10
Stepes of a computer infection

Stepes of a computer infection. An infected.EXE file arrives as an email attachment

Embed Size (px)

Citation preview

Page 1: Stepes of a computer infection. An infected.EXE file arrives as an email attachment

Stepes of a computer infection

Page 2: Stepes of a computer infection. An infected.EXE file arrives as an email attachment

An infected .EXE file arrives as an email

attachment.

Page 3: Stepes of a computer infection. An infected.EXE file arrives as an email attachment

The infected .exe file is opened.

Page 4: Stepes of a computer infection. An infected.EXE file arrives as an email attachment

Your machine is infected.

Page 5: Stepes of a computer infection. An infected.EXE file arrives as an email attachment

Virus spreads in the Windows system.

Page 6: Stepes of a computer infection. An infected.EXE file arrives as an email attachment

Virus is copied when the system starts.

This copy is infected.

Page 7: Stepes of a computer infection. An infected.EXE file arrives as an email attachment

This copy infects other 35 bit .EXE files in the windows directory and subdirectories when run.

Page 8: Stepes of a computer infection. An infected.EXE file arrives as an email attachment

Five minute after the file is opened the worm it creates a .DAT file hidden somewhere on the hard disc.

Page 9: Stepes of a computer infection. An infected.EXE file arrives as an email attachment

Machine is infecting others as the message will be returned to sender.

Page 10: Stepes of a computer infection. An infected.EXE file arrives as an email attachment

Prace wykonała:Magdalena Sitek