Nt1310 Unit 1 Virus And 1 Worm

Superior Essays
Please research one virus and one worm, and write a maximum 2-page single-spaced paper explaining what each of them is, what they do, what their impact was, what the mechanics of how they work are (the technical aspect), and how were they stopped.
Computer virus: It is a piece of code which is loaded onto the computer without the user knowledge and runs itself. When this code is executed, it makes a copy of itself and inserts this copy into another computer programs, data files of the hard drive. Such small virus also steals hard disk space and CPU time , corrupts data. This is dangerous because it will make use of available memory and brings system to halt.
Brain Virus:
Brain virus is the first computer virus which was released in January
…show more content…
After the worm is downloaded, the worm on the infecting computer will close the TFTP server. If blaster finds an active network connection, it will begin to look for new machines to infect. The worm sleeps for 20 second intervals and awakens to look for new machines to infect.
• The worms executable, MSBlast.exe contains two messages. The first reads: I just want to say LOVE YOU SAN!!
• This message gave the worm the alternative name of Love san. The second reads: Billy Gates why do you make this possible ? Stop making money and fix your software.
• This is a message to Bill Gates, the co-founder of Microsoft and the target of the worm.
The worm also creates the following registry entry so that it is launched every time Windows starts:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ windows auto update=msblast.exe
Blaster uses two methods for searching IP addresses to infect new machines. Blasters cannot spread to the windows server 2003, Unpatched computers running these OS may crash as a result of the worms will attempt to exploit them. Blaster worm uses the affected computers as a propagation medium to spread virus to other machines. The Blaster worm caused system to reboot every 60 seconds.
The following Microsoft operating systems are affected by Blaster

Related Documents

  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    It is one of the key features to test penetration included in Kali. Furthermore, Kali includes Armitage, which is a Metasploit tool which allows a team to share sessions, hosts, event logs and most importantly share access to their exploited hosts. Bots, which can be written using a language called Cortana, can also be utilized to further assist in exploitation using Armitage. Armitage will also check and see which exploits are viable and effective on your targeted machine. Once the initial exploitation is completed, you will be able to perform greater degrees of exploitation such as logging keystrokes and accessing the file system.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Win32/Sogou is a dangerous Trojan Downloader that invades the windows based PCs without getting permission from the user. This malicious application spreads through social media websites and can destroy a computer in a way that it becomes useless permanently. This tricky Trojan application is developed by the hackers to get remote access of the data and system folders in computer. Dalhousie University dataset contains both botnet and benign traces.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Rundll32 Unit 2

    • 304 Words
    • 2 Pages

    Masked rundll32.exe virus removal from syswow64 location has to be fixed. A virus can completely corrupt system registry. System file can also have other errors also like file missing, file location path missing etc. and that can lead critical problems. Windows Host Process (Rundll32) has stopped working in the computer.…

    • 304 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable.…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The hacker can also gain access to the files saved on the hard drive and share them with others in…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Black Death Facts

    • 1288 Words
    • 6 Pages

    Black Death -The bacterial disease that atrophied Europe between 1347-1351, taking an equitably greater amount of life than any other known epidemic or war up to that point. The Black Death is broadly thought to have been the result of infection by the bacterium Yersinia pestis. 5 Facts: • Many doctors believed that bad smells could force out the plague. Therefore, treatments for the disease included applying feces and urine, and other substances that were much more likely to spread disease than to cure it. • Y. Pestis utilized the flea by blocking its digestive tract.…

    • 1288 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Abstract Smallpox is a highly infectious disease caused by the Variola virus. This report explores the taxonomic classification, “life cycle”, and mechanism of replication of this pathogen, as well as discusses the virulence and treatment options for an infected human host. This member of the Orthopoxvirus genus is extremely virulent, and has a fatality rate of nearly 30%. While this virus only attacks a human host, similar members of the Voxviridae family produce similar infections in animals.…

    • 854 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Also its fight against a huge group of spyware programs and stop its work, such as those that operate to capture images of the surface of your desk or use…

    • 253 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    It holds true that browser errors can certainly prove to be a lot maddening and the same might show-up as a mysterious error report. This is indeed considered to be a lot worrisome as because the same prevents the webpage from getting displayed properly. The browser help online proves to be of bare aid when inadvertent forms of crashes keep happening. For a novice system user, it becomes a lot more difficult to predict as to what webpages might trigger the error. So; the still better alternative is simply to opt for the browser fix tool.…

    • 328 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Win32 Zlob Research Paper

    • 326 Words
    • 2 Pages

    It gets into your system via spam mails or unauthorized programs and websites. Once it gets into your system, it starts attracting other similar type of viruses and malware and then all these viruses launch a collective attack on the system, virtually turning…

    • 326 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    The Movie Contagion

    • 1312 Words
    • 6 Pages

    Epidemiology Exercise 1. Briefly describe the natural history of the disease in the outbreak; its progression from onset (exposure) to resolution. According to the Center for Disease Control and Prevention (2012b), the natural history of the disease refers to the course of a disease from its onset until resolution or death occurs. For the purpose of this question, I will discuss the natural of history of the disease focusing on patient zero.…

    • 1312 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Purpose: Explore the spread of a communicable disease using a simulation. Question: What is the effect of immunity on the rate at which a disease spreads? Hypothesis: If a higher percentage of people are immune to a disease, then the disease will spread more slowly, because fewer people will be able to contract it or pass it on.…

    • 446 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. Guinea worm disease is likely to become the first parasitic disease to be globally eradicated. 2. A female Guinea Worm can grow up to three feet! 3.…

    • 60 Words
    • 1 Pages
    Decent Essays