort.
14. Application Virus
Virus which is treated as application or
behave as an application is called Application
Virus. Its Very Difficult to Detect application
virus in the system. Application virus is very
harmful for Operating System.
16. Polymorphic virus
Polymorphic viruses encrypt or encode
themselves in a different way (using different
algorithms and encryption keys) every time
they infect a system.
Examples include: Elkern, Marburg, Satan
Bug, and Tuareg.
17. LOGIC BOMBS
They are not considered viruses because
they do not replicate. They are not even
programs in their own right but rather secret
segments of other programs.
18. Rootkit Virus
A rootkit virus is an undetectable virus which
attempts to allow someone to gain control of
a computer system. The term rootkit comes
from the Linux administrator root user.
19. Hacking
Hacking means bypass the computer
security and enter into the system for a
malicious intent.
Hacking is an act of penetrating computer
systems to gain knowledge about the system
and how it works.
20. Types of Hacker by Application
Phrackers
Crackers
Hacker
21. Phreckers
The Persons who hack
the phone and make long
distance call or message for
Free is Called Phreckers.
John Draper John
Draper makes a long-
distance call for free by
blowing a precise tone into a
telephone that tells the
phone system to open a
line.
22. Crackers
The persons who get into your
system and crash your data or system is
called crackers .Crackers are not interested
in your data. They are interested in just
crashing your system.
23. Hackers
The person who takeover your
system without your system and
steal your data is called Hacker.
In a highly publicized case,
Kevin Mitnick is arrested
(again), this time in Raleigh,
N.C., after he is tracked down
via computer by Tsutomu
Shimomura at the San Diego
Supercomputer Center.
Late 1990s
Hackers break into and deface
federal Web sites, including
the U.S. Department of Justice,
U.S. Air Force, CIA, NASA and
others.
24. Types of Hacker
White hat hacker
Black hat hacker
Grey hat hacker
25. White hat hacker
The Hacker which use Its knowledge for the
providing security to Others and saves their
system and Data from Hacker and Cracker is
Called White hat Hacker.
They are paid For their services.
26. Black hat hacker
The person who hack the system for the
purpose of steal the data from system and
creak the system. They do it for Fun
sometimes this type of persons are called
Black Hat Hacker.
27. Grey hat hacker
The persons who does not about system and
by mistake enters in unauthorized sector or
File is called grey hat Hacker.
28. Conclusion
Important:
Hackers Or Virus can not harm you if you are
aware about your system. hacker or Virus
must need any user event to activate in
System.