39
MY LAPTOP UNDER THE MICROSCOPE

My Laptop Under the Microscobe

Embed Size (px)

DESCRIPTION

How do computer virus and bug look like ?

Citation preview

Page 1: My Laptop Under the Microscobe

MY LAPTOP UNDER THE MICROSCOPE

Page 2: My Laptop Under the Microscobe
Page 3: My Laptop Under the Microscobe
Page 4: My Laptop Under the Microscobe
Page 5: My Laptop Under the Microscobe

MY LAPTOP UNDER THE MICROSCOPE

Page 6: My Laptop Under the Microscobe

>COMPUTER VIRUS

A computer virus is the little thing that has reproductive ability. It lives inside your computer and it can spread from one computer to another through air or through your fingers.

Page 7: My Laptop Under the Microscobe

>COMPUTER VIRUS

0o o

Page 8: My Laptop Under the Microscobe
Page 9: My Laptop Under the Microscobe

01/ ZeusZeus is the go-to tool for many of today’s cyber criminals and is readily available for sale in the cyber crime underworld. It can be used to pilfer passwords as well as files, helping to create a literal underground economy for compromised identities that can be bought and sold for as little 50 cents

Page 10: My Laptop Under the Microscobe

02/ mydoomMyDoom muscled its way into the malware world in 2004, quickly infecting some one million computers and launching a massive distributed denial of service attack, which overwhelms a target by flooding it with information from multiple systems.

Page 11: My Laptop Under the Microscobe
Page 12: My Laptop Under the Microscobe
Page 13: My Laptop Under the Microscobe

03/ StuxnetThe arrival of Stuxnet was like a cartoon villain come to life: it was the first computer virus designed specifically to cause damage in the real, as opposed to virtual, world. While previous malware programs may have caused secondary physical problems,

Page 14: My Laptop Under the Microscobe

04/ agent.btzThis piece of malware’s claim to fame is that it temporarily forced the Pentagon to issue a blanket ban on thumb drives and even contributed to the creation of an entirely new military department, U.S. Cyber Command. Agent.btz spreads through infected thumb drives, installing malware that steals data.

Page 15: My Laptop Under the Microscobe
Page 16: My Laptop Under the Microscobe
Page 17: My Laptop Under the Microscobe

04/ WelchiaWelchia remains one of the most unusual worms in history, as it was designed to help instead of hurt. A response to the Blaster worm, Welchia infected computers, cleared out the Blaster infestation, and then deleted itself.

Page 18: My Laptop Under the Microscobe

06/ Leap=AIn 2006, the Leap-A virus, also known as Oompa-A, debuted. It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list. The message contains a corrupted file that appears to be an innocent JPEG image.

Page 19: My Laptop Under the Microscobe
Page 20: My Laptop Under the Microscobe
Page 21: My Laptop Under the Microscobe

07/ The KlezThe Klez is a computer Virus which spreads through email having one or couple of attached files which spreads like fire in the system and start damaging files again and again. Sometimes the antivirus is not able to fix it.

Page 22: My Laptop Under the Microscobe

08/ MellisaThe name looks very attractive and interesting but in reality it was one of the earliest mass mailing virus which was created by David L Smith. He created Melissa in the memory of a famous lap dancer who he liked. When the pc is affected by Melissa virus, it mainly targets Microsoft office files

Page 23: My Laptop Under the Microscobe
Page 24: My Laptop Under the Microscobe

>COMPUTER _BUGS

Computer bugs are tiny little which get stuck inside and your computer. They bite and cause a mess inside. They also like to fly around and crash your softwares. Look careful inside your computer because they may make a nest in there already, you may need to call Pest Control

Page 25: My Laptop Under the Microscobe

>COMPUTER _BUGS

0D D>

Page 26: My Laptop Under the Microscobe
Page 27: My Laptop Under the Microscobe

01/ Soviet Gas ExplosionCIA operatives (allegedly) introduced a bug into the Canadian built system that would pass Soviet inspection but fail when in operation.

The largest non-nuclear explosion in the planet’s history. And a new-found respect of the CIA.

Page 28: My Laptop Under the Microscobe

02/ Ariane 5 Flight 501In 1996, Europe’s newest unmanned satellite-launching rocket, the Ariane 5, reused working software from its predecessor, the Ariane 4. After 36.7 seconds into its maiden launch, the self destruct safety mechanism was activated due to the computer failures, and the spacecraft disintegrated in a spectacular fireball.

Page 29: My Laptop Under the Microscobe
Page 30: My Laptop Under the Microscobe
Page 31: My Laptop Under the Microscobe

03/ The Ping of DeathA lack of error handling in the IP fragmentation reassembly code makes it possible to crash many Windows, Macintosh, and Unix operating systems by sending a malformed “ping” packet from anywhere on the Internet.

Page 32: My Laptop Under the Microscobe

04/ Buffer overflowThe first internet worm infects between 2,000 and 6,000 computers in less than a day by taking advantage of a buffer overflow. The specific code is a function in the standard input/output library routine called gets() designed to get a line of text over the network. Unfortunately, gets() has no provision to limit its input, and an overly large input allows the worm to take over any machine to which it can connect.

Page 33: My Laptop Under the Microscobe
Page 34: My Laptop Under the Microscobe
Page 35: My Laptop Under the Microscobe

05/ Mariner I space probeA bug in the flight software for the Mariner 1 causes the rocket to divert from its intended path on launch. Mission control destroys the rocket over the Atlantic Ocean. The investigation into the accident discovers that a formula written on paper in pencil was improperly transcribed into computer code, causing the computer to miscalculate the rocket’s trajectory.

Page 36: My Laptop Under the Microscobe

06/ Patriot Missile BugDuring the first Gulf War, an American Patriot Missile system was deployed to protect US Troops, allies, and Saudi and Israeli civilians from Iraqi SCUD missile attacks. A software rounding error in the one of the early versions of the system incorrectly calculated the time, causing it to ignore some of the incoming targets.

Page 37: My Laptop Under the Microscobe
Page 38: My Laptop Under the Microscobe
Page 39: My Laptop Under the Microscobe