Abstract On The Artificial Intelegence
Abstract On The Artificial Intelegence
ON
TROJAN HORSE
Submitted by:D.Sreekanth
Roll no.14FE1A1248
III B.TECH IT I SEMISTER
Department of Information Technology
VIGNANS LARA INSTITUTION OF TECHNOLOGY AND
SCIENCE
CONTENTS
1. ACKNOWLEDGEMENT
2. COMPUTER VIRUSES
3. PREMILINARIES
11
4. TROJAN HORSES
19
24
28
30
36
9. CONCLUSION
37
10. BIBILOGRAPHY
38
COMPUTER VIRUSES
Computer viruses are small software programs that are designed to spread from one
computer to another and to interfere with computer operation.
A virus might corrupt or delete data on your computer, use your e-mail program to spread
itself to other computers, or even erase everything on your hard disk.
Viruses are most easily spread by attachments in e-mail messages or instant messaging
messages. That is why it is essential that you never open e-mail attachments unless you
know who it's from and you are expecting it.
Viruses can be disguised as attachments of funny images, greeting cards, or audio and
video files.
Viruses also spread through downloads on the Internet. They can be hidden in illicit
software or other files or programs you might download.
To help avoid viruses, it's essential that you keep your computer current with the latest
updates and antivirus tools, stay informed about recent threats, and that you follow a few
basic rules when you surf the Internet, download files, and open attachments.
Once a virus is on your computer, its type or the method it used to get there is not as
important as removing it and preventing further infection.
Virus
A program or piece of code that is loaded onto your computer without your knowledge
and runs against your wishes.
Trojan Horse
A destructive program that masquerades as a benign application. Unlike viruses, Trojan
horses do not replicate themselves
Worm
A program or algorithm that replicates itself over a computer network and usually
performs malicious actions
Blended Threat
Blended threats combine the characteristics of viruses, worms, Trojan Horses, and
malicious code with server and Internet vulnerabilities .
Antivirus Program
A utility that searches a hard disk for viruses and removes any that are found.
The internet consists of hundreds of millions of computers distributed around the world.
Millions of people use the internet daily, taking full advantage of the available services at
both personal and professional levels. The internet connectivity among computers on
which the World Wide Web relies, however renders its nodes on easy target for malicious
users who attempt to exhaust their resources or damage the data or create a havoc in the
network. Computer Viruses, especially in recent years, have increased dramatically in
number. One of the most highprofile threats to information integrity is the Computer
Virus.
Surprisingly, PC viruses have been around for two-thirds of the IBM PCs lifetime,
appearing in 1986. With global computing on the rise, computer viruses have had more
visibility in the past few years. In fact, the entertainment industry has helped by
illustrating the effects of viruses in movies such as Independence Day, The Net, and
Sneakers. Along with computer viruses, computer worms are also increasing day by
day. So, there is a need to immunise the internet by creating awareness in the people
about these in detail. In this paper I have explained the basic concepts of viruses and
worms and how they spread.
.
Trojan horse attacks pose one of the most serious threats to computer security. If you
were referred here, you may have not only been attacked but may also be attacking others
unknowingly. This page will teach you how to avoid falling prey to them, and how to
repair the damage if you already did. According to legend, the Greeks won the Trojan war
by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy. In
today's computer world, a Trojan horse is defined as a "malicious, security-breaking
program that is disguised as something benign". For example, you download what
appears to be a movie or music file, but when you click on it, you unleash a dangerous
program that erases your disk, sends your credit card numbers and passwords to a
stranger, or lets that stranger hijack your computer to commit illegal denial of service
attacks like those that have virtually crippled the DALnet IRC network for months on
end.
The following general information applies to all operating systems, but by far most of the
damage is done to/with Windows users due to its vast popularity and many weaknesses.
(Note: Many people use terms like Trojan horse, virus, worm, hacking and cracking all
interchangeably, but they really don't mean the same thing. If you're curious, here's a
quick primer defining and distinguishing them. Let's just say that once you are "infected",
trojans are just as dangerous as viruses and can spread to hurt others just as easily!)
Trojans can be spread in the guise of literally ANYTHING people find desirable, such as
a free game, movie, song, etc. Victims typically downloaded the trojan from a WWW or
FTP archive, got it via peer-to-peer file exchange using IRC/instant messaging/Kazaa
etc., or just carelessly opened some email attachment. Trojans usually do their damage
silently. The first sign of trouble is often when others tell you that you are attacking them
or trying to infect them!
2. Even if the file comes from a friend, you still must be sure what the file is
before opening it, because many trojans will automatically try to spread
themselves to friends in an email address book or on an IRC channel. There is
seldom reason for a friend to send you a file that you didn't ask for. When in
doubt, ask them first, and scan the attachment with a fully updated anti-virus
program.
3. Beware of hidden file extensions! Windows by default hides the last extension of
a file, so that innocuous-looking "susie.jpg" might really be "susie.jpg.exe" - an
executable trojan! To reduce the chances of being tricked, unhide those pesky
extensions.
5. Never blindly type commands that others tell you to type, or go to web
addresses mentioned by strangers, or run pre-fabricated programs or scripts
(not even popular ones). If you do so, you are potentially trusting a stranger with
control over your computer, which can lead to trojan infection or other serious
harm.
6. Don't be lulled into a false sense of security just because you run anti-virus
programs. Those do not protect perfectly against many viruses and trojans, even
when fully up to date. Anti-virus programs should not be your front line of
security, but instead they serve as a backup in case something sneaks onto your
computer.
2. Anti-Virus Software: Some of these can handle most of the well known trojans,
but none are perfect, no matter what their advertising claims. You absolutely
MUST make sure you have the very latest update files for your programs, or else
they will miss the latest trojans. Compared to traditional viruses, today's trojans
evolve much quicker and come in many seemingly innocuous forms, so anti-virus
software is always going to be playing catch up. Also, if they fail to find every
trojan, anti-virus software can give you a false sense of security, such that you go
about your business not realizing that you are still dangerously compromised.
There are many products to choose from, but the following are generally
effective: AVP, PC-cillin, and McAfee VirusScan. All are available for immediate
downloading typically with a 30 day free trial. For a more complete review of all
major anti-virus programs, including specific configuration suggestions for each,
see the HackFix Project's anti-virus software page [all are ext. links]. When you
are done, make sure you've updated Windows with all security patches [ext. link].
3. Anti-Trojan Programs: These programs are the most effective against trojan
horse attacks, because they specialize in trojans instead of general viruses. A
popular choice is The Cleaner, $30 commercial software with a 30 day free trial.
To use it effectively, you must follow hackfix.org's configuration suggestions
[ext. link]. When you are done, make sure you've updated Windows with all
security patches [ext. link], then change all your passwords because they may
have been seen by every "hacker" in the world.
4. IRC Help Channels: If you're the type that needs some hand-holding, you can
find trojan/virus removal help on IRC itself, such as EFnet #dmsetup or DALnet
#NoHack. These experts will try to figure out which trojan(s) you have and offer
you advice on how to fix it. The previous directions were in fact adapted from
advice given by EFnet #dmsetup.
The first steps to protecting your computer are to ensure your operating system (OS) is
up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you
should have anti-virus software installed on your system and ensure you download
updates frequently to ensure your software has the latest fixes for new viruses, worms,
and Trojan horses. Additionally, you want to make sure your anti-virus program has the
capability to scan e-mail and files as they are downloaded from the Internet. This will
help prevent malicious programs from even reaching your computer. You should also
install a firewall as well.
A firewall is a system that prevents unauthorized use and access to your computer. A
firewall can be either hardware or software. Hardware firewalls provide a strong degree
of protection from most forms of attack coming from the outside world and can be
purchased as a stand-alone product or in broadband routers. Unfortunately, when battling
viruses, worms and Trojans, a hardware firewall may be less effective than a software
firewall, as it could possibly ignore embedded worms in out going e-mails and see this as
regular network traffic. For individual home users, the most popular firewall choice is a
software firewall. A good software firewall will protect your computer from outside
attempts to control or gain access your computer, and usually provides additional
protection against the most common Trojan programs or e-mail worms. The downside to
software firewalls is that they will only protect the computer they are installed on, not a
network.
It is important to remember that on its own a firewall is not going to rid you of your
computer virus problems, but when used in conjunction with regular operating system
updates and a good anti-virus scanning software, it will add some extra security and
protection for your computer or network.
CONCLUSION
BIBILOGRAPHY
1) Google.com
2) Symantec.com
3) Wikipedia