SlideShare a Scribd company logo
1 of 35
COMPUTER VIRUS








A computer virus is a computer program that can
reproduce itself and spread from one computer to
another. and leaving infections as it travels, Like a
human virus.
Some virus may cause only testing effects while others
can damage your hardware, software or files. Almost
all viruses are attached to an executable file.
It is important to note that a virus cannot be spread
without a human action.
Because a virus is spread by human action people will
unknowingly continue the spread of a computer virus
by sharing infecting files or sending emails with
viruses as attachments in the email.
EFFECT OF COMPUTER VIRUS











It can slow down your computer.
It might corrupt your system files.
It might make some programs faulty or
corrupt.
It might damage your boot sector creating
problems when you boot into the windows.
it might steal important information from
your computer and send to some other
person.
It might change the power ratings of your
computer and could blast the system.
VIRUS IMPACT ON SYSTEM ACCESSORIES








Programs. Some viruses may impair your certain computer
programs and applications. As a result, you may not be able to
access the software or operate it smoothly.
Files. There are viruses that may modify, corrupt or delete files in
your machine owing to which you may not be able to access them.
Hard disk. Some viruses may attack the data present on your
computer’s hard disk, resulting in its crash. You may need to
reformat the disk in such cases.
Operational impact. Some viruses may not apparently harm your
system’s integrity and may limit themselves to displaying text
messages, images, audio and Video.
WHY DO PEOPLE CREATE COMPUTER VIRUS








To take control of a computer and use it for
specific tasks
To generate money
To steal sensitive information (credit card numbers,
passwords, personal details, data etc.)
To prove a point, to prove it can be done, to prove
ones skill or for revenge purposes
VIRUS IMPACT ON SYSTEM ACCESSORIES








Hardware. No computer viruses are capable of damaging your

hardware yet. They just work on all the files and data of your system,
make them useless and disable them.
Speed. Your system may slow down under the influence of viruses as
they consume your system’s memory for their execution.
Booting. Your system may suddenly restart and at times may not load
properly. In few cases, you may not be able to access your disk drives.
Applications. Viruses may modify, damage or delete your program files
and system files because of which applications on your system may not
be able to work appropriately.
VIRUS IMPACT ON SYSTEM ACCESSORIES




Reinstall. Some computer viruses are designed in the gravest
way possible. They cannot be uninstalled easily from your
system and some reinstall themselves even after they have
been removed.
Peripherals. Some viruses may impact device driver software
in your computer resulting in the relevant operational
issues. For example, disturbed software setting for printer
may impair its function.
COMPUTER VIRUS HISTORY












Elk Cloner has the distinction of being the
first wild virus for a home computer.

Coded by then-high-school student, Richard
Skrenta, around 1982.
who created the search engine blekko.

Happy
Birthday
Joshi',
the virus was first discovered in India in
June 1990
The first known virus was created in 1971
by Cambridge and was called the Creeper
Virus.
Creeper was an experimental selfreplicating program written by Bob Thomas
at BBN in 1971.
COMPUTER VIRUS HISTORY








This virus was spread using the Advanced Research Projects
Agency Network (ARPANET).
It was designed not to damage but to demonstrate a mobile
application. It is generally accepted to be the first computer
worm, although the Concept of a "computer virus" did not
exist in the 1970s
When the computers were infected, the message "I'm the
creeper, catch me if you can!"
This year marks the 40th anniversary of Creeper.
FIRST VIRUS FROM PAKISTAN




World's first computer virus was created to infect IBM PCs by
two Pakistani brothers, Amjad and Basit Farooq in 1986.

While they were trying to explore their expertise and potential
of MS DOS operating system, Virus travelled beyond their
imagination through Asia, Europe and was picked up in USA.

Amjad and Basit Farooq Alvi
FIRST VIRUS FROM PAKISTAN


The first computer virus named “Brain” was
designed by Amjad Farooq Alvi and Basit
Farooq Alvi.

 "Beware

of this VIRUS...Contact us for
vaccination,". This message was put on the
screen.
 The interesting fact remains that the location
of the “Brain Pvt Limited” is exactly the same
where the virus was first developed.
10 LATEST COMPUTER VIRUS
Virus name

Spreading

Damage

Discovered

Backdoor.IRCBot.Dorkbot.A

MEDIUM

MEDIUM

2011 May 15

Backdoor.Lavandos.A

MEDIUM

HIGH

2011 Jan 06

VERY LOW

HIGH

2011 Jan 03

Java.Trojan.Downloader.OpenConn
ection.AI

HIGH

MEDIUM

2010 Nov 12

Java.Backdoor.ReverseBackdoor.A

LOW

MEDIUM

2010 Nov 12

VERY LOW

VERY LOW

2010 Oct 28

MEDIUM

HIGH

2010 Oct 20

Win32.Worm.Stuxnet.A

HIGH

MEDIUM

2010 Oct 07

Win32.Worm.Prolaco.S

MEDIUM

MEDIUM

2010 Oct 06

Exploit.CplLnk.Gen

MEDIUM

LOW

2010 Jul 19

Trojan.Android.Geinimi.A

Win32.Ramnit.G

Trojan.Spy.Ursnif.F
WORLD’S WORST COMPUTER VIRUS
Surreptitious Sircam

Sircam appeared in July 2001 on PCs running Windows 95, 98, and
Me.

The worm appeared in e-mail in-boxes with an attachment

the body of the message was in Spanish or English.

Typical greetings included "Hi! How are you?" and "Hola como
estas?”
Raid raider
 Code Red burned brightly in the summer of 2001,
 Infecting hundreds of thousands of computers--mainly on corporate
networks.
WORLD’S WORST COMPUTER VIRUS
Maniacal Magistr

Magistr is one of the most complex viruses to hit the Internet.

Its victims, users of Outlook Express, were hooked by an infected email attachment.

The virus, discovered in mid-March 2001,

Sent garbled messages to everyone in the infected user's e-mail
address book

Melissa

Melissa propagated via infected Microsoft Word documents and
mailed itself to Outlook contacts of the contaminated user.
WORLD’S WORST COMPUTER VIRUS
Expletive Deleted) Explorer

The Explorer.zip worm appeared in the summer of 1999.

The worm deleted Word, Excel, and PowerPoint files and
types of files.

Explorer traveled via e-mails that appeared to be from
someone the recipient knew.
Numbing Nimda

Nimda (also known as the Concept Virus) appeared in
September 2001,

Attacking tens of thousands of servers and hundreds of
thousands of PCs.

The worm modified Web documents and executable files

The worm spread as an embedded attachment in an HTML
e-mail message that would execute as soon as the
recipient opened the message
SOME COMPUTER SECURITY THREATS
ADWARE
Adware is software that displays advertisements on your computer.

BACKDOOR TROJAN
A backdoor Trojan allows someone to take control of another user’s
computer via the internet without their permission.
BLUE JACKING
Bluejacking is sending anonymous, unwanted messages to other users
with Bluetooth-enabled mobile phones or laptops.

BLUE SNARFING
Bluesnarfing is the theft of data from a Bluetooth phone.
Like Bluejacking, Bluesnarfing depends on the ability of Bluetoothenabled devices todetect and contact others nearby.
SOME COMPUTER SECURITY THREATS
BOOT SECTOR VIRUS

Boot sector viruses spread by modifying the program that enables
your computer to start up
BROWSER HIJACKERS

Browser hijackers change the default home and search pages in your
internet browser
CHAIN LETTER

In electronic chain letter is an email that urges you to forward copies
to other people.
COOKIES

Cookies are files on your computer that enable websites to remember
your details.
DENIAL OF SERVICE

A denial-of-service (DoS) attack prevents users from accessing a
computer or website.
SOME COMPUTER SECURITY THREATS






Worms
Worms are programs that replicate and spread, often opening a back door to allow
hackers to gain access to the computers that they infect.
Worms can spread over the Internet by exploiting security flaws in the software of
computers that are connected to the Internet. Worms can also spread by copying
themselves from disk to disk or by email.
Zombies
A Zombie is a hidden program that lies inactive on a computer.
Zombies don’t normally damage the computer on which they reside but can
damage other computers.
Zombies often arrive as email attachments and when the attachment is opened
they install themselves secretly and then wait to be activated.
Phishing
A Phishing attack is when you are are sent an email that asks you to click on a link
and re-enter your bank or credit card details. These emails can pretend to be from
banks, Internet service providers, on-line stores and so on, and both the email and
the web site it links to appear genuine. When you enter your bank or credit card
details they are then used fraudulently.
TYPE OF COMPUTER WORMS
ADWARE
MALWARE
SPYWARE
ADWARE


Adware, or advertising-supported software, is
any software package which automatically plays, displays, or
downloads advertisements to a computer.



These advertisements can be in the form of a pop-up.



They may also be in the user interface of the software or on a
screen presented to the user during the installation process.



The object of the Adware is to generate revenue for its author



Advertising functions are integrated into or bundled with the
software, which is often designed to note what Internet sites the
user visits
MALWARE


Malware, short for malicious software, Malware is a very general word for
software that deliberately harms, restricts, alters, or stops your computer from
working properly where the true purpose of the download or installation is
hidden or difficult to find and not clearly explained to the user .



Malware includes computer viruses, worms, trojan horses, spyware, dishonest
adware, scareware, crimeware, most rootkits, and other malicious and
unwanted software or program.



Malware can arrive through an internet download, as an email link or

attachment


as a file sent between users of instant messaging, social networking
communities, peer-to-peer file sharing programs, online games, online video
games or chatrooms or a link to a malicious webpage.
MALWARE


The best-known types of malware, viruses and worms, are
known for the manner in which they spread, rather than any
other particular behavior.



The term computer virus is used for a program that has
infected some executable software and, when run, causes the
virus to spread to other executables .



On

the

other

hand,

a

worm

is

a

program

that actively transmits itself over a network to infect other

computers
INDICATION OF MALWARE


the browser’s home page keeps changing



Pop-up advertisements appear when your browser is closed,.



Strange icons appear on your desktop without your prompting or
knowledge of the program



The computer light is blinking (meaning that your computer is
processing information) at unusual or unexpected times.



Your browser settings keep changing, including the webpage you
designate as your internet start-up page



Files are uploaded or downloaded without your prompting or
permission.
SPYWARE


Spyware

is

Internet

language

for

Advertising

Supported

software (Adware).


Spyware is

tracking software that hides itself (runs in

the

background) and gathers information without the computer owner's
or user's knowledge or permission for the benefit of someone else


The first recorded use of the term spyware occurred on 16 October
1995.



showing them pop-up ads, or altering web-browser behavior for the
financial benefit of the spyware creator.



For instance, some spyware programs redirect search engine results
to paid advertisements.
SPYWARE







Others,
often
called
"stealware"
by
the
media,
overwrite affiliate marketing codes so that revenue is
redirected to the spyware creator rather than the intended
recipient.
The presence of spyware is typically hidden from the user,
and can be difficult to detect
Spyware programs can collect various types of personal
information, such as Internet surfing habits and sites that
have been visited,
As of 2006, spyware has become one of the preeminent
security threats to computer systems running Microsoft
Windows operating systems.
GUIDELINE TO AVOID SPYWARE











Not opening emails or email attachments from
unknown senders
Block or don’t click on suspicious pop-up windows
Don’t open files that are more prone to be associated
with malware such as .bat, .pif, .txt .vbs, .htm .exe or
.vbs
Don’t download or execute applications from
untrusted sources.
Avoid phishing scams.
Use updated anti-virus and anti-spyware software
regularly.
COMPUTER ANTIVIRUS


A utility that searches a hard disk for viruses and removes any that are
found.



Antivirus software is a computer program you install on your machine that

scans files for malicious (dangerous) programs and either deletes them or
"heals" them therefore eliminating the threat of damage to your computer.


Most antivirus programs include an auto-update feature that enables
the program to download profiles of new viruses so that it can check

for the new viruses as soon as they are discovered.


Antivirus software is a computer program that detects, prevents, and
takes action to disarm or remove malicious software programs, such
as viruses and worms.
COMPUTER ANTIVIRUS HISTORY
The very first anti-virus software wasn't really an anti-virus
software.
It was a removal tool to remove a Polish virus named MKS vir.
That removal tool was released in 1987, and the person who
first had the idea of such removal tool was Bernt Fix.
BENEFITS FROM ANTIVIRUS
Stop Virus-Related Damage
Maintain the PC's Security
Protect Against Email Threats/Spam
Financial Savings
Protect Data and Files
TOP 10 ANTIVIRUS













Norton Antivirus
Kaspersky Antivirus
McAfee Antivirus Plus
Avira Antivir Premium
AVG Antivirus
ESET NOD32 Antivirus
ZoneAlarm Antvirus
Panda Antivirus
BitDefender Antivirus
F-Secure Antivirus
FIREWALL


A personal firewall is an application which controls network traffic to
and from a computer, permitting or denying communications based
on a security policy.



A personal firewall will usually protect only the computer on which it
is installed.



Personal firewalls may also provide some level of trouble detection,
allowing the software to terminate or block connectivity.



Allows the user to control which programs can and cannot access
the local network and/or Internet.



Provide information about the destination server with which an
application is attempting to communicate.
FIREWALL




They block other packets (usually dropping them
without acknowledgment to the sender). In
principle, application firewalls can prevent all
unwanted outside traffic from reaching protected
machines.
Packet filter: Looks at each packet entering or
leaving the network and accepts or rejects it based
on user-defined rules.
FIREWALL PROTECTION CHART
ANKIT FADIA


Ankit Fadia is an independent computer
security consultant



He runs a program on computer security for
corporates in alliance with Reliance Info



He

started

a

website

called

"HackingTruths". At 15, his book on Ethical
Hacking made him the youngest author to
be published by Macmillan India.


Fadia

sponsors

Singapore

Management

University's "Ankit Fadia Study Award", which
consists

of

a

$1000

cash

prize

and

Certificate which is annually awarded to "an
outstanding student“
ANKIT FADIA






According to Wendy McAuliffe at ZDNet UK, Fadia's Hacking
Truths website was judged "second best hacking site" by the Federal
Bureau of Investigation, though no ranked list of "hacking sites“
Person of the Year India 2002’ by Limca Book of Records.
In December 2009 Fadia's business site, hackingmobilephones.com
appeared.

Ankit Fadia’s Hacking Books--





The Unofficial Guide to Ethical Hacking
Network Security: A Hacker's Perspective
Hacking Mobile Phones
Tips and Tricks on Linux
Email Hacking

More Related Content

What's hot (20)

Input,output & storage device ppt
Input,output & storage device pptInput,output & storage device ppt
Input,output & storage device ppt
 
system software and application software
system software and application softwaresystem software and application software
system software and application software
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer Software & It's types.
Computer Software &  It's types.Computer Software &  It's types.
Computer Software & It's types.
 
The desktop
The desktopThe desktop
The desktop
 
Types of application software
Types of application softwareTypes of application software
Types of application software
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Computer security and
Computer security andComputer security and
Computer security and
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Types of software
Types of softwareTypes of software
Types of software
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Introduction to Computer Software
Introduction to Computer SoftwareIntroduction to Computer Software
Introduction to Computer Software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Components of window
Components of windowComponents of window
Components of window
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTER
 
Computer Operations & Packages
Computer Operations & PackagesComputer Operations & Packages
Computer Operations & Packages
 
Computer Software and Operating System
Computer Software and Operating SystemComputer Software and Operating System
Computer Software and Operating System
 
System software and Application software
System software and Application softwareSystem software and Application software
System software and Application software
 

Viewers also liked

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus tayyaba rashid
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
file handling, dynamic memory allocation
file handling, dynamic memory allocationfile handling, dynamic memory allocation
file handling, dynamic memory allocationindra Kishor
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)Abdullah khawar
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
File organization techniques
File organization techniquesFile organization techniques
File organization techniquesMeghlal Khan
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
The Internet & Multimedia Integration
The Internet & Multimedia IntegrationThe Internet & Multimedia Integration
The Internet & Multimedia IntegrationJoseph Stabb, ABD
 

Viewers also liked (20)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Top 10 Latest Viruses
Top 10 Latest VirusesTop 10 Latest Viruses
Top 10 Latest Viruses
 
file handling, dynamic memory allocation
file handling, dynamic memory allocationfile handling, dynamic memory allocation
file handling, dynamic memory allocation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
File organization techniques
File organization techniquesFile organization techniques
File organization techniques
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
The Internet & Multimedia Integration
The Internet & Multimedia IntegrationThe Internet & Multimedia Integration
The Internet & Multimedia Integration
 

Similar to Computer Viruses

Similar to Computer Viruses (20)

viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Social impacts of it
Social impacts of it Social impacts of it
Social impacts of it
 
MALWARE
MALWAREMALWARE
MALWARE
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computervirus
Computervirus Computervirus
Computervirus
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Anti virus
Anti virusAnti virus
Anti virus
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 

More from actanimation

Internet Technology
Internet TechnologyInternet Technology
Internet Technologyactanimation
 
HTML (Hyper Text Markup Language)
HTML (Hyper Text Markup Language)HTML (Hyper Text Markup Language)
HTML (Hyper Text Markup Language)actanimation
 
Financial Accouting
Financial AccoutingFinancial Accouting
Financial Accoutingactanimation
 
Copmuter Languages
Copmuter LanguagesCopmuter Languages
Copmuter Languagesactanimation
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamentalactanimation
 
Java script by Act Academy
Java script by Act AcademyJava script by Act Academy
Java script by Act Academyactanimation
 

More from actanimation (10)

Web Designing Kit
Web Designing KitWeb Designing Kit
Web Designing Kit
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
HTML (Hyper Text Markup Language)
HTML (Hyper Text Markup Language)HTML (Hyper Text Markup Language)
HTML (Hyper Text Markup Language)
 
Financial Accouting
Financial AccoutingFinancial Accouting
Financial Accouting
 
Copmuter Languages
Copmuter LanguagesCopmuter Languages
Copmuter Languages
 
Developers
DevelopersDevelopers
Developers
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
AutoCAD
AutoCADAutoCAD
AutoCAD
 
Java script by Act Academy
Java script by Act AcademyJava script by Act Academy
Java script by Act Academy
 
Act academy
Act academyAct academy
Act academy
 

Recently uploaded

How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 

Recently uploaded (20)

Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 

Computer Viruses

  • 1.
  • 2. COMPUTER VIRUS     A computer virus is a computer program that can reproduce itself and spread from one computer to another. and leaving infections as it travels, Like a human virus. Some virus may cause only testing effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file. It is important to note that a virus cannot be spread without a human action. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
  • 3. EFFECT OF COMPUTER VIRUS       It can slow down your computer. It might corrupt your system files. It might make some programs faulty or corrupt. It might damage your boot sector creating problems when you boot into the windows. it might steal important information from your computer and send to some other person. It might change the power ratings of your computer and could blast the system.
  • 4. VIRUS IMPACT ON SYSTEM ACCESSORIES     Programs. Some viruses may impair your certain computer programs and applications. As a result, you may not be able to access the software or operate it smoothly. Files. There are viruses that may modify, corrupt or delete files in your machine owing to which you may not be able to access them. Hard disk. Some viruses may attack the data present on your computer’s hard disk, resulting in its crash. You may need to reformat the disk in such cases. Operational impact. Some viruses may not apparently harm your system’s integrity and may limit themselves to displaying text messages, images, audio and Video.
  • 5. WHY DO PEOPLE CREATE COMPUTER VIRUS     To take control of a computer and use it for specific tasks To generate money To steal sensitive information (credit card numbers, passwords, personal details, data etc.) To prove a point, to prove it can be done, to prove ones skill or for revenge purposes
  • 6. VIRUS IMPACT ON SYSTEM ACCESSORIES     Hardware. No computer viruses are capable of damaging your hardware yet. They just work on all the files and data of your system, make them useless and disable them. Speed. Your system may slow down under the influence of viruses as they consume your system’s memory for their execution. Booting. Your system may suddenly restart and at times may not load properly. In few cases, you may not be able to access your disk drives. Applications. Viruses may modify, damage or delete your program files and system files because of which applications on your system may not be able to work appropriately.
  • 7. VIRUS IMPACT ON SYSTEM ACCESSORIES   Reinstall. Some computer viruses are designed in the gravest way possible. They cannot be uninstalled easily from your system and some reinstall themselves even after they have been removed. Peripherals. Some viruses may impact device driver software in your computer resulting in the relevant operational issues. For example, disturbed software setting for printer may impair its function.
  • 8. COMPUTER VIRUS HISTORY       Elk Cloner has the distinction of being the first wild virus for a home computer. Coded by then-high-school student, Richard Skrenta, around 1982. who created the search engine blekko. Happy Birthday Joshi', the virus was first discovered in India in June 1990 The first known virus was created in 1971 by Cambridge and was called the Creeper Virus. Creeper was an experimental selfreplicating program written by Bob Thomas at BBN in 1971.
  • 9. COMPUTER VIRUS HISTORY     This virus was spread using the Advanced Research Projects Agency Network (ARPANET). It was designed not to damage but to demonstrate a mobile application. It is generally accepted to be the first computer worm, although the Concept of a "computer virus" did not exist in the 1970s When the computers were infected, the message "I'm the creeper, catch me if you can!" This year marks the 40th anniversary of Creeper.
  • 10. FIRST VIRUS FROM PAKISTAN   World's first computer virus was created to infect IBM PCs by two Pakistani brothers, Amjad and Basit Farooq in 1986. While they were trying to explore their expertise and potential of MS DOS operating system, Virus travelled beyond their imagination through Asia, Europe and was picked up in USA. Amjad and Basit Farooq Alvi
  • 11. FIRST VIRUS FROM PAKISTAN  The first computer virus named “Brain” was designed by Amjad Farooq Alvi and Basit Farooq Alvi.  "Beware of this VIRUS...Contact us for vaccination,". This message was put on the screen.  The interesting fact remains that the location of the “Brain Pvt Limited” is exactly the same where the virus was first developed.
  • 12. 10 LATEST COMPUTER VIRUS Virus name Spreading Damage Discovered Backdoor.IRCBot.Dorkbot.A MEDIUM MEDIUM 2011 May 15 Backdoor.Lavandos.A MEDIUM HIGH 2011 Jan 06 VERY LOW HIGH 2011 Jan 03 Java.Trojan.Downloader.OpenConn ection.AI HIGH MEDIUM 2010 Nov 12 Java.Backdoor.ReverseBackdoor.A LOW MEDIUM 2010 Nov 12 VERY LOW VERY LOW 2010 Oct 28 MEDIUM HIGH 2010 Oct 20 Win32.Worm.Stuxnet.A HIGH MEDIUM 2010 Oct 07 Win32.Worm.Prolaco.S MEDIUM MEDIUM 2010 Oct 06 Exploit.CplLnk.Gen MEDIUM LOW 2010 Jul 19 Trojan.Android.Geinimi.A Win32.Ramnit.G Trojan.Spy.Ursnif.F
  • 13. WORLD’S WORST COMPUTER VIRUS Surreptitious Sircam  Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me.  The worm appeared in e-mail in-boxes with an attachment  the body of the message was in Spanish or English.  Typical greetings included "Hi! How are you?" and "Hola como estas?” Raid raider  Code Red burned brightly in the summer of 2001,  Infecting hundreds of thousands of computers--mainly on corporate networks.
  • 14. WORLD’S WORST COMPUTER VIRUS Maniacal Magistr  Magistr is one of the most complex viruses to hit the Internet.  Its victims, users of Outlook Express, were hooked by an infected email attachment.  The virus, discovered in mid-March 2001,  Sent garbled messages to everyone in the infected user's e-mail address book Melissa  Melissa propagated via infected Microsoft Word documents and mailed itself to Outlook contacts of the contaminated user.
  • 15. WORLD’S WORST COMPUTER VIRUS Expletive Deleted) Explorer  The Explorer.zip worm appeared in the summer of 1999.  The worm deleted Word, Excel, and PowerPoint files and types of files.  Explorer traveled via e-mails that appeared to be from someone the recipient knew. Numbing Nimda  Nimda (also known as the Concept Virus) appeared in September 2001,  Attacking tens of thousands of servers and hundreds of thousands of PCs.  The worm modified Web documents and executable files  The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message
  • 16. SOME COMPUTER SECURITY THREATS ADWARE Adware is software that displays advertisements on your computer. BACKDOOR TROJAN A backdoor Trojan allows someone to take control of another user’s computer via the internet without their permission. BLUE JACKING Bluejacking is sending anonymous, unwanted messages to other users with Bluetooth-enabled mobile phones or laptops. BLUE SNARFING Bluesnarfing is the theft of data from a Bluetooth phone. Like Bluejacking, Bluesnarfing depends on the ability of Bluetoothenabled devices todetect and contact others nearby.
  • 17. SOME COMPUTER SECURITY THREATS BOOT SECTOR VIRUS Boot sector viruses spread by modifying the program that enables your computer to start up BROWSER HIJACKERS Browser hijackers change the default home and search pages in your internet browser CHAIN LETTER In electronic chain letter is an email that urges you to forward copies to other people. COOKIES Cookies are files on your computer that enable websites to remember your details. DENIAL OF SERVICE A denial-of-service (DoS) attack prevents users from accessing a computer or website.
  • 18. SOME COMPUTER SECURITY THREATS    Worms Worms are programs that replicate and spread, often opening a back door to allow hackers to gain access to the computers that they infect. Worms can spread over the Internet by exploiting security flaws in the software of computers that are connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email. Zombies A Zombie is a hidden program that lies inactive on a computer. Zombies don’t normally damage the computer on which they reside but can damage other computers. Zombies often arrive as email attachments and when the attachment is opened they install themselves secretly and then wait to be activated. Phishing A Phishing attack is when you are are sent an email that asks you to click on a link and re-enter your bank or credit card details. These emails can pretend to be from banks, Internet service providers, on-line stores and so on, and both the email and the web site it links to appear genuine. When you enter your bank or credit card details they are then used fraudulently.
  • 19. TYPE OF COMPUTER WORMS ADWARE MALWARE SPYWARE
  • 20. ADWARE  Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.  These advertisements can be in the form of a pop-up.  They may also be in the user interface of the software or on a screen presented to the user during the installation process.  The object of the Adware is to generate revenue for its author  Advertising functions are integrated into or bundled with the software, which is often designed to note what Internet sites the user visits
  • 21. MALWARE  Malware, short for malicious software, Malware is a very general word for software that deliberately harms, restricts, alters, or stops your computer from working properly where the true purpose of the download or installation is hidden or difficult to find and not clearly explained to the user .  Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, and other malicious and unwanted software or program.  Malware can arrive through an internet download, as an email link or attachment  as a file sent between users of instant messaging, social networking communities, peer-to-peer file sharing programs, online games, online video games or chatrooms or a link to a malicious webpage.
  • 22. MALWARE  The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior.  The term computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables .  On the other hand, a worm is a program that actively transmits itself over a network to infect other computers
  • 23. INDICATION OF MALWARE  the browser’s home page keeps changing  Pop-up advertisements appear when your browser is closed,.  Strange icons appear on your desktop without your prompting or knowledge of the program  The computer light is blinking (meaning that your computer is processing information) at unusual or unexpected times.  Your browser settings keep changing, including the webpage you designate as your internet start-up page  Files are uploaded or downloaded without your prompting or permission.
  • 24. SPYWARE  Spyware is Internet language for Advertising Supported software (Adware).  Spyware is tracking software that hides itself (runs in the background) and gathers information without the computer owner's or user's knowledge or permission for the benefit of someone else  The first recorded use of the term spyware occurred on 16 October 1995.  showing them pop-up ads, or altering web-browser behavior for the financial benefit of the spyware creator.  For instance, some spyware programs redirect search engine results to paid advertisements.
  • 25. SPYWARE     Others, often called "stealware" by the media, overwrite affiliate marketing codes so that revenue is redirected to the spyware creator rather than the intended recipient. The presence of spyware is typically hidden from the user, and can be difficult to detect Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, As of 2006, spyware has become one of the preeminent security threats to computer systems running Microsoft Windows operating systems.
  • 26. GUIDELINE TO AVOID SPYWARE       Not opening emails or email attachments from unknown senders Block or don’t click on suspicious pop-up windows Don’t open files that are more prone to be associated with malware such as .bat, .pif, .txt .vbs, .htm .exe or .vbs Don’t download or execute applications from untrusted sources. Avoid phishing scams. Use updated anti-virus and anti-spyware software regularly.
  • 27. COMPUTER ANTIVIRUS  A utility that searches a hard disk for viruses and removes any that are found.  Antivirus software is a computer program you install on your machine that scans files for malicious (dangerous) programs and either deletes them or "heals" them therefore eliminating the threat of damage to your computer.  Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered.  Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms.
  • 28. COMPUTER ANTIVIRUS HISTORY The very first anti-virus software wasn't really an anti-virus software. It was a removal tool to remove a Polish virus named MKS vir. That removal tool was released in 1987, and the person who first had the idea of such removal tool was Bernt Fix.
  • 29. BENEFITS FROM ANTIVIRUS Stop Virus-Related Damage Maintain the PC's Security Protect Against Email Threats/Spam Financial Savings Protect Data and Files
  • 30. TOP 10 ANTIVIRUS           Norton Antivirus Kaspersky Antivirus McAfee Antivirus Plus Avira Antivir Premium AVG Antivirus ESET NOD32 Antivirus ZoneAlarm Antvirus Panda Antivirus BitDefender Antivirus F-Secure Antivirus
  • 31. FIREWALL  A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy.  A personal firewall will usually protect only the computer on which it is installed.  Personal firewalls may also provide some level of trouble detection, allowing the software to terminate or block connectivity.  Allows the user to control which programs can and cannot access the local network and/or Internet.  Provide information about the destination server with which an application is attempting to communicate.
  • 32. FIREWALL   They block other packets (usually dropping them without acknowledgment to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines. Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules.
  • 34. ANKIT FADIA  Ankit Fadia is an independent computer security consultant  He runs a program on computer security for corporates in alliance with Reliance Info  He started a website called "HackingTruths". At 15, his book on Ethical Hacking made him the youngest author to be published by Macmillan India.  Fadia sponsors Singapore Management University's "Ankit Fadia Study Award", which consists of a $1000 cash prize and Certificate which is annually awarded to "an outstanding student“
  • 35. ANKIT FADIA    According to Wendy McAuliffe at ZDNet UK, Fadia's Hacking Truths website was judged "second best hacking site" by the Federal Bureau of Investigation, though no ranked list of "hacking sites“ Person of the Year India 2002’ by Limca Book of Records. In December 2009 Fadia's business site, hackingmobilephones.com appeared. Ankit Fadia’s Hacking Books--     The Unofficial Guide to Ethical Hacking Network Security: A Hacker's Perspective Hacking Mobile Phones Tips and Tricks on Linux Email Hacking