Computer Viruses - Everything You Need To Know
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
315
On Slideshare
315
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
2
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. COMPUTE RVIRUS
  • 2. Virus=Vital Information Resources Under Seize
  • 3. A Computer Virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. What is a Computer Virus ?
  • 4. How are viruses spread ? A virus can only spread from one computer to another when its host is taken to the uninfected computer for instance by a user sending it over a network or the Internet or by carrying it on a removable medium such as a floppy disk CD or USB drive.
  • 5. TYPES OF VIRUSES On the basis of scale there are five types of viruses under one name: MALWAR E Spyware Adware Worms Trojans Rootkits
  • 6. MALWARE Malware from the words malicious and software is a software designed to infiltrate or damage a computer system without the owner's informed consent. It includes spyware adware computer worms and
  • 7. SPYWARE Spyware is computer software that is installed secretly on a personal computer to intercept or take partial control over the user's interaction with the computer without the user's informed consent.
  • 8. ADWARE Adware or advertising- supported software is any software package which automatically plays displays or downloads advertisements to a computer after the software is installed on it or while the
  • 9. COMPUTER WORMS A Computer Worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes computer terminals on the network and it may do so without any user intervention. It always cause harm to the network, if only by consuming bandwidth.
  • 10. TROJAN HORSES A Trojan horse is a malware that appears to perform a desirable function but in fact performs undisclosed malicious functions.
  • 11. ROOTKITS A Rootkit is a computer virus which consists of a program designed to take fundamental control of a computer system without authorization by the system's owners and legitimate managers.
  • 12. ANTI-
  • 13. Anti-Virus Softwares are computer programs that attempt to identify neutralize or eliminate malicious software. Most modern antivirus software is now designed to combat a wide range of threats including worms rootkits Trojans often described collectively as
  • 14. How does an Anti-Virus work? There are two common methods that an anti-virus software application uses to detect viruses  The first and by far the most common method of virus detection is using a list of virus signature definitions.  The second method is to use a heuristic algorithm to find viruses based on common behaviors.
  • 15. VIRUS REMOVAL One possibility on Windows Me Windows XP and Windows Vista is a tool known as System Restore which restores the registry and critical system files to a previous
  • 16. Manual Prevention from Viruses  Delete your browsing history temporary internet files internet cookies before exiting . Always remember to scan any removable hardware using anti- virus software before accessing it. Removable hardware includes Floppy Disks CD USB Drive.  Update your anti-virus for new and latest virus definitions.  Scan your computer every week using anti-virus software like Norton McAfee for prevention against malware.  Create a system restore point before installing any software or freeware.
  • 17. PREVENTION IS BETTER THAN CURE
  • 18. Which is the first computer virus? a. The Brain Virus b. The Creeper c. Blackworm d. Fyxam 1.
  • 19. Which is the first computer virus to use polymorphic mutation? a. Abraxas5 b. Acid .670a c. Agena d. V2PX 2.
  • 20. WHICH IS THE FIRST VIRUS REMOVAL PROGRAM? a. AVG b. AVIRA c. The Reaper d. The Killer 3.
  • 21. Which is the first virus geared against children? a. Tyson Virus b. Pikachu Virus c. Gnome Virus d. Scooby Virus 4.
  • 22. Which was the virus designed in 1988 to attack two specific programs which were never released? a. Scores b. AGI-plan c. AirCop d. Anti-CMOS 5.
  • 23. Which is the first computer virus for the personal computers?> a. The Creeper b. The Brain Virus c. Blackworm d. Fyxam 6.
  • 24. Which was the first worm to spread via mms and Bluetooth? a. Enigma b. TRANSLTR c. COMMWarrior d. Blue Hell 7.
  • 25. a. 1978 b. 2003 c. 2007 d. 1999 When was the Melissa Virus Written?8.
  • 26. Which is the first widespread polymorphic virus found in the public? a. Canter b. Newmantec c. Tequila d. Jingle-Jingle 9.
  • 27. WHICH IS THE FIRST TOOLKIT THAT TURNS ORDINARY VIRUSES INTO POLYMORPHIC VIRUSES? a. Mutation Stringed Alpha Projector b. Dark Avenger Mutation Engine c. Melissa Mutation String Program 10.
  • 28. 1. The Creeper The Creeper was created as an experimental self replicating program and was created by Bob Thomas at BBN in 1971.
  • 29. 2. V2px V2PX was created by Mark Washburn in 1989. The V2PX is also known as 1260. It was isolated in 1990.
  • 30. 3. The reaper The Reaper program was a computer worm like Creeper but its purpose was to delete the latter. This fact was an inspiration for Core War and for the D-Reaper the final enemy of Digimon Tamers.
  • 31. 4. The Pikachu Virus The virus had started on June 28, 2000 by someone in Asia . Its main form of spread is through Microsoft Outlook email attachments or through Microsoft's Internet Explorer browser where it managed to infect a small number of US companies
  • 32. 5. Scores Scores was a  computer virus affecting Macintosh ma chines. It was first discovered in Spring 1988. It was written by a disgruntled programmer and specifically attacks two applications that were under development at his former company. These programs were never released to the public.
  • 33. 6. The Brain Virus Brain is the industry standard name for a computer virus that was released in its first form in January 1986 and is considered to be the first computer virus for MS- DOS. It infects the boot sector of storage media formatted with the DOS File Allocation Table FAT file system. Brain was written by
  • 34. 7. Commwarrior Commwarrior is a Symbian Bluetooth worm that was the first to spread via Multimedia Messaging Service MMS and Bluetooth The worm affects only the Nokia Series 60software platform. It was released in 2005.
  • 35. 8. 1999 The Melissa virusW97M Melissa executes a macro in a document attached to an email which forwards the document to 50 people in the user's Outlook address book. The virus also infects other Word documents and subsequently mails them out as attachments. Melissa spread faster than any previous
  • 36. 9. Tequila Tequila is the first widespread polymorphic virus found in the wild. Polymorphic viruses make detection difficult for virus scanners by changing their appearance with each new infection. Tequilla was written in 1991.
  • 37. 10. Dark avenger mutation engine The Dark Avenger Mutation Engine DAME is created. It is a toolkit that turns ordinary viruses into polymorphic viruses. The Virus Creation Laboratory VCL is also made available. It is the first actual virus creation kit.
  • 38. THANK YOU