SlideShare a Scribd company logo
1 of 29
Group members
 Vidyash .B (co-presenter)
 Rohit .M (helper)
 Hrishikesh . W (Leader)
 Nishant .R (Editor)
 Saklen.A
 Sreyash G
Virus Founder
 The first computer virus popularly known
as the 'Brain virus' was created in 1986
by two Pakistani brothers Amjad and
Basit Farooq Alvi
Types Of Computer Viruses.
Computer viruses can be classified into
various categories , as listed here.
Boot Sector Virus
Program Virus
Stealth Virus
Multipartite Virus
Macro Virus
Virus types
What is a computer virus ?
 A computer virus is a malware program that, when
executed, replicates by inserting copies of itself (possibly modified)
into other computer programs, data files, or the boot sector of
the hard drive; when this replication succeeds, the affected areas
are then said to be "infected".[1][2][3][4]Viruses often perform some
type of harmful activity on infected hosts, such as stealing hard
disk space or CPU time, accessing private information, corrupting
data, displaying political or humorous messages on the user's
screen, spamming their contacts, logging their keystrokes, or even
rendering the computer useless. However, not all viruses carry a
destructive payload or attempt to hide themselves—the defining
characteristic of viruses is that they are self-replicating computer
programs which install themselves without user consent.
What a Computer virus
does
 A computer virus might corrupt or
delete data on your computer, use
your email program to spread itself to
other computers, or even erase
everything on your hard
disk. Computer viruses are often
spread by attachments in email
messages or instant messaging
messages
How a computer virus spreads
 Computer
viruses usually spread in
one of three ways: from
removable media; from
downloads off the Internet;
and from e-mail attachments.
Although the Internet gets a
bad rap as a source
of viruses, you're no more
likely to contract a virus from
the Web than you are from
packaged software
Types of computer virus
 Boot Sector Virus
 Program Virus
 Stealth Virus
 Multipartite Virus
 Macro Virus
 Boot-sector viruses infect computer
systems by copying code either to the boot
sector on a floppy disk or the partition table
on a hard disk. During startup, the virus is
loaded into memory. Once in memory, the
virus will infect any non-infected disks
accessed by the system
 A computer virus is a
malware program that, when executed,
replicates by inserting copies of itself
(possibly modified) into other computer
programs, data files, or the boot sector of
the hard drive; when this replication
succeeds, the affected areas are then said to
be "infected"
 In computer security, a stealth virus is a
computer virus that uses various
mechanisms to avoid detection by
antivirus softwareA stealth virus is
complex malware that hides itself after
infecting a computer. Once hidden, it
copies information from uninfected data
onto itself and ..
 A multipartite virus is a computer virus that
infects and spreads in multiple ways. The
term was coined to describe the
first viruses that included DOS executable
files and PC BIOS boot sector virus code,
where both parts are viral themselves
WORMS
 A computer worm is a
standalone malware computer
program that replicates itself in
order to spread to other
computers.[1] Often, it uses
a computer network to spread
itself, relying on security failures
on the target computer to access
it. Unlike a computer virus, it does
not need to attach itself to an
existing program.[2] Worms almost
always cause at least some harm
to the network, even if only by
consuming bandwidth, whereas
viruses almost always corrupt or
modify files on a targeted
computer
TROJAN HORSE
 A Trojan horse, or Trojan,
in computing is
any malicious computer
program which
misrepresents itself as
useful, routine, or
interesting in order to
persuade a victim to install
it. The term is derived from
the Ancient Greek story of
the wooden horse.[1][2][3][4][5]
PREVENTING VIRUS
INFECTION
A computer virus is program code which 'hides' in
other files and can cause irreparable damage
to your computer. Computer viruses spread
easily between computers when people pass
files to each other Virus Checkers (software
programs) provide protection against viruses,
new and old. However, virus writers are all too
ingenious and for every block that the virus
protection developers put in place, virus writers
are devising new code to create nuisance. This
user guide provides you with information about
the steps you can take to reduce the likelihood
of your computer getting infected with a virus.
ANIT – VIRUS SOFTWARE
 You should always ensure that
you have an anti-virus software
installed and enabled on your
computer. This type of software
can detect and block viruses
before they have a chance to
cause any harm. A good anti-
virus program can scan for
viruses on your hard drive or any
program, files, or documents. If it
finds any viruses, it can remove
the virus, quarantine it or delete
the file safely from your
computer.
Worlds best anti – virus of 2015
 VIPRE 1 ST
 ESET 2th
 AVG 3th
 AVIRA4th
 NORTON 5th
 KASPERSKY 6th
BITDEFENDER7TH
AVAST 8TH
MCAFEE9TH
PANDA 10TH
NORTON ANTIVIRUS
(NAV)
 Norton anti virus (NAV)is product of Symantec
corporation and is one of the most widely used
anti-virus programs . Using Norton Antivirus
,you can scan files .folder or entire drive for
viruses if any type of computer threat is found
on a computer theft is found on a computer
system, this anti-virus software removes it and
disassociates its action. Norton anti –virus
software removes viruses, Trojan horses and
worms from a computer system it also checks
incoming and out coming e-mail attachments
for viruses
Scanning and removing
 To find and remove viruses
(if any)from your computer
using Norton anti virus
,follow these steps
1. Start the Norton anti virus
program from the start
menu.
OR
Double click the icon ( ) on
the Destop,the Norton Anti
Virus main windows appear
2. Select the scan for viruses option to start the
virus check The scan For Viruses windows
appears
3. If you choose to scan My computer, all the removable
drives or all the floppy disks, the scanning
Start automatically. If you choose to
scan drive , folders or files, dialog box appears in which
choose the drives , folders or files to scan . the various
scanning options and their functions are discussed in table
6.1
Scanning option function
Scan my computer Checks all boot records and
files on a computer
Scan all removable drives Checks all the removable
drives like floppy drives CD
drives, etc
Scan all floppy disks Checks all floppy disks
Scan drives Checks the selected hard
disk and / or removable
drive
Scan folder Checks the selected folder
Scan files
Select any one of
the given options
to launch a scan .
For example to
scan a folder on
hand disk for
viruses, click the
Scan Folders
dialog box appear
4. Select the folder and click
Scan .the
Scanning process starts and
the scan process starts
and the scan
Progress window displays the
status of
The scan.
5.If a virus is found ,a
norton ANtiVirus
alert appears on the
scrren giving the
information about
the virus
6. After the scanning
is completed ,
Norton Anti-virus
displays a summary
of the scan.
7.Click Finished to
close the main
windows
Repair Wizard
 After antivirus defects the virus , it can
 Remove the virus in any of this three
different ways
• Fixing the infected file: this deletes the
virus and repairs the infected file .It is
the best way to remove a virus.
• Deleting the infected file: this delected
both t he virus and the infected file. If
norton anti-virus program cannot repair
the infected
1. What is mean by the anti-virus ?
 The software which is use for the
deleting the virus
 The software which is use for the insert
the virus
Computer virus 2

More Related Content

What's hot

Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identificationsandeep shergill
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trendsAthena Catindig
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virusNaveen Goyal
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus Tasif Tanzim
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 

What's hot (20)

Antivirus
AntivirusAntivirus
Antivirus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computer virus
Computer virusComputer virus
Computer virus
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Malicious
MaliciousMalicious
Malicious
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 

Similar to Computer virus 2

Similar to Computer virus 2 (20)

Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Virus
VirusVirus
Virus
 
Virus project
Virus projectVirus project
Virus project
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
viruses
virusesviruses
viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Computer virus 2

  • 1.
  • 2.
  • 3. Group members  Vidyash .B (co-presenter)  Rohit .M (helper)  Hrishikesh . W (Leader)  Nishant .R (Editor)  Saklen.A  Sreyash G
  • 4. Virus Founder  The first computer virus popularly known as the 'Brain virus' was created in 1986 by two Pakistani brothers Amjad and Basit Farooq Alvi
  • 5. Types Of Computer Viruses. Computer viruses can be classified into various categories , as listed here. Boot Sector Virus Program Virus Stealth Virus Multipartite Virus Macro Virus
  • 7. What is a computer virus ?  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".[1][2][3][4]Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the computer useless. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without user consent.
  • 8. What a Computer virus does  A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses are often spread by attachments in email messages or instant messaging messages
  • 9. How a computer virus spreads  Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software
  • 10. Types of computer virus  Boot Sector Virus  Program Virus  Stealth Virus  Multipartite Virus  Macro Virus
  • 11.  Boot-sector viruses infect computer systems by copying code either to the boot sector on a floppy disk or the partition table on a hard disk. During startup, the virus is loaded into memory. Once in memory, the virus will infect any non-infected disks accessed by the system
  • 12.  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected"
  • 13.  In computer security, a stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus softwareA stealth virus is complex malware that hides itself after infecting a computer. Once hidden, it copies information from uninfected data onto itself and ..
  • 14.  A multipartite virus is a computer virus that infects and spreads in multiple ways. The term was coined to describe the first viruses that included DOS executable files and PC BIOS boot sector virus code, where both parts are viral themselves
  • 15. WORMS  A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.[2] Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer
  • 16. TROJAN HORSE  A Trojan horse, or Trojan, in computing is any malicious computer program which misrepresents itself as useful, routine, or interesting in order to persuade a victim to install it. The term is derived from the Ancient Greek story of the wooden horse.[1][2][3][4][5]
  • 17. PREVENTING VIRUS INFECTION A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily between computers when people pass files to each other Virus Checkers (software programs) provide protection against viruses, new and old. However, virus writers are all too ingenious and for every block that the virus protection developers put in place, virus writers are devising new code to create nuisance. This user guide provides you with information about the steps you can take to reduce the likelihood of your computer getting infected with a virus.
  • 18. ANIT – VIRUS SOFTWARE  You should always ensure that you have an anti-virus software installed and enabled on your computer. This type of software can detect and block viruses before they have a chance to cause any harm. A good anti- virus program can scan for viruses on your hard drive or any program, files, or documents. If it finds any viruses, it can remove the virus, quarantine it or delete the file safely from your computer.
  • 19. Worlds best anti – virus of 2015  VIPRE 1 ST  ESET 2th  AVG 3th  AVIRA4th  NORTON 5th  KASPERSKY 6th BITDEFENDER7TH AVAST 8TH MCAFEE9TH PANDA 10TH
  • 20. NORTON ANTIVIRUS (NAV)  Norton anti virus (NAV)is product of Symantec corporation and is one of the most widely used anti-virus programs . Using Norton Antivirus ,you can scan files .folder or entire drive for viruses if any type of computer threat is found on a computer theft is found on a computer system, this anti-virus software removes it and disassociates its action. Norton anti –virus software removes viruses, Trojan horses and worms from a computer system it also checks incoming and out coming e-mail attachments for viruses
  • 21. Scanning and removing  To find and remove viruses (if any)from your computer using Norton anti virus ,follow these steps 1. Start the Norton anti virus program from the start menu. OR Double click the icon ( ) on the Destop,the Norton Anti Virus main windows appear
  • 22. 2. Select the scan for viruses option to start the virus check The scan For Viruses windows appears
  • 23. 3. If you choose to scan My computer, all the removable drives or all the floppy disks, the scanning Start automatically. If you choose to scan drive , folders or files, dialog box appears in which choose the drives , folders or files to scan . the various scanning options and their functions are discussed in table 6.1 Scanning option function Scan my computer Checks all boot records and files on a computer Scan all removable drives Checks all the removable drives like floppy drives CD drives, etc Scan all floppy disks Checks all floppy disks Scan drives Checks the selected hard disk and / or removable drive Scan folder Checks the selected folder Scan files
  • 24. Select any one of the given options to launch a scan . For example to scan a folder on hand disk for viruses, click the Scan Folders dialog box appear
  • 25. 4. Select the folder and click Scan .the Scanning process starts and the scan process starts and the scan Progress window displays the status of The scan.
  • 26. 5.If a virus is found ,a norton ANtiVirus alert appears on the scrren giving the information about the virus 6. After the scanning is completed , Norton Anti-virus displays a summary of the scan. 7.Click Finished to close the main windows
  • 27. Repair Wizard  After antivirus defects the virus , it can  Remove the virus in any of this three different ways • Fixing the infected file: this deletes the virus and repairs the infected file .It is the best way to remove a virus. • Deleting the infected file: this delected both t he virus and the infected file. If norton anti-virus program cannot repair the infected
  • 28. 1. What is mean by the anti-virus ?  The software which is use for the deleting the virus  The software which is use for the insert the virus