SlideShare a Scribd company logo
1 of 27
FILE EXTENSION EXPLOITS
(“I LOVE YOU” VIRUS)
EZRA BEHR
THE POINT OF THIS PRESENTATION
• Explain what file extensions are
• Bring awareness to possible extension viruses
• How to protect yourself from such viruses
• Showing the affect of the “I LOVE YOU” virus
I LOVE YOU
Let's delve into the story of the
“I LOVE YOU“ virus…
I LOVE YOU
The "I LOVE YOU" virus, also known as the Love Bug or the
Love letter worm, was one of the most notorious computer
viruses in history. It first appeared in May 2000 and quickly
spread worldwide, causing significant damage to computer
systems.
I LOVE YOU
The virus originated in the Philippines and
was created by two computer science
students, Reonel Ramones and Onel de
Guzman. They designed the virus as a
malicious script disguised as a love
confession. The virus was distributed via
email with the subject line "I LOVE YOU"
and an attachment named "LOVE-LETTER-
FOR-YOU.TXT.vbs.“
Notice the ending of the file…
I LOVE YOU
When unsuspecting users clicked on the attachment, the virus
activated and began wreaking havoc. It would:
1. Send a copy of itself using Microsoft Outlook to all the users
contacts
2. It would infect the IRC (Internet Relay Chat) program so that
the next time a user starts chatting on the web the worm can
spread to everyone who connects to the chat server.
3. It would search for pictures, videos and music files and would
overwrite or replace them with a copy of itself
4. It would install a password stealing program that would
become active when the recipient opens Internet Explorer and
reboots the computer.
I LOVE YOU
The impact of the "I LOVE YOU" virus was immense. Within
hours, it had infected millions of computers around the world,
causing widespread disruptions to businesses and individuals.
The virus targeted banks, government institutions, and even
large corporations, leading to the shutdown of email systems and
financial losses estimated in the billions of dollars.
I LOVE YOU
Some of the companies that the virus hit
I LOVE YOU
The overall damage was HUGE!
1. Data loss
2. Email system was disrupted
3. Financial losses (targeting banks and trying to steal passwords and
sensitive info)
4. Productivity impact
5. Global reach
LET’S TRY UNDERSTAND...
Let’s understand how the virus worked and why it only popped up in
the year 2000 and why did it only affect windows computers.
In order to understand such thing, we will first need to learn about
FILE EXTENSIONS.
FILE EXTENSIONS
• A file extension is a set of characters that follows the last
period in a file name, which identifies the type of file and the
program that can open it.
• File extensions are used to help operating systems and
software applications identify and associate files with the
appropriate program.
• File extensions can be used to identify potentially malicious
files that could harm a computer
VIDEO FILE EXTENSION EXAMPLES
Some common applications that play video files:
.mp4 .mkv .mov .avi .m4v
VLC Windows Media Player QuickTime
IMAGE FILE EXTENSION EXAMPLES
Some common applications that open image files:
.jpg .png .raw .bmp .eps
Windows Photos Irfanview Apple Photos
TEXT FILE EXTENSION EXAMPLES
Some common applications that open text files:
.txt .docx .pdf
Adobe Acrobat Notepad Microsoft Word
PROGRAM FILE EXTENSION EXAMPLES
.exe .bat .vbs
“.exe” is the most used extension.
These files can run scripts/programs on the computer and access critical
Files on the OS.
Hence, if a hacker can install such files on your computer, they can steal
passwords, Credit Card info, encrypt personal files and hold it for ransom.
BACK TO US
If you remember, the virus “I LOVE
YOU” was a .vbs file
"LOVE-LETTER-FOR-
YOU.TXT.vbs“
So, whenever a user would
open the file, it would install a
software that would infect the
computer.
THE BEGGING QUESTION!!!
The begging question is, couldn’t the user see that the file ended in
.vbs?
If so, why did he install the program?
There are 2 answer:
1. The user had no idea about file extensions, so they didn’t know
what they were getting into.
2. The user didn’t realize that it’s a .vbs because it had a .txt in the
name and once the program was installed the .vbs was HIDDEN.
HIDDEN FILE EXTENSIONS
What is a hidden file extension?
In Windows 2000 Microsoft set the default behavior of file explorer to
hide known file extensions such as .mp4, .pdf, .vbs and so on from the
user.
Before Windows 2000 After Windows 2000
THE REASON
The original reason that
Microsoft did this was to simplify
the layout for less savvy users.
Another reason why this was
done, was to prevent users from
accidently changing the
extension when renaming the
file, thus corrupting the file.
Live demo of corrupting a file by renaming it.
THE PROBLEM
THE PROBLEM
Hiding the file extension opens a golden door for hacker to install
malware on the computer. For example, a hacker can call a virus that
ends with .exe “document1” and change the icon to a document
icon and the user wouldn’t know the wiser because the extension is
hidden and the icon looks like a document icon.
I LOVE YOU
That is how the “I LOVE YOU” virus was made.
The hackers used the new Microsoft feature to get innocent people to
download and open their virus.
And in our case the hackers went even further by adding a .txt part to
the file name so that the few people who did know something about
file extensions got misled.
HOW TO ENABLE FILE NAME EXTENSIONS?
1. Go to the settings (options) of
the file explorer
HOW TO ENABLE FILE NAME EXTENSIONS?
2. In the folder options go to
“View”
3. Toggle the “Hide extensions to
known file types” off.
4. Than click “Apply”
IN CONCLUSION
How can we protect ourselves against such viruses?
1. Enable file name extension, so you can see what kind of file you’re
opening.
2. Be aware not to download anything from any unknow sites, and if
you do have any suspicions ask a professional or scan the file for
viruses.
THE END

More Related Content

Similar to I LOVE YOU VIRUS.pptx

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Information of Virus
Information of VirusInformation of Virus
Information of Virusjazz_306
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part Onebackdoor
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant VirusesManish Prasad
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESHARSORA_SEJAL
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Computer virus
Computer virusComputer virus
Computer viruskiran_a_c
 

Similar to I LOVE YOU VIRUS.pptx (20)

Computervirus
Computervirus Computervirus
Computervirus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant Viruses
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
I Love You =D
I Love You =DI Love You =D
I Love You =D
 
I Love You =D
I Love You =DI Love You =D
I Love You =D
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses
VirusesViruses
Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

I LOVE YOU VIRUS.pptx

  • 1. FILE EXTENSION EXPLOITS (“I LOVE YOU” VIRUS) EZRA BEHR
  • 2. THE POINT OF THIS PRESENTATION • Explain what file extensions are • Bring awareness to possible extension viruses • How to protect yourself from such viruses • Showing the affect of the “I LOVE YOU” virus
  • 3. I LOVE YOU Let's delve into the story of the “I LOVE YOU“ virus…
  • 4. I LOVE YOU The "I LOVE YOU" virus, also known as the Love Bug or the Love letter worm, was one of the most notorious computer viruses in history. It first appeared in May 2000 and quickly spread worldwide, causing significant damage to computer systems.
  • 5. I LOVE YOU The virus originated in the Philippines and was created by two computer science students, Reonel Ramones and Onel de Guzman. They designed the virus as a malicious script disguised as a love confession. The virus was distributed via email with the subject line "I LOVE YOU" and an attachment named "LOVE-LETTER- FOR-YOU.TXT.vbs.“ Notice the ending of the file…
  • 6. I LOVE YOU When unsuspecting users clicked on the attachment, the virus activated and began wreaking havoc. It would: 1. Send a copy of itself using Microsoft Outlook to all the users contacts 2. It would infect the IRC (Internet Relay Chat) program so that the next time a user starts chatting on the web the worm can spread to everyone who connects to the chat server. 3. It would search for pictures, videos and music files and would overwrite or replace them with a copy of itself 4. It would install a password stealing program that would become active when the recipient opens Internet Explorer and reboots the computer.
  • 7. I LOVE YOU The impact of the "I LOVE YOU" virus was immense. Within hours, it had infected millions of computers around the world, causing widespread disruptions to businesses and individuals. The virus targeted banks, government institutions, and even large corporations, leading to the shutdown of email systems and financial losses estimated in the billions of dollars.
  • 8. I LOVE YOU Some of the companies that the virus hit
  • 9. I LOVE YOU The overall damage was HUGE! 1. Data loss 2. Email system was disrupted 3. Financial losses (targeting banks and trying to steal passwords and sensitive info) 4. Productivity impact 5. Global reach
  • 10. LET’S TRY UNDERSTAND... Let’s understand how the virus worked and why it only popped up in the year 2000 and why did it only affect windows computers. In order to understand such thing, we will first need to learn about FILE EXTENSIONS.
  • 11. FILE EXTENSIONS • A file extension is a set of characters that follows the last period in a file name, which identifies the type of file and the program that can open it. • File extensions are used to help operating systems and software applications identify and associate files with the appropriate program. • File extensions can be used to identify potentially malicious files that could harm a computer
  • 12. VIDEO FILE EXTENSION EXAMPLES Some common applications that play video files: .mp4 .mkv .mov .avi .m4v VLC Windows Media Player QuickTime
  • 13. IMAGE FILE EXTENSION EXAMPLES Some common applications that open image files: .jpg .png .raw .bmp .eps Windows Photos Irfanview Apple Photos
  • 14. TEXT FILE EXTENSION EXAMPLES Some common applications that open text files: .txt .docx .pdf Adobe Acrobat Notepad Microsoft Word
  • 15. PROGRAM FILE EXTENSION EXAMPLES .exe .bat .vbs “.exe” is the most used extension. These files can run scripts/programs on the computer and access critical Files on the OS. Hence, if a hacker can install such files on your computer, they can steal passwords, Credit Card info, encrypt personal files and hold it for ransom.
  • 16. BACK TO US If you remember, the virus “I LOVE YOU” was a .vbs file "LOVE-LETTER-FOR- YOU.TXT.vbs“ So, whenever a user would open the file, it would install a software that would infect the computer.
  • 17. THE BEGGING QUESTION!!! The begging question is, couldn’t the user see that the file ended in .vbs? If so, why did he install the program? There are 2 answer: 1. The user had no idea about file extensions, so they didn’t know what they were getting into. 2. The user didn’t realize that it’s a .vbs because it had a .txt in the name and once the program was installed the .vbs was HIDDEN.
  • 18. HIDDEN FILE EXTENSIONS What is a hidden file extension? In Windows 2000 Microsoft set the default behavior of file explorer to hide known file extensions such as .mp4, .pdf, .vbs and so on from the user. Before Windows 2000 After Windows 2000
  • 19. THE REASON The original reason that Microsoft did this was to simplify the layout for less savvy users. Another reason why this was done, was to prevent users from accidently changing the extension when renaming the file, thus corrupting the file.
  • 20. Live demo of corrupting a file by renaming it.
  • 22. THE PROBLEM Hiding the file extension opens a golden door for hacker to install malware on the computer. For example, a hacker can call a virus that ends with .exe “document1” and change the icon to a document icon and the user wouldn’t know the wiser because the extension is hidden and the icon looks like a document icon.
  • 23. I LOVE YOU That is how the “I LOVE YOU” virus was made. The hackers used the new Microsoft feature to get innocent people to download and open their virus. And in our case the hackers went even further by adding a .txt part to the file name so that the few people who did know something about file extensions got misled.
  • 24. HOW TO ENABLE FILE NAME EXTENSIONS? 1. Go to the settings (options) of the file explorer
  • 25. HOW TO ENABLE FILE NAME EXTENSIONS? 2. In the folder options go to “View” 3. Toggle the “Hide extensions to known file types” off. 4. Than click “Apply”
  • 26. IN CONCLUSION How can we protect ourselves against such viruses? 1. Enable file name extension, so you can see what kind of file you’re opening. 2. Be aware not to download anything from any unknow sites, and if you do have any suspicions ask a professional or scan the file for viruses.