SlideShare a Scribd company logo
1 of 20
Computer Virus
The First Computer Virus
 Elk Cloner is one of the first known microcomputer
viruses that spread "in the wild," i.e., outside the
computer system or lab in which it was written.
 It was written around 1982 by a 15-year-old high
school student named Rich Skrenta for Apple II
systems.
Types of viruses
Boot viruses
Program viruses
Multipartite viruses
Stealth viruses
Polymorphic viruses
Macro Viruses
 Infect floppy disk boot records or master boot
records in hard disks.
 They replace the boot record program copying it
elsewhere on the disk or overwriting it.
 Boot viruses load into memory if the computer
tries to read the disk while it is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone virus
 infect executable program files, such as those
with extensions like
.BIN, .COM, .EXE, .OVL, .DRV (driver) and
.SYS (device driver).
 These programs are loaded in memory during
execution, taking the virus with them.
 The virus becomes active in memory, making
copies of itself and infecting files on disk.
Examples: Sunday, Cascade
 A hybrid of Boot and Program viruses
 They infect program files and when the
infected program is executed, these viruses
infect the boot record.
 When you boot the computer next time the
virus from the boot record loads in memory
and then starts infecting other program files
on disk.
Examples: Invader, Flip, andTequila
 These viruses use certain techniques to avoid
detection
 They may either redirect the disk head to
read another sector instead of the one in
which they reside or they may alter the
reading of the infected file’s size shown in the
directory listing.
Examples: Frodo, Joshi,Whale
 A virus that can encrypt its code in different
ways so that it appears differently in each
infection.
 These viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil,
Proud,Virus 101
 A macro virus is a new type of computer virus
that infects the macros within a document or
template.
 When you open a word processing or
spreadsheet document, the macro virus is
activated and it infects the Normal template
(Normal.dot)-a general purpose file that
stores default document formatting settings.
 Every document you open refers to the
Normal template, and hence gets infected
with the macro virus.
 Since this virus attaches itself to
documents, the infection can spread if such
documents are opened on other computers.
Examples: DMV, Nuclear,Word Concept.
 Adware or advertising-supported software
is any software package which automatically
plays, displays, or downloads advertisements
to a computer after the software is installed
on it or while the application is being used.
Some types of adware are also spyware and
can be classified as privacy-invasive software.
 Malware, short for malicious software, is
software designed to infiltrate a computer
without the owner's informed consent. The
expression is a general term used by
computer professionals to mean a variety of
forms of hostile, intrusive, or annoying
software or program code. The term
"computer virus" is sometimes used as a
catch-all phrase to include all types of
malware, including true viruses.
 Once a malicious program is installed on a system, it is
essential that it stay concealed, to avoid detection and
disinfection.The same is true when a human attacker
breaks into a computer directly.Techniques known as
rootkits allow this concealment, by modifying the host
operating system so that the malware is hidden from the
user. Rootkits can prevent a malicious process from being
visible in the system's list of processes, or keep its files
from being read. Originally, a rootkit was a set of tools
installed by a human attacker on a Unix system where the
attacker had gained administrator (root) access.
Today, the term is used more generally for concealment
routines in a malicious program.
 A backdoor is a method of bypassing normal
authentication procedures.Once a system has
been compromised one or more backdoors may
be installed in order to allow easier access in the
future. Backdoors may also be installed prior to
malicious software, to allow attackers entry
 Crackers typically use backdoors to secure
remote access to a computer, while attempting
to remain hidden from casual inspection.
 Spam is the abuse of electronic messaging systems
(including most broadcast media, digital delivery
systems) to send unsolicited bulk messages
indiscriminately. While the most widely recognized
form of spam is e-mail spam
 E-mail spam, known as unsolicited bulk Email (UBE),
junk mail, or unsolicited commercial email (UCE), is
the practice of sending unwanted e-mail messages,
frequently with commercial content, in large
quantities to an indiscriminate set of recipients.
 Spyware is a type of malware that is installed on
computers and that collects information about
users without their knowledge. The presence of
spyware is typically hidden from the user.
Typically, spyware is secretly installed on the
user's personal computer.
Sometimes, however, spywares such as
keyloggers are installed by the owner of a
shared, corporate, or public computer on purpose
in order to secretly monitor other users.
 Wikipedia
Thank
s

More Related Content

What's hot

La Red Y Sus Amenazas Powerpoint
La Red Y Sus Amenazas   PowerpointLa Red Y Sus Amenazas   Powerpoint
La Red Y Sus Amenazas Powerpointcarmelacaballero
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case StudyAmr Thabet
 
Penetration Security Testing
Penetration Security TestingPenetration Security Testing
Penetration Security TestingSanjulika Rastogi
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Ransomware
Ransomware Ransomware
Ransomware Armor
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminalsOnline
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
My darkweb-presentation
My darkweb-presentationMy darkweb-presentation
My darkweb-presentationPaul Wilson
 
вируси, антивируси и защитни стени Word
 вируси, антивируси и защитни стени  Word вируси, антивируси и защитни стени  Word
вируси, антивируси и защитни стени WordTanya Hristova
 
unit 2 -program security.pdf
unit 2 -program security.pdfunit 2 -program security.pdf
unit 2 -program security.pdfKavithaK23
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 

What's hot (20)

Spyware
SpywareSpyware
Spyware
 
MALWARE
MALWAREMALWARE
MALWARE
 
The Dark web | Presentation
The Dark web | Presentation The Dark web | Presentation
The Dark web | Presentation
 
La Red Y Sus Amenazas Powerpoint
La Red Y Sus Amenazas   PowerpointLa Red Y Sus Amenazas   Powerpoint
La Red Y Sus Amenazas Powerpoint
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case Study
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Penetration Security Testing
Penetration Security TestingPenetration Security Testing
Penetration Security Testing
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Ransomware
Ransomware Ransomware
Ransomware
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
My darkweb-presentation
My darkweb-presentationMy darkweb-presentation
My darkweb-presentation
 
вируси, антивируси и защитни стени Word
 вируси, антивируси и защитни стени  Word вируси, антивируси и защитни стени  Word
вируси, антивируси и защитни стени Word
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
unit 2 -program security.pdf
unit 2 -program security.pdfunit 2 -program security.pdf
unit 2 -program security.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Malicious software
Malicious softwareMalicious software
Malicious software
 

Similar to Computer virus (20)

W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus
VirusVirus
Virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 

More from Ambadi S - HR Professional (9)

HR Dictionary
HR DictionaryHR Dictionary
HR Dictionary
 
Recruitment plan
Recruitment planRecruitment plan
Recruitment plan
 
Psychology of Learning
Psychology of LearningPsychology of Learning
Psychology of Learning
 
Organisation Study - Indian Rare Earths Limited
Organisation Study - Indian Rare Earths LimitedOrganisation Study - Indian Rare Earths Limited
Organisation Study - Indian Rare Earths Limited
 
Mis
MisMis
Mis
 
Hrm wages
Hrm  wagesHrm  wages
Hrm wages
 
Comic Presentation
Comic PresentationComic Presentation
Comic Presentation
 
Consumer Protection Act 1986
Consumer Protection Act 1986Consumer Protection Act 1986
Consumer Protection Act 1986
 
Constitution of india
Constitution of indiaConstitution of india
Constitution of india
 

Recently uploaded

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 

Recently uploaded (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

Computer virus

  • 2.
  • 3. The First Computer Virus  Elk Cloner is one of the first known microcomputer viruses that spread "in the wild," i.e., outside the computer system or lab in which it was written.  It was written around 1982 by a 15-year-old high school student named Rich Skrenta for Apple II systems.
  • 4. Types of viruses Boot viruses Program viruses Multipartite viruses Stealth viruses Polymorphic viruses Macro Viruses
  • 5.  Infect floppy disk boot records or master boot records in hard disks.  They replace the boot record program copying it elsewhere on the disk or overwriting it.  Boot viruses load into memory if the computer tries to read the disk while it is booting. Examples: Form, Disk Killer, Michelangelo, and Stone virus
  • 6.  infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver).  These programs are loaded in memory during execution, taking the virus with them.  The virus becomes active in memory, making copies of itself and infecting files on disk. Examples: Sunday, Cascade
  • 7.  A hybrid of Boot and Program viruses  They infect program files and when the infected program is executed, these viruses infect the boot record.  When you boot the computer next time the virus from the boot record loads in memory and then starts infecting other program files on disk. Examples: Invader, Flip, andTequila
  • 8.  These viruses use certain techniques to avoid detection  They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. Examples: Frodo, Joshi,Whale
  • 9.  A virus that can encrypt its code in different ways so that it appears differently in each infection.  These viruses are more difficult to detect. Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101 Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud,Virus 101
  • 10.  A macro virus is a new type of computer virus that infects the macros within a document or template.  When you open a word processing or spreadsheet document, the macro virus is activated and it infects the Normal template (Normal.dot)-a general purpose file that stores default document formatting settings.
  • 11.  Every document you open refers to the Normal template, and hence gets infected with the macro virus.  Since this virus attaches itself to documents, the infection can spread if such documents are opened on other computers. Examples: DMV, Nuclear,Word Concept.
  • 12.
  • 13.  Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software.
  • 14.  Malware, short for malicious software, is software designed to infiltrate a computer without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
  • 15.  Once a malicious program is installed on a system, it is essential that it stay concealed, to avoid detection and disinfection.The same is true when a human attacker breaks into a computer directly.Techniques known as rootkits allow this concealment, by modifying the host operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system's list of processes, or keep its files from being read. Originally, a rootkit was a set of tools installed by a human attacker on a Unix system where the attacker had gained administrator (root) access. Today, the term is used more generally for concealment routines in a malicious program.
  • 16.  A backdoor is a method of bypassing normal authentication procedures.Once a system has been compromised one or more backdoors may be installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry  Crackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection.
  • 17.  Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam  E-mail spam, known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
  • 18.  Spyware is a type of malware that is installed on computers and that collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.