Sei sulla pagina 1di 2

I

F

Y
O
U

D
O
N

T

K
N
O
W

T
H
E

S
E
N
D
E
R
,

I
T

M
I
G
H
T

B
E

A

P
R
E
T
E
N
D
E
R

Here are 3 informational websites that
further explains about viruses:

www.homeandlearn.co.uk/BC//bcs5p3.html

This website goes in depth about what a
virus is, types of viruses and how they end
up on many users computers.

www.home.mcafee.com/virusinfo?ctst=1

This website shows you the latest viruses
that have been cautioned as a threat as
well as some in-depth information on vi-
ruses, how to remove them and what dif-
ferent terms mean including spyware,
phishing and virus hoax.

www.allaboutcookies.org/security/computer
-viruses.html

This website explains the anatomy of a vi-
rus, how they work, signs of a detected vi-
rus and how you can protect your computer.
There are many other articles on the web-
site that takes you to more related topics
like Safe Downloads, Anti-Virus Programs
and Avoiding Viruses.

DEADLY
COMPUTER
VIRUSES
BY: LOEWE
WONG
Informational
Websites
"Canada." AntiVirus. N.p., n.d. Web. 20 May 2014. <http://
www.avg.com/ca-en/buy-antivirus>.
"Computer Safety Slogans." Computer Safety Slogans. N.p., n.d.
Web. 20 May 2014. <http://www.thinkslogans.com/
slogans/safety-slogans/computer-safety-slogans/>.
"Download the new avast! 2014." AVAST 2014. N.p., n.d. Web. 20
May 2014. <http://www.avast.com/en-ca/index>.
"HowStuffWorks "Worst Computer Virus 9: ILOVEYOU"."
HowStuffWorks. N.p., n.d. Web. 20 May 2014. <http://
computer.howstuffworks.com/worst-computer-
viruses2.htm>.
"Norton AntiVirus." 2014. N.p., n.d. Web. 20 May 2014.
<http://ca.norton.com/antivirus/>.
"The 5 Worst Computer Viruses | ZDNet." ZDNet. N.p., n.d. Web.
20 May 2014. <http://www.zdnet.com/blog/btl/the-5-
worst-computer-viruses/79014>.
"Top 5 Most Costly Viruses of All Time - TopTenREVIEWS."
TopTenREVIEWS. N.p., n.d. Web. 20 May 2014.
<http://anti-virus-software-review.toptenreviews.com/
top-5-most-costly-viruses-of-all-time-pg5.html>.
WORKS CITED
The MyDoom Virus
NORTON ANTI-VIRUS-
Norton Anti-Virus is a good
software because it has many
features including:
Excellent insight of files and applisca-
tions
Download insight which prevents
downloading files with low reputation
scores
Live 24x7 Threat Monitoring
Identity Safe which stores usernames
safely
If Norton detects a slight threat or unsafe
website/file, it will alert you and make sure
you give permission before it continues.

AVAST ANTI-VIRUS-
Avast anti-virus is a good software because
of its many features including:
Data Shredder; used to permanently
delete unwanted data
Anti Spam; gets rid of spam emails
and phishing
SafeZone; used for secure banking
and payments made online
Avast is excellent because it helps prevents
spam as well as protects your computer with
a high degree of effectiveness and it gives
you 3 options of software.

AVG ANTI-VIRUS-
AVG anti-virus is a good software because
of its many features including:
Anti-virus; blocks viruses and spyware
Firewall; blocks spammers
AVG is a good software for blocking spam-
mers since there is a lot of spam nowadays.
The MyDoom Virus began appearing in
2004. The worm was in the form of an
emailand once you click open the email, it
triggers the worm. The
worm would send itself
to all the email ad-
dresses on the recipi-
ents address book and
place a copy in a shared
folder. It did mainly 2 things; it opened a
back door to your computer , allowing
control and it perpetrated a DDOS
(Direct Denial Of Service) against SCO
groups website.

Sasser & Netsky
The Sasser & Netsky Virus were two
different worms that were created by
17 year old Sven Jaschan in 2004. The
Sasser worm infected computers
through Microsoft Windows while the
Netsky Worm infected the computer
through emails and Windows networks.
The Sasser worm
would look for other
systems and instruct
those to download the
virus. The Netsky
worm spoofed emails and caused a denial
of service (DoS) attack. It was believed
to have caused 25% of all computer vi-
Code Red I & II
The Code Red & Code Red II worms began
appearing in 2001. These worms exploited an
operating system vulnerability. The worms
caused the computer to overload in memory
which meant that certain memory was de-
leted in order to make
space for the virus. The
worm also creates a back-
door to allow control. The
owner can then commit
crimes and access information from the in-
fected computers.
ILOVEYOU
The ILOVEYOU Virus began appearing in
2000 and originated from the Philippines. It
was in the form of an email and disguised
itself as a love letter. Once the attachment
was open, it began replac-
ing files and sending itself
to others. It was one of
the worst worms to have
existed. This worm mainly
did 5 things; it copied it-
self, it added new files, it replaced files, it
sent itself to others and it downloaded a file
and executed it. The ILOVEYOU Virus was
very similar to the Melissa Virus and caused
lots of effective damage because of the
captivating title.
Anti-Viruses

Potrebbero piacerti anche