SlideShare a Scribd company logo
1 of 20
Muhammad Uzair Rasheed

        2009-CPE-03
     UCE&T BZU MULTAN PAKISTAN
COMPUTER VIRUSES
COMPUTER VIRUS
What is computer virus?
 an executable program
 Can replicate itself
 Introduce to a computer system
     with any software program
   For internet users come from downloading files
   Can attach itself or replace the existing program
EFFECTS OF VIRUS
 Initiation of Events
 Effects of events
 An annoying message appearing on the computer screen.
 Reduced memory or disk space.
 Modification of data.
 Files overwritten or damaged.
 Hard drive erased.
TYPES OF VIRUSES
 Two major categories of viruses are
  - resident
  - non resident
 Viruses have many types some selected types are as
  follows
 Partition table virus
 Boot sector virus
 File viruses
BOOT SECTOR VIRUS/PARTITION
TABLE VIRUS
 Bootstrap loader
-first sector in the outermost track of floppy
 Master boot program
-first sector in the outermost track of hard disk
 Boot sector substitute itself for bootstrap loader
 Partition table substitute itself for master boot
  program
LOADING OF THESE VIRUSES
 How it loads itself?
-every time when we switch on the computer
 How it effects other diskettes?
-first it will check either diskettes is infected or not
- Infected: requested access is performed
- Not infected: moves original boot record and copies its
  own code
WORKING OF PARTITION TABLE
VIRUS
 It has several forms but attacks in similar way
 Its trick to activate itself
  - it gives allusion of second operating system`
 Effects
  - it prevents computer from starting and spreads onto
  any discs or flash drives that have plugged in.
WORKING OF BOOT SECTOR VIRUS
 Loading
  - Loads whenever computer starts up
  - replacement of boot sector code with its own choice.
 Effects
   - Incredibly destructive
    - Difficult to remove
    - Easily spread
    -Effect all the derives or disk that are in contact
 spread by reading infected disk
Boot virus life cycle
DETECTION
 Detected by searching their signature in memory
 signature is binary subset of virus code
 Selection of signature
 code searching in memory to find virus.
REMOVAL
 Rewrite the partition table or boot sector code
 Check whether the virus is resident
 If virus is resident system should be booted from a
 clean disk.
                OR
    By using a software called antivirus
FILE VIRUS
 DIFINATION
 - A computer virus that infects application file.
 LOADING
 Executable file virus
  - by inserting its code in original code
 Overwrite file virus
   - replacement of entire file
CONTINUE….
 Cannot embedded in pure data files
   - i.e plain text file, plain bitmap file
   - somehow embed these files never execute
 Parts
   - .com file virus
   - .exe file virus
COM File
 Mirror image of program code
   -image on disk is as loaded into the memory
 Single segment files
   -both data and code resides
HOW COM FILE VIRUS INFECTS
          FILES
 If resident may infect com file on execution
 It will interrupt 21H service 4B
     - this service load program into memory
 It will check the parameters of this service
    - if file is .com virus appends itself to a file
    -temper with first 3 bytes of .com file
    -execution branches to virus code
HOW COM VIRUS LOADS ITSELF
 Loaded file occupy number of paragraph controlled by
    MCB
   Infected file spread virus in memory area
   Virus is not independent program , does not have its
    own PSP
   if program terminate virus will also unloaded
   To be independent virus should create its own PSP and
    MCB
   Can also work as an independent program
EXE FILE VIRUSES
 It also relocates itself in the same way like com virus
 Different between exe and com file is
   - com file start execution from first instruction
   -Entry point of execution in exe file can be anywhere
  in the program
 Entry point is tempered by virus in exe file
REMOVAL
 Virus size should be known
 Firstly in case of com files
   - original value of first 3 bytes should be restored
   - In exe file value of entry point should be restored
 Copy the contents of original file into temporary file.
 Virus is not copied
 Delete original file and rename the temporary file

More Related Content

What's hot

What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
Difference Between Software and hardware
Difference Between Software and hardwareDifference Between Software and hardware
Difference Between Software and hardwareZeeshan Ilyas
 
Keyloggers
KeyloggersKeyloggers
Keyloggerskdore
 
Utility software
Utility softwareUtility software
Utility softwareadeang47
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus softwarekhalid umer
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 

What's hot (20)

What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Virus part2
Virus part2Virus part2
Virus part2
 
Computer security
Computer securityComputer security
Computer security
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Difference Between Software and hardware
Difference Between Software and hardwareDifference Between Software and hardware
Difference Between Software and hardware
 
Software (4).ppt
Software (4).pptSoftware (4).ppt
Software (4).ppt
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Utility software
Utility softwareUtility software
Utility software
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Email threats
Email threatsEmail threats
Email threats
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 

Similar to Computer viruses

CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfkd123is123live
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Computer virus
Computer virusComputer virus
Computer virushrithikjha
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antivirusesSanguine_Eva
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Information of Virus
Information of VirusInformation of Virus
Information of Virusjazz_306
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer virusestheonlineguru
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 

Similar to Computer viruses (20)

CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Virus
VirusVirus
Virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Virus
VirusVirus
Virus
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Virus
VirusVirus
Virus
 

More from Muhammad Uzair Rasheed (20)

Pak Energy conservation
Pak Energy conservation Pak Energy conservation
Pak Energy conservation
 
Pakistan Energy Conservation
Pakistan Energy ConservationPakistan Energy Conservation
Pakistan Energy Conservation
 
Molten Salt Reactor
Molten Salt ReactorMolten Salt Reactor
Molten Salt Reactor
 
Sampling
SamplingSampling
Sampling
 
Zindagi gulzar-hai
Zindagi gulzar-haiZindagi gulzar-hai
Zindagi gulzar-hai
 
C++loop statements
C++loop statementsC++loop statements
C++loop statements
 
Algorithms 1
Algorithms 1Algorithms 1
Algorithms 1
 
Verilog hdl
Verilog hdlVerilog hdl
Verilog hdl
 
Presentation on 2 nd generation telecommunication system
Presentation on 2 nd generation telecommunication systemPresentation on 2 nd generation telecommunication system
Presentation on 2 nd generation telecommunication system
 
Tdm & fdm
Tdm & fdmTdm & fdm
Tdm & fdm
 
Wavelength division multiplexing
Wavelength division multiplexingWavelength division multiplexing
Wavelength division multiplexing
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Guided media
Guided mediaGuided media
Guided media
 
Phase shift
Phase shiftPhase shift
Phase shift
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
First generation network
First generation networkFirst generation network
First generation network
 
First and second generation communication
First and second generation communicationFirst and second generation communication
First and second generation communication
 
Fdm
FdmFdm
Fdm
 
Channel impairments
Channel impairmentsChannel impairments
Channel impairments
 
Angle modulation
Angle modulationAngle modulation
Angle modulation
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Computer viruses

  • 1. Muhammad Uzair Rasheed 2009-CPE-03 UCE&T BZU MULTAN PAKISTAN
  • 3. COMPUTER VIRUS What is computer virus?  an executable program  Can replicate itself  Introduce to a computer system  with any software program  For internet users come from downloading files  Can attach itself or replace the existing program
  • 4. EFFECTS OF VIRUS  Initiation of Events  Effects of events  An annoying message appearing on the computer screen.  Reduced memory or disk space.  Modification of data.  Files overwritten or damaged.  Hard drive erased.
  • 5. TYPES OF VIRUSES  Two major categories of viruses are - resident - non resident  Viruses have many types some selected types are as follows  Partition table virus  Boot sector virus  File viruses
  • 6. BOOT SECTOR VIRUS/PARTITION TABLE VIRUS  Bootstrap loader -first sector in the outermost track of floppy  Master boot program -first sector in the outermost track of hard disk  Boot sector substitute itself for bootstrap loader  Partition table substitute itself for master boot program
  • 7. LOADING OF THESE VIRUSES  How it loads itself? -every time when we switch on the computer  How it effects other diskettes? -first it will check either diskettes is infected or not - Infected: requested access is performed - Not infected: moves original boot record and copies its own code
  • 8. WORKING OF PARTITION TABLE VIRUS  It has several forms but attacks in similar way  Its trick to activate itself - it gives allusion of second operating system`  Effects - it prevents computer from starting and spreads onto any discs or flash drives that have plugged in.
  • 9. WORKING OF BOOT SECTOR VIRUS  Loading - Loads whenever computer starts up - replacement of boot sector code with its own choice.  Effects - Incredibly destructive - Difficult to remove - Easily spread -Effect all the derives or disk that are in contact  spread by reading infected disk
  • 11. DETECTION  Detected by searching their signature in memory  signature is binary subset of virus code  Selection of signature  code searching in memory to find virus.
  • 12. REMOVAL  Rewrite the partition table or boot sector code  Check whether the virus is resident  If virus is resident system should be booted from a clean disk. OR By using a software called antivirus
  • 13. FILE VIRUS  DIFINATION - A computer virus that infects application file.  LOADING  Executable file virus - by inserting its code in original code  Overwrite file virus - replacement of entire file
  • 14. CONTINUE….  Cannot embedded in pure data files - i.e plain text file, plain bitmap file - somehow embed these files never execute  Parts - .com file virus - .exe file virus
  • 15. COM File  Mirror image of program code -image on disk is as loaded into the memory  Single segment files -both data and code resides
  • 16. HOW COM FILE VIRUS INFECTS FILES  If resident may infect com file on execution  It will interrupt 21H service 4B - this service load program into memory  It will check the parameters of this service - if file is .com virus appends itself to a file -temper with first 3 bytes of .com file -execution branches to virus code
  • 17. HOW COM VIRUS LOADS ITSELF  Loaded file occupy number of paragraph controlled by MCB  Infected file spread virus in memory area  Virus is not independent program , does not have its own PSP  if program terminate virus will also unloaded  To be independent virus should create its own PSP and MCB  Can also work as an independent program
  • 18.
  • 19. EXE FILE VIRUSES  It also relocates itself in the same way like com virus  Different between exe and com file is - com file start execution from first instruction -Entry point of execution in exe file can be anywhere in the program  Entry point is tempered by virus in exe file
  • 20. REMOVAL  Virus size should be known  Firstly in case of com files - original value of first 3 bytes should be restored - In exe file value of entry point should be restored  Copy the contents of original file into temporary file.  Virus is not copied  Delete original file and rename the temporary file

Editor's Notes

  1. bedded