You are on page 1of 2

1. What is computer virus?

A computer virus is a small software program that can spread from one computer system to another and cause interferences with
computer operations. A computer virus has the capacity to corrupt or to delete data on your computer and it can use an e-mail
program to spread the virus to other email addresses in your online address book. In the worst case scenario, it can even delete
everything on your hard disk.

2. Give 10 most destructive computer viruses?


 Stuxnet (2009-2010) – This was the first virus that caused damage in the real world as opposed to virtual world. Stuxnet
caused physical problems such as damaging machinery at a uranium enrichment facility in Natanz. Simply put, the virus
affected large ‘washing machine like’ industrial systems that were used to enrich uranium. The virus caused them to spin
out of control and ultimately self-destruct.

 Conficker Virus (2009) – This virus created one of the biggest botnet army’s that was responsible for stealing private
information and because of its size it was difficult to stop. A group of experts got together purely because they wanted to
stop this virus, which infected millions of users in its prime. There still remains much confusion as to what the Conficker
Virus was actually meant to accomplish. Many experts have analyzed the virus and have yet to come to a conclusion on its
purpose. The virus still infects a large amount of computers.

 Agent.btz (2008) – This virus was spread through infected flash drives that installed malware to steal private information.
This caused the Pentagon to ban all thumb drives, and agent.btz was thought to have been the creation of foreign spies,
however has never been confirmed.

 Zeus (2007) – This has become one of the top tools for criminals who are looking to steal personal information. It obtains
passwords, addresses, date of birth, and social security numbers which release a plethora of information. This virus is still a
threat today.

 PoisonIvy (2005) – PoisonIvy is a remote access Trojan that is able to secretly control an infected computer from a different
location. Once the virus has been installed, the criminal can control the computer, manipulating content and accessing the
computer’s speaker and webcam to record audio and video.

 MyDoom (2004) – This was the fastest spreading worm we have seen yet. The virus would overload the computer with
information from multiple systems and was spread through infected emails that appeared to have bounced. Once the email
was opened, the malware downloaded itself and accessed the email’s address book and began infecting the users’ friends
and family.

 Fizzer (2003) – Fizzer was the first worm created for a financial gain. Although not as fast as some other worms, Fizzer
established enough harm that Microsoft offered $250,000 in exchange for information that would lead to the creators
capture.

 Slammer (2003) – Slammer was an internet worm that disrupted services, both private and public. It transmitted data over
the internet and attacked a few key services, bringing them to a complete stop. Some of those services were Bank of
America ATM’s, 911 emergency response system located in Washington and a nuclear plant in Ohio.

 Code Red (2001) – Although this worm may seem rather insignificant in this day and age, at the time of its creation it
caused a great disturbance. This worm used a flaw in Microsoft Internet Information Server to disfigure or take down some
websites. This virus was responsible for taking down whitehouse.gov, which caused all other government agencies to
temporarily remove their websites.

 Love Letter / I LOVE YOU (2000) – This virus was spread through malicious emails that featured the subject ‘I Love You.’
This spread rapidly as people were expecting to open an email from a surprise admirer however in reality they released
malicious software onto their computer upon opening. Once the malware was on the computer in overwrote image files
and became the first socially engineered computer virus.
OPERATING SYSTEM
 An operating system (OS) is system software that manages computer
hardware and software resources and provides common services for computer programs. All computer
programs, excluding firmware, require an operating system to function.

TYPES

 Ubuntu
Ubuntu is based on a version of the Linux operating system known as Debian GNU/Linux. Its main benefit is that it's free and
open source. This means users can alter the code as they see fit. Ubuntu also stands out because it's updated once every six
months, unlike other open source programs that have no strict upgrade schedule. Most Ubuntu-compatible software is also free
and available in on-line software "repositories." Users can try Ubuntu on their PC using the program's "Live CD" mode. This
allows you to run the system without actually installing it on your computer. Because Ubuntu programs are less ubiquitous than
those for more well-known systems, users may need to do some research before finding the software solutions they need.
 Android
Android is a "mobile" operating system maintained by the Open Handset Alliance, a group of companies and organizations that
contribute to the system's development under the management of Google Inc. The system is an "open standard," meaning that
an entire community of developers can alter the software, not just Google. Android comes pre-installed on smartphones and
tablet PCs for which it was designed. As of the date of publication, all four major smartphone carriers -- Verizon, T-Mobile,
Sprint and AT&T -- have Android devices available. A variety of manufacturers also make Android-compatible devices. One of
the main benefits of the system's open source status is that developers can create different versions of its basic programs,
allowing users greater freedom to customize their mobile devices.
 Mac OS X
While a version of Mac OS X comes pre-installed on all Apple Macintosh computers, users must pay if they wish to use newer
versions when they become available. The system is not open source, so only Apple developers have the ability to legitimately
make alterations or improvements to its code. It differs from other computer operating systems in that it only works on Apple
computers. Its key feature is its usability. The most recent version as of the date of publication includes a "resume" feature that
re-opens applications in the same state they were in when you last closed them. It also includes a "Mission Control" feature,
which allows you to see all of your open files at a glance.
 IOS
IOS is Apple's mobile operating system. It runs on the company's iPod, iPhone and iPad devices. Like Mac OS X, it can only be
used on Apple's mobile devices. One advantage of iOS is that more applications are available for it than for any other mobile
operating system. As of summer 2011, it has approximately 400,000 to Android's 300,000. This increases the chances that users
will find the type of app they're looking for. The system's key features include multitasking support, which allows users to run
multiple apps simultaneously, and FaceTime, a video chat program that comes pre-installed on iOS devices.
 Windows
Windows is an operating system owned and operated by Microsoft. It differs from open source systems in that only Microsoft
has the ability to make changes to the code. However, it also differs from Mac OS X in that it can be installed on a variety of
different computers from a host of competing manufacturers, offering the user more freedom of choice when it comes to
hardware. According to Net Market Share, Windows is the most widely used operating system. The latest version as of the date
of publication includes touchscreen support, which combines the usability of a touchscreen tablet with the power of a desktop
computer. It also features "Play To" and "Remote Media Streaming," which allow you to play media from your computer on
other devices in its vicinity and to access your media when you're away from your computer.

You might also like