SlideShare a Scribd company logo
1 of 29
Virus And Hacking
Gujarat Vidyapith, Ahmedabad




             Nishant A. Barot
What Is Virus?

 Virus  is miscellaneous Application or code
  that can be used for damage your system or
  hack your system. Work accordingly as on
  their property .
Types of Virus

   Worm
   Trojan
   Application Virus
Worm

 The entire virus works on their own property.
 Property of the worm is as simple as its
 name it generates or Duplicate itself and
 slow down or crash your system.
Types of Worm


                   Worm


 Boot Sector   Command Based   Macro Worm
Boot Sector Worm

 A boot sector virus is one that infects the first
 sector, i.e. the boot sector, of a floppy disk or
 hard drive. Boot sector viruses can also
 infect the MBR.
Command Based Worm

 Command Base Worm means execute the
 system command misplaced and Harm the
 system.
Macro worm

 A Macro virus infects the data file created by
 software such as Microsoft Word and
 Microsoft Excel. This is a newer type of virus,
 and its incidence is increasing. A Macro virus
 will only begin to cause problems when the
 file containing that Macro is opened.
Trojan Virus

 A Trojan horse program has the appearance of
 having a useful and desired function. While it may
 advertise its activity after launching, this information
 is not apparent to the user beforehand. Secretly the
 program performs other, undesired functions. A
 Trojan Horse neither replicates nor copies itself, but
 causes damage or compromises the security of the
 computer. A Trojan Horse must be sent by someone
 or carried by another program and may arrive in the
 form of a joke program or software of some sort.
Sub7 Trojan
How It Works?
Application Virus

 Virus which is treated as application or
 behave as an application is called Application
 Virus. Its Very Difficult to Detect application
 virus in the system. Application virus is very
 harmful for Operating System.
Types of Application Virus

 Polymorphic   virus
 Logic Bomb
 Root kits
Polymorphic virus


 Polymorphic viruses encrypt or encode
 themselves in a different way (using different
 algorithms and encryption keys) every time
 they infect a system.
 Examples include: Elkern, Marburg, Satan
 Bug, and Tuareg.
LOGIC BOMBS

 They are not considered viruses because
 they do not replicate. They are not even
 programs in their own right but rather secret
 segments of other programs.
Rootkit Virus


 A rootkit virus is an undetectable virus which
 attempts to allow someone to gain control of
 a computer system. The term rootkit comes
 from the Linux administrator root user.
Hacking

 Hacking means bypass the computer
 security and enter into the system for a
 malicious intent.
 Hacking is an act of penetrating computer
 systems to gain knowledge about the system
 and how it works.
Types of Hacker by Application

 Phrackers
 Crackers
 Hacker
Phreckers

       The Persons who hack
 the phone and make long
 distance call or message for
 Free is Called Phreckers.
       John Draper John
 Draper makes a long-
 distance call for free by
 blowing a precise tone into a
 telephone that tells the
 phone system to open a
 line.
Crackers

           The persons who get into your
 system and crash your data or system is
 called crackers .Crackers are not interested
 in your data. They are interested in just
 crashing your system.
Hackers
The person who takeover your
   system without your system and
   steal your data is called Hacker.
 In a highly publicized case,
   Kevin Mitnick is arrested
   (again), this time in Raleigh,
   N.C., after he is tracked down
   via computer by Tsutomu
   Shimomura at the San Diego
   Supercomputer Center.
 Late 1990s
 Hackers break into and deface
   federal Web sites, including
   the U.S. Department of Justice,
   U.S. Air Force, CIA, NASA and
   others.
Types of Hacker

 White hat hacker
 Black hat hacker
 Grey hat hacker
White hat hacker


 The Hacker which use Its knowledge for the
  providing security to Others and saves their
  system and Data from Hacker and Cracker is
  Called White hat Hacker.
 They are paid For their services.
Black hat hacker

 The person who hack the system for the
 purpose of steal the data from system and
 creak the system. They do it       for Fun
 sometimes this type of persons are called
 Black Hat Hacker.
Grey hat hacker

    The persons who does not about system and
    by mistake enters in unauthorized sector or
    File is called grey hat Hacker.
Conclusion

Important:
  Hackers Or Virus can not harm you if you are
  aware about your system. hacker or Virus
  must need any user event to activate in
  System.
Thank you



    Any Questions ??

More Related Content

What's hot

The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingmissstevenson01
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virusCassidy Lajangang
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus Ranjeta Muniandy
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virusHTS Hosting
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Abdulkarim Zakaria
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacksariifuddin
 

What's hot (20)

The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
MALWARE
MALWAREMALWARE
MALWARE
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Case study
Case studyCase study
Case study
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virus
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Malicious
MaliciousMalicious
Malicious
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Presentation

presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxNORTHCUSTOMS
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.pptNebiyuTeferaShite
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identificationsandeep shergill
 

Similar to Presentation (20)

Dickmaster
DickmasterDickmaster
Dickmaster
 
Malware
MalwareMalware
Malware
 
Security threats
Security threatsSecurity threats
Security threats
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
virus
virusvirus
virus
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppt
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 

Presentation

  • 1. Virus And Hacking Gujarat Vidyapith, Ahmedabad Nishant A. Barot
  • 2. What Is Virus?  Virus is miscellaneous Application or code that can be used for damage your system or hack your system. Work accordingly as on their property .
  • 3. Types of Virus  Worm  Trojan  Application Virus
  • 4. Worm The entire virus works on their own property. Property of the worm is as simple as its name it generates or Duplicate itself and slow down or crash your system.
  • 5. Types of Worm Worm Boot Sector Command Based Macro Worm
  • 6. Boot Sector Worm A boot sector virus is one that infects the first sector, i.e. the boot sector, of a floppy disk or hard drive. Boot sector viruses can also infect the MBR.
  • 7. Command Based Worm Command Base Worm means execute the system command misplaced and Harm the system.
  • 8.
  • 9. Macro worm A Macro virus infects the data file created by software such as Microsoft Word and Microsoft Excel. This is a newer type of virus, and its incidence is increasing. A Macro virus will only begin to cause problems when the file containing that Macro is opened.
  • 10. Trojan Virus A Trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort.
  • 13.
  • 14. Application Virus Virus which is treated as application or behave as an application is called Application Virus. Its Very Difficult to Detect application virus in the system. Application virus is very harmful for Operating System.
  • 15. Types of Application Virus  Polymorphic virus  Logic Bomb  Root kits
  • 16. Polymorphic virus Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
  • 17. LOGIC BOMBS They are not considered viruses because they do not replicate. They are not even programs in their own right but rather secret segments of other programs.
  • 18. Rootkit Virus A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the Linux administrator root user.
  • 19. Hacking Hacking means bypass the computer security and enter into the system for a malicious intent. Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works.
  • 20. Types of Hacker by Application  Phrackers  Crackers  Hacker
  • 21. Phreckers The Persons who hack the phone and make long distance call or message for Free is Called Phreckers. John Draper John Draper makes a long- distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line.
  • 22. Crackers The persons who get into your system and crash your data or system is called crackers .Crackers are not interested in your data. They are interested in just crashing your system.
  • 23. Hackers The person who takeover your system without your system and steal your data is called Hacker.  In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center.  Late 1990s  Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.
  • 24. Types of Hacker  White hat hacker  Black hat hacker  Grey hat hacker
  • 25. White hat hacker  The Hacker which use Its knowledge for the providing security to Others and saves their system and Data from Hacker and Cracker is Called White hat Hacker.  They are paid For their services.
  • 26. Black hat hacker The person who hack the system for the purpose of steal the data from system and creak the system. They do it for Fun sometimes this type of persons are called Black Hat Hacker.
  • 27. Grey hat hacker The persons who does not about system and by mistake enters in unauthorized sector or File is called grey hat Hacker.
  • 28. Conclusion Important: Hackers Or Virus can not harm you if you are aware about your system. hacker or Virus must need any user event to activate in System.
  • 29. Thank you Any Questions ??