• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content

Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Computer virus

on

  • 8,076 views

 

Statistics

Views

Total Views
8,076
Views on SlideShare
7,941
Embed Views
135

Actions

Likes
11
Downloads
871
Comments
2

3 Embeds 135

http://intertest.blackboard.com 67
http://intertest.blackboard.com 67
http://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as OpenOffice

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

12 of 2 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Computer virus Computer virus Presentation Transcript

      • Presented by: Maximino E. Santos Jr. Computer Teacher-PNHS
        COMPUTER VIRUS
      • What is a Computer Viruses
        Computer Viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
      • Why people create computer viruses
      • Computer viruses do not come into existence spontaneously. They are deliberately created by programmers, or by people who use virus creation software.
      • Virus writers can have various reasons for creating and spreading malware. Viruses have been written as research projects, pranks, to attack the products of specific companies, to distribute political messages, and financial gain from identity theft, spyware, and cryptoviral extortion. Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby.
      • Ways of computer viruses enter your computer
        Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
      • How to detect virus? Some Symptoms
        • Program takes longer to load.
        • The program size keeps changing.
        • The drive light keeps flashing when you are not doing anything.
        • User created files have strange names.
        • The computer doesn't remember CMOS settings.
      • Examples of computer viruses
        Trojan Horse: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
      • Worm: A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.
      • Bootsector Virus : A virus which attaches itself to the first part of the hard disk that is read by the computer upon boot up. These are normally spread by floppy disks. Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.
      • Spy ware
      • Spyware, on the other hand, is generally not designed to damage your computer. Spyware is broadly defined as any program that gets into your computer without permission and hides in the background while it makes unwanted changes to your user experience.
      • most spyware targets only the Windows operating system . Some of the more notorious spyware companies include Gator, Bonzi Buddy, 180 Solutions, DirectRevenue, Cydoor, CoolWebSearch, Xupiter, XXXDial and Euniverse.
      • How Did it Get on Your Computer?
      • Spyware usually gets onto your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser
      • How Did it Get on Your Computer?
      • Drive-by download - This is when a Web site or pop-up window automatically tries to download and install spyware on your machine
      • Browser add-ons - These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box.
      • browser hijackers -- these embed themselves deeply in your machine and take quite a bit of work to get rid of.
      • Steps to avoid virus
      • Don’t open e-mail that you are not sure.
      • All thumbdrive need to scan by anti-virus software.
      • Always scan your PC with anti-virus software.
      • How to protect your computer from computer viruses
      • Only open e-mail attachments received from sources you trust and that you are expecting.
      • Back up your hard drive files frequently and maintain multiple backup sets.
      • If you are experiencing unusually slow performance, apparent file loss or damage, or other abnormalities, immediately check your hard drives and diskettes for infection.
      • Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network.
      • Download software only from sites you are familiar with, and immediately check it with your anti-virus software.
      • Don't spread hoaxes and rumors.
      • TOP 10 ANTIVIRUS OF 2010
      • BitDefender Antivirus
      • Kaspersky Anti-Virus
      • Webroot AntiVirus with SpySweeper
      • Norton AntiVirus
      • ESET Nod32 Antivirus
      • AVG Anti-Virus
      • F-Secure Anti-Virus
      • G DATA AntiVirus
      • Avira AntiVir
      • Trend Micro
      • End
      • References
      • http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp - The Difference Between a Virus, Worm, and Trojan Horse.
      • http://en.wikipedia.org/wiki/Computer_virus - Computer Virus
      • http://www.microsoft.com/protect/computer/basics/virus.mspx - What is Computer Viruses
      • http://www.soe.umich.edu/computingnetwork/howto/avoidviruses - How To Avoid Computer Viruses