The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Kess Flanery, 2019-03-19 14:42:18

yggdrasil Inc. (1)

yggdrasil Inc. (1)

Yggdrasil Inc.

MS. MOORE
4B IDT

KESS FLANERY
PJ SIMON

CHRISTEN WOODS

Objectives

● To Detect Malicious Software
● Identify Different Types of Malicious Software
● To Get Rid of Malicious Software
● Also, To Prevent Malicious Software

History of Malware

The theoretical preliminary work on computer viruses goes back as far as 1949. John von Neumann (1903-1957)
developed the theory of self-reproducing automatons. However the details of the technical implementation were not
conceivable at this time. In November Fred Cohen presents the concept of a virus for the first time in his seminar. For the
implementation of a first functional virus running on UNIX, he needed only 8 hours.

Within a few minutes he had full access rights to all computers. There is not long to wait before other viruses appear in
the wild. Often these are just joke programs, which only annoy the computer user. The Trojan horse Gotcha is truly virulent.
After the EGABTR program starts, which supposedly enables graphical displays, the data on the hard drive are deleted and
"Arf, arf, Gotcha" appears on the screen.

"The Surprise" program, written in BASIC (used the line command "kill *.*") is to ensure that all accessible files were
deleted. At the same time the text "Surprise" was displayed. The source code of a virus for Apple II computers is printed in
the journal "Apples". At the same time, the German hacker scene was getting to grips with viruses. The "BAYERISCHE
HACKERPOST" is the first German magazine to report on computer viruses and Cohen's dissertation.

At the time, the danger associated with computer viruses, relates only to mainframe computers. The danger to personal
computers is not yet taken seriously.Now viruses appear ever more frequently that infect files (at first only .COM files). The
virus "Lehigh" arouses public interest for the first time. Lehigh infects "command.com" and is therefore, from a technical
point of view, the first memory resident virus. After the virus has been copied to 4 diskettes, the data on all data media
contained in the computer are deleted.

Types of Malicious Software

Computer Virus - Created to “self-replicate”, it infects programs and files. Which can destroy valuable data or cause irreparable damages.
Spyware - The name says it all, the software is created to spy on the victim so, it is secretly implanted on the computing device by the hacker. The spyware gathers
information and sends it to the hacker.
Adware - The malicious program is devised to pop-up unwanted advertisements on the victim’s computer without their permission. The pop-ups are uncontrollable
and tend to behave erratically, they usually appear numerous times on the screen and it becomes tedious to close them.
Rootkit - It assists a hacker in accessing or controlling a computing device or network without being detected. They are hard to detect due to the reason that they
become active even before the “operating system” is booted up.
Trojan Horse - A malicious program sneaks into someone’s computer or electronic device and disguised itself as a legitimate program that users will allow and
want to use.
Worm - A malicious code that copies itself and spreads to other computers. The “worm” makes use of the network to spread to other devices. An infected network
or system may run slower and/ or face unexpected mistakes on the “full-swing”. While a computer virus attaches itself to different programs or executable codes,
the worm virus spreads across the networks, this is the notable difference between the two.
Ransomware - As the name suggests, the ransomware is a “ransom-malware”. The ransom virus stops the user from opening files or programs and the virus
removal demands to pay the ransom through certain online payment methods. Once the amount is paid the user can resume using their system.

How To Remove Malware

The best way to remove malware and stay protected from future attacks is to download free antivirus software from
Comodo. It features a proactive mechanism that defends against any kind of malware attack. The Comodo Free Antivirus
software automatically scans your files (when downloaded from the internet).Overall, the Comodo’s antivirus program
protects against any malicious software including zero-day malware.

If this fails you can… :

Enter Safe Mode

Before you do anything, you need to disconnect your PC from the internet, and don’t use it until you’re ready
to clean your PC. This can help prevent the malware from leaking and/or spreading your private data.

Delete temporary Files

Now that you’re in Safe Mode, you’ll want to run a virus scan. But before you do that, delete your temporary
files. Doing this may speed up the virus scanning, free up disk space, and even get rid of some malware. To
use the Disk Cleanup utility.

Download Malware scanner

Now you’re ready to have a malware scanner do its work and fortunately, running a scanner is enough to
remove most standard infections. If you already had an antivirus program active on your computer, you should
use a different scanner for this malware check, since your current antivirus software may not have detected
the malware. Remember, no antivirus program can detect 100 percent of the millions of malware types and
variants.

Run a Scan with Malwarebytes

If you disconnected from the internet for safety reasons when you first suspected that you might be infected,
reconnect to it so you can download, install, and update Malwarebytes; then disconnect from the internet
again before you start the actual scanning. If you can’t access the internet or you can’t download
Malwarebytes on the infected computer, download it on another computer, save it to a USB flash drive, and
take the flash drive to the infected computer.

Fix Your Web Browser

Malware infections can damage Windows system files and other settings. One common malware trait is to
modify your web browser’s homepage to reinfect the PC, display advertisements, prevent browsing, and
generally annoy you.

Recover files if window is corrupt

If you can’t seem to remove the malware or if Windows isn’t working properly, you may have to reinstall
Windows. But before wiping your hard drive, copy all of your files to an external USB or flash drive. If you
check your email with a client program (such as Outlook or Windows Mail), make sure you export your
settings and messages to save them. You should also back up your device drivers with a utility such as
double driver , in case you don’t have the driver discs anymore or don’t want to download them all again.
Remember, you can’t save installed programs. Instead, you’ll have to reinstall the programs from discs or
redownload them.

SUMMARY

Our team here at Yggdrasil Incorporated, learned how to detect malicious software,
different variations of malicious software, how to get rid of malicious software, and
prevent further damage.




Click to View FlipBook Version