Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Computer Viruses Not Welcome Visitors

Computer Viruses Not Welcome Visitors

Ratings: (0)|Views: 1|Likes:
Published by tuscany5993
You will learn how to protect your computer from unwelcome visitors and viruses.
You will learn how to protect your computer from unwelcome visitors and viruses.

More info:

Published by: tuscany5993 on Jun 12, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/12/2011

pdf

text

original

 
Computer Viruses that Come a Callin’
 
Every day new computer viruses are created to annoy us and to wreck havoc on ourcomputer systems. Below are ten viruses currently cited as being the most prevalent interms of being seen the most or in their ability to potentially cause damage. New virusesare created daily. This is by no means an all inclusive list. The best thing you can do is toremain vigilant, keep your anti-virus software updated, and stay aware of the currentcomputer virus threats. 
Virus: Trojan.Lodear
A Trojan horse that attempts to download remote files. It will inject a .dll file into theEXPLORER.EXE process causing system instability.
 Virus: W32.Beagle.CO@mm
A mass-mailing worm that lowers security settings. It can delete security-related registrysub keys and may block access to security-related websites.
 Virus: Backdoor.Zagaban
A Trojan horse that allows the compromised computer to be used as a covert proxy andwhich may degrade network performance. 
Virus:W32/Netsky-P
A mass-mailing worm which spreads by emailing itself to addresses produced from fileson the local drives. 
Virus: W32/Mytob-GH
A mass-mailing worm and IRC backdoor Trojan for the Windows platform. Messagessent by this worm will have the subject chosen randomly from a list including titles suchas: Notice of account limitation, Email Account Suspension, Security measures,Members Support, Important Notification. 
Virus: W32/Mytob-EX
A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH.W32/Mytob-EX runs continuously in the background, providing a backdoor server whichallows a remote intruder to gain access and control over the computer via IRC channels.This virus spreads by sending itself to email attachments harvested from your emailaddresses.
Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER
This family of worm variations
 
possesses similar characteristics in terms of what they cando. They are mass-mailing worms with backdoor functionality that can be controlledthrough the Internet Relay Chat (IRC) network. Additionally, they can spread throughemail and through various operating system vulnerabilities such as the LSASS(MS04-011).

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->