A computer virus is a program, script, or macro designed to causedamage, stealpersonalinformation, modifydata, send e-mail, display messages, or some combination of these actions.
When the virus is executed, it spreads by copyingitselfinto or overdata files, programs, or boot sector of a computer's hard drive, or potentially anything else writable.
To help spread an infection the viruswriters use detailed knowledge of security vulnerabilities, zero days, or social engineering to gain access to a host'scomputer
A Trojan horse is a program that appears to be something safe, but in is performing tasks such as giving access to your computer or sending personal information to other computers.
Trojan horses are one of the mostcommonmethods a criminal uses to infect your computer and collect personal information from your computer.
What a worm may refer to
Destructiveself-replicatingprogram containing code capable of gaining access to computers or networks
CD that can be written to and then read from thereafter
Series of games developed by the Team 17 Company
Worm
Destructiveself-replicatingprogram containing code capable of gaining access to computers or networks
First developed by John Shoch and Jon Hupp at Xerox PARC
1978
Once within the computer or network, the worm causes harm by deleting, modifying, distributing, or otherwise manipulatingdata
Robert T. Morris developed the Morris Worm, which became the firstInternetworm
1988
WORM
Write Once Read Many, a CD that can be written to and then read from thereafter
Worms
Series of games developed by the Team 17 Company
ILOVEYOU, sometimes referred to as Love Bug or Love Letter, was a computer worm that attacked tens of millions of Windowspersonal computerson and after5 May 2000local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs".
Messages generated in the Philippines began to spread westwards through corporate email systems.
Because the worm used mailing lists as its source of targets, the messages often appeared to come from acquaintances and were therefore often regarded as "safe" by their victims, providing further incentive to open them.
Only a few users at each site had to access the attachment to generate millions more messages that crippledmail systems and overwrotemillions of files on computers in each successivenetwork.
The malware originated in the Pandacanneighborhood of Manila in the Philippines on May 5, 2000, thereafter following daybreakwestward across the world, moving first to Hong Kong, then to Europe and finally the United States, as employees began their workday that Fridaymorning.
The outbreak was later estimated to have caused US$5.5–8.7billion in damages worldwide, and estimated to cost US$15billion to remove the worm.
Withintendays, over fiftymillioninfections had been reported, and it is estimated that 10% of internet-connectedcomputers in the world had been affected.
Damage cited was mostly the time and effort spent getting rid of the infection and recoveringfiles from backups.
To protect themselves, The Pentagon, CIA, the British Parliament and mostlarge corporations decided to completely shut down their mail systems.
This virus affected over all the computers in the world at that time and was one of the world'smostdangerouscomputer related disasters of all time
ILOVEYOU virus
On 5 May 2000, twoyoungFilipinocomputer programmers named Reonel Ramones (right) and Onel de Guzman (left) became targets of a criminal investigation by agents of the Philippines'National Bureau of Investigation (NBI).
Local Internet service providerSky Internet had reported receiving numerous contacts from European computer users alleging that malware (in the form of the "ILOVEYOU" worm) had been sent via the ISP's servers.
After surveillance and investigation by Darwin Bawasanta of Sky Internet, the NBI traced a frequently appearing telephone number to Ramones'apartment in Manila. His residence was searched and Ramones was arrested and placed on inquestinvestigationbefore the Department of Justice (DOJ).
Onel de Guzman was likewise charged in absentia. At that point, the NBI were unsure what felony or crime would apply.
It was suggested they be charged with violating Republic Act 8484 (the Access Device Regulation Act), a law designed mainly to penalizecredit card fraud, since both used pre-paid (if not stolen) Internet cards to purchase access to ISPs.
Another idea was that they be charged with maliciousmischief, a felony (under the PhilippinesRevisedPenalCode of 1932) involving damage to property.
The drawback here was that one of its elements, aside from damage to property, was intent to damage, and de Guzman had claimed during custodial investigations that he may have unwittingly released the worm.
To show intent, the NBI investigated AMA Computer College, where de Guzman had dropped out at the very end of his final year.
They found that, for his undergraduate thesis, de Guzman had proposed the implementation of a trojan to stealInternetloginpasswords.
This way, he proposed, users would finally be able to afford an Internet connection.
The proposal was rejected by the College of ComputerStudies board, prompting de Guzman to cancel his studies the day beforegraduation.
Since there were no laws in the Philippines against writing malware at the time, both Ramones and de Guzman were released with all charges dropped by state prosecutors.
To address this legislative deficiency, the PhilippineCongress enacted Republic Act No. 8792, otherwise known as the E-CommerceLaw, in July2000, just twomonths after the worm outbreak.
In 2002, the ILOVEYOU virus obtained a world record for being the mostvirulentcomputervirus at the time.
The reason why Onel de Guzman created the worm is because of his rejectedthesisproposal that steals internetloginpasswords to afford an internet connection since it was too expensive that time.
All of the majoroperatingsystems can contract a computer virus.
Whether you use Microsoft Windows, MacOS, or a Linux variant, your computer can be at risk.
You can protect your computer from viruses by installing an antivirusprotectionprogram.