You are on page 1of 12

Virus and Others

Malware, short for malicious software, consists of programming (code, scripts, active content, and
other software) designed to disrupt or deny operation, gather information that leads to loss of
privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.
A computer worm is a self-replicating malware computer program, which uses a computer network
to send copies of itself to other nodes (computers on the network) and it may do so without any
user intervention. This is due to security shortcomings on the target computer. Unlike a computer
virus, it does not need to attach itself to an existing program. Worms almost always cause at least
some harm to the network, even if only by consuming bandwidth, whereas viruses almost always
corrupt or modify files on a targeted computer.
A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior
to run or install, but (perhaps in addition to the expected function) steals information or harms the
system.
Spyware is a type of malware that can be installed on computers, and which collects small pieces of
information about users without their knowledge. The presence of spyware is typically hidden from
the user, and can be difficult to detect. Sometimes, however, spywares are installed by the owner of
a shared, corporate, or public computer on purpose in order to secretly monitor other users.
Adware, or advertising-supported software, is any software package which automatically plays,
displays, or downloads advertisements to a computer. These advertisements can be in the form of a
pop-up. They may also be in the user interface of the software or on a screen presented to the user
during the installation process. The object of the Adware is to generate revenue for its author.
Adware, by itself, is harmless; however, some adware may come with integrated spyware such as
key loggers.
Scareware comprises several classes of scam software with malicious payloads, or of limited or no
benefit, that are sold to consumers via certain unethical marketing practices. The selling approach
uses social engineering to cause shock, anxiety, or the perception of a threat, generally directed at
an unsuspecting user. Some forms of spyware and adware also use scareware tactics.
Crimeware is a class of malware designed specifically to automate cybercrime. Crimeware is
designed (through social engineering or technical stealth) to perpetrate identity theft in order to
access a computer user's online accounts at financial services companies and online retailers for the
purpose of taking funds from those accounts or completing unauthorized transactions that enrich
the thief controlling the crimeware. Crimeware also often has the intent to export confidential or
sensitive information from a network for financial exploitation.
A rootkit is software that enables continued privileged access to a computer while actively hiding its
presence from administrators by subverting standard operating system functionality or other
applications. The term rootkit is a concatenation of "root" (the traditional name of the privileged
account on Unix operating systems) and the word "kit" (which refers to the software components
that implement the tool).

Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately.
While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses
in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam
in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam,
junk fax transmissions, social networking spam, television advertising and file sharing network spam.
A computer virus is a computer program that can replicate itself and spread from one computer to
another. The term "virus" is also commonly but erroneously used to refer to other types of malware
that do not have the reproductive ability. A true virus can spread from one computer to another
through a network or the Internet, or carried it on a removable medium such as a CD, DVD, or USB
drive. Viruses can increase their chances of spreading to other computers by infecting files on a
network file system or a file system that is accessed by another computer.
Comparisons:
"computer virus" is sometimes used to include all types of malware, even those that do not
have the reproductive ability.
Malware includes computer viruses, computer worms, Trojan horses, most rootkits,
spyware, dishonest adware and other malicious and unwanted software, including true
viruses.
A worm can exploit security vulnerabilities to spread itself automatically to other computers
through networks, while a Trojan horse is a program that appears harmless but hides
malicious functions.
Some viruses and other malware have symptoms noticeable to the computer user, but many
are surreptitious or simply do nothing to call attention to themselves.
Viruses are sometimes confused with worms and Trojan horses, which are technically
different.
Worms and Trojan horses, like viruses, may harm a computer system's data or performance.
Some viruses do nothing beyond reproducing themselves.

Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not
limited to computer viruses, computer worm, trojan horses, spyware and adware. This page talks
about the software used for the prevention and removal of such threats, rather than computer
security implemented by software methods.
Top 20 viruses in the history:
Creeper (1971), the first virus program running on the computer Dec. 10 under the
operating system Tops Ten.

Elk Cloner (1985), the first personal computer virus on the Apple IIe which was created by
ninth graders.
The Internet Worm (1985), written by someone at Cornell University who brought the
Internet
Pakistani Brain (1988), this is the first virus that infects IBM PC. Written by two brothers
from Pakistan and was covered extensively by the media.
Jerusalem Family (1990), about fifty different strains of the virus is believed to have
originated from the University of Jerusalem.
Stoned (1989), is a virus that is widely known in the first decade of the virus. Stoned is the
boot sector / infector. Mbr reboot that will count the number of the original infection and
displays the phrase 'your computer is now stoned'.
Mutation Engine Dark Anger (1990), was actually written in 1988, but was first used in the
early nineties in viruses like Pogue danCoffeeshop.
Micheangelo (1992), a variant of the Stoned, with a destructive payload.
World Concept (1995), macro viruses in Microsoft Word first. Word Concept will issue a
phrase, 'That's enough to PROVE my point' and is present in the second era of computer
viruses.
Cih / Chernobyl (1998), is the most destructive virus ever. Occurred on the 26th of each
month (depending on which version is involved), remove the hard drive, and eliminate the
flash ROM BIOS of the computer user.
Melissa (1999), the first major virus that spreads via email, at the beginning of the era of
Internet viruses.
Lovebug (2001), the most popular e-mail worm ever.
Code Red (2001), named for a high-caffeine drinks, the virus is not spread through the
network email or web page.
Nimda (2000), a virus dubbed 'Swiss Army Knife', used as buffer overflows, email, network
share, and ten other methods to get into the network
Bagel Netsky (2004) the virus is designed to show a fake competition, or battle each other.
Botnets (2004), infected computers that can be repeated in the network to run the spam,
infect new people, and steal data.
Zotob (2005), this worm only affects unpatched Windows 2000 systems, but managed to
take some major media sites, including CNN and the New York Times.
Rootkit (2005), they have become one of the most popular means of stealth in malicious
code. It is used to make other malware invisible to the operating system.

Storm Worm (2007), viruses go through thousands of iterations eventually creating the
largest botnet in the world. At one time it was believed that more than fifteen million
infected machines at the same time, and under the control of the criminal world.
Italian Job (2007), more than malware. Italian Job is a coordinated attack using a packaging
tool kit known as MPack.
Top 10 dangerous malware:
April, 2013

June, 2013

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

11.
12.
13.
14.
15.
16.
17.
18.
19.
20.

Troj/Invo-Zip
W32/Netsky
Mal/EncPk-EI
Troj/Pushdo-Gen
Troj/Agent-HFU
Mal/Iframe-E
Troj/Mdrop-BTV
Troj/Mdrop-BUF
Troj/Agent-HFZ
Troj/Agent-HGT

www.pcclinicsite.com

Troj/Mdrop-DKE
Troj/Sasfis-O
Troj/Keygen-FU
Troj/Zbot-AOY
Troj/Zbot-AOW
W32/Womble-E
Troj/VB-FGD
Troj/FakeAV-DFF
Troj/SWFLdr-W
W32/RorpiaMem-A

www.pcclinicsite.com

September, 2013
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.

Troj/Invo-Zip
W32/Netsky
Mal/EncPk-EI
Troj/Pushdo-Gen
Troj/Agent-HFU
Troj/Mdrop-BTV
Mal/Iframe-E
Troj/Mdrop-BUF
Troj/Agent-HFZ
Troj/Agent-HGT

Source: Sophos

A database administrator's responsibilities can include the following tasks:


Installing and upgrading the database server and application tools, Allocating system storage and
planning future storage requirements for the database system, Modifying the database structure, as
necessary, from information given by application developers, Enrolling users and maintaining system
security, Ensuring compliance with database vendor license agreement, Controlling and monitoring
user access to the database, Monitoring and optimizing the performance of the database, Planning
for backup and recovery of database information, Maintaining archived data, Backing up and
restoring databases, Contacting database vendor for technical support, Generating various reports
by querying from database as per need.

Rapid application development (RAD) is both a general term used to refer to alternatives to
the conventional waterfall model of software development as well as the name for James
Martin's approach to rapid development. In general, RAD approaches to software
development put less emphasis on planning and more emphasis on process. In contrast to
the waterfall model, which calls for rigorously defined specification to be established prior to
entering the development phase, RAD approaches emphasize adaptability and the necessity
of adjusting requirements in response to knowledge gained as the project progresses.
Prototypes are often used in addition to or sometimes even in place of design specifications.

RAD is especially well suited (although not limited to) developing software that is driven by
user interface requirements. Graphical user interface builders are often called rapid
application development tools. Other approaches to rapid development include Agile
methods and the spiral model.

ECRM
CRM focuses on providing and maintaining quality services for customers by effectively
communicating and delivering products, services and solutions to address customer problems.
It includes:
1. Call Handling

2. Sales Tracking
3. Transaction Support
The link between customer satisfaction and the ROI (Return on investment) is the profit for a
company as shown in the following figure.

How you can interact with your customers:


1. Tracking and Analyzing Data
2. Personalization
3. Contact Centers
Tracking and Analyze data:
1. Log file Analysis
2. Data Mining
3. Customer Registration

4. Cookies (A small text file (up to 4KB) created by a Web site that is stored in the
user's computer either temporarily for that session only or permanently on the hard disk
(persistent cookie). Cookies provide a way for the Web site to recognize you and keep track
of your preferences.)
Contact Centers: Frequently Asked Questions (FAQs), E-mail, Online Text Chatting, Speech
Synthesis and Recognition, Voice Communications.

Typical Business touch points for CRM:

Phases of CRM:
Customer acquisition management is the set of methodologies and systems to
manage customer prospects and inquiries generated by a variety of marketing techniques.
... Customer Acquisition Management can be considered the connectivity between advertising
and customer relationship management
Definition: Enhancement
A change or the process of change, brought about, to improve a product or service and to increase
its value, is known as enhancement. A variety of enhancements can be used in business to increase
the efficiency and effectiveness of different processes and functionalities.
Here, we will focus on some of the important enhancements, commonly used in the industry.
Enhancing customer experience:
Better the customer experience, more is the customers loyalty towards a brand. Enhancing the
experience of existing customers is preferred to finding new customers, because of the costeffectiveness and profitability factors. Some strategies employed for the enhancement of customers
experience are:
Organize delivery schedule to deliver the products on time, as per the requirements of the
customers
Problems should be identified and resolved as quick as possible
Building relationships, on a personal level, with the key customers
Using technology, wherever possible, to improve the service quality offered to the customers
Giving adequate customer service training to the staff on a regular basis
Use social media as:

Run promotions and contests

Reply to feedback online

Create relevant and engaging posts

Customer retention refers to the activities and actions companies and organizations take to reduce
the number of customer defections. The goal of customer retention programs is to help companies
retain as many customers as possible, often through customer loyalty and brand loyalty initiatives.
Continuum from mass marketing to relationship marketing:
Mass Marketing

Relationship Marketing

Discrete transactions

Continuing transactions

Short-term emphasis

Long-term emphasis

Acquisition focus

Retention focus

Share of market

Share of mind

Strategies for Web Site Development


In-house Development
Outsourcing
Adv of in house:If successful it can fulfill the exact demand, Greater control over the system, Secured
Disadv of in house: Requires expertise, Requires proper hardware, software, networking
components and also adequate office space, Time consuming

Levels of outsourcing:
Appointing a company to develop the entire system
Buying a pre-packaged solution
Outsourcing the front-end application
Outsourcing the database
Using the ISP for connecting to internet
E-mail handling and response
Electronic payment system

Adv of out sourcing:


No need of in-house expertise
Reduced risk of failure
Savings in terms of time and money
Dis adv:
Loss of control
Poor service level agreement
Conflict between management
Server: A server is a host on the internet that manages network resources and fulfills requests from
clients. There are many types of servers1. Web servers
2. E-mail servers
3. Database servers
4. File servers
5. Print servers
DNS (Domain Name System): It serves as the e-commerce stores virtual location on the web such as
http:// www.philanthropy.com
As it is difficult to remember the IP address of a website. Sun Microsystems developed DNS. It is the
letter equivalent of IP address.
It is much easier to remember DNS address than the corresponding IP address. For example the IP
address of http:// www.philanthropy.com is 198.108.95.145
Domain Name registration: Domain names should be registered through registrars accredited by
ICANN (Internet Corporation for Assigned Names and Numbers).
The web host

Provides the website owner a high bandwidth connection to the internet

Stores all of the website content on its servers, which process all of the information
trafficked to and from the website

Selecting an alternative hosting service

Free Hosting: For very simple websites, such as personal homepages.

Shared Server Hosting: Many websites are placed on the same server. It is the cheapest
alternative for small businesses.

Dedicated Server Hosting: A website is allocated to its own dedicated server. It is suitable
for larger websites.

In-house Hosting: Only for those companies which have adequate resources such as
dedicated personnel, power backup, security, maintenance, and redundancy.

E-commerce Hosting

Factors to Evaluate when Selecting a Hosting Service:


Functionality
Reliability and Bandwidth
Security
Backup and disaster recovery
Cost
The Seven Design Elements of Customer Interface
The 7C framework: Context , Content , Community
,Customization,Communication,Connection,Commerce
Context: Sites layout and design,Content: Text, picture, sound and video,Community: User- to - user
communication,Customization: Ability to tailor the website,Communication: Two way
communication between site and user,Connection: How the site is linked to other sites,Commerce:
Capabilities to enable commercial transactions.

Web content development tips: Stay fresh,Be relevant and unique.Make it easy to find.Serve a
smorgasbord of content.Deliver content everywhere.

SDLC:
Whats important in application development?
Three key components of an IS application are
The Data
The way Data Flows
The Processing Logic to manipulate data and produce information for decision
making
Systems Development Life Cycle (SDLC):
Traditional methodology for developing, maintaining, and replacing information systems
Phases in SDLC include
Planning
Analysis
Design
Implementation
Maintenance

You might also like