Your SlideShare is downloading. ×
0
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Virus ......................... Khatarn
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Virus ......................... Khatarn

98

Published on

Published in: Mobile, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
98
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. VIRUS stands for ”Vital Information Resource Under Siege ”. A computer virus is a computer program that can replicate itself and spread from one computer to another. A computer program loaded to your computer with-out your knowledge or permission and runs against your wishes. All computer viruses are manmade.  Even such a simple virus is dangerous because it will use all the available memory and bring the system to the holt. The virus stays active in the background and infect new hosts those files are accessed by other program or the operating system itself.
  • 2. The computer runs slower than usual. The computer crashes, and then it restarts every few minutes. Applications on the computer do not work correctly. Disks or disk drives are inaccessible. You see unusual error messages. An antivirus program cannot be installed on the computer, or the antivirus program will not run. New icons appear on the desktop that you did not put Increases the use of disk space and growth in file size as virus gets attached itself to many files.
  • 3. Viruses can be divided into two types based on their behavior when they are executed. Resident Nonresident Resident Virus:- Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. Non-Resident Virus:- Nonresident viruses immediately search for other hosts that can be infected, infect those targets, and finally transfer control to the application program they infected.
  • 4. There are different types of computer virus.
  • 5. Trojan Horses are actually normal computer program. This is different from a regular virus because it does not attempt to reproduce itself. Trojan Horses do not affect a great number of people because they are discover quickly.
  • 6. It has been made copy itself from one computer to another over network. It is very harmful virus because it has reproduce nature. Marco virus spread much more than other type of viruses as people frequently share data files, it spread round the word in two hours effecting tens of millions of computer
  • 7. A block of code which attaches itself to another program and it can copy itself in to subsequent applications that you run.
  • 8. On downloading files from the Internet. On opening an e-mail attachment. On copying programs or files from any other infected computer.
  • 9. Most viruses have two phases to their existence, the “infection phase” and the “attack phase”. All viruses have an infection phase, but not all have an attack phase. During the infection phase, the virus spreads itself.
  • 10. "Your friend gives you a game on a disk. The game has an infected file that you don't know about. Each time you play the game, the virus copies itself into another program without you knowing. Now, whenever either of the programs are executed, the virus is copied. This continues as the virus infects the rest of the computer. If any of the files are transferred to a floppy disk or e-mail attachment, and they are put on another computer, the process starts again"
  • 11. The attack phase is set off by a trigger, such as a time or date. The attack phase is when the virus causes damage or other unwanted system behavior. In order to make sure it has spread, viruses often delay the attack phase, sometimes for years.
  • 12. Here are some tips that can help prevent a computer virus from attacking your system. Your first line of defense is to install anti-virus software. . This software can scan all your drives for viruses and neutralize them. Install updated and good quality Anti-Virus software that provides complete protection from spyware, adware and malware too. Schedule a complete system scan at least once a week to keep your system clean. Schedule a complete system scan at least once a week to keep your system clean
  • 13. Kasper Sky Anti Virus Bit Defender Anti Virus Trend Micro Norton Anti Virus Internet Security McAfee Antivirus Panda Anti Virus Pro 2009 Zone Alarm Anti Virus F-Secure Anti Virus AVG Anti Virus ESET NOD32 Anti Virus

×