Your SlideShare is downloading. ×
Antivirus!!
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Antivirus!!

1,590
views

Published on

Published in: Technology

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,590
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
137
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ANTI VIRUS !! BY : NOOR SHAFIQAH BT NOOR SHAM
  • 2. COMPUTER VIRUS
    • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.
  • 3. VIRUS
    • The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus . A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk , CD , USB drive or by the Internet. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that iViruses are sometimes confused with computer worms and Trojan horses . A worm, however, can spread itself to other computers without needing to be transferred as part of a host. s accessed by another computer.
  • 4. WHY PEOPLE CREATE COMPUTER VIRUSES??
    • They are deliberately created by programmers, or by people who use virus creation software. Computer viruses can only do what the programmers have programmed them to do.
    • Viruses have been written as research projects, pranks, vandalism , to attack the products of specific companies, to distribute political messages, and financial gain from identity theft , spyware , and cryptoviral extortion . Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby. Additionally, many virus writers oppose deliberately destructive payload routines.
  • 5. VECTORS & HOST
    • Viruses have targeted various types of transmission media or hosts. This list is not exhaustive:
    • Binary executable files (such as COM files and EXE files in MS-DOS , Portable Executable files in Microsoft Windows , and ELF files in Linux)
    • Volume Boot Records of floppy disks and hard disk partitions
    • The master boot record (MBR) of a hard disk
    • General-purpose script files (such as batch files in MS-DOS and Microsoft Windows , VBScript files, and shell script files on Unix-like platforms).
    • Application-specific script files (such as Telix -scripts)
    • Documents that can contain macros (such as Microsoft Word documents, Microsoft Excel spreadsheets, AmiPro documents, and Microsoft Access database files)
    • Cross-site scripting vulnerabilities in web applications
  • 6. METHODS TO AVOID DETECTION
    • Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example the CIH virus , or Chernobyl Virus , infects Portable Executable files. Because those files had many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file.
  • 7. ANTI VIRUS SOFTWARE
    • Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software ( malware ).
    • Antivirus software typically uses two different techniques to accomplish this:
    • Examining (scanning) files to look for known viruses matching definitions in a virus dictionary
    • Identifying suspicious behavior from any computer program which might indicate infection. Such analysis may include data captures, port monitoring and other methods.
  • 8. CONCLUSION
    • Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus depend on severity of the type of virus.
  • 9.
    • THANK
    • YOU!!