SlideShare a Scribd company logo
1 of 21
VIRUS & ANTI-VIRUS
VS
GROUP MEMBERS:
Shazaib Malik
2019-BT-CIVL-02
M Abdullah
2019-BT –CIVIL-10
M Shazaib
2019-BT-CIVIL-05
M Faisal H Q
2019-BT-CIVIL-26
CONTENT:
VIRUS:
 WHAT IS A COMPUTER VIRUS.
 HOW IT IS WORK.
 TYPES OF VIRUS.
 EXPLAIN THE TYPES OF VIRUSES.
 DISADVANTAGES.
ANATI-VIRUS:
 WHAT IS A COMPUTER ANTI-VIRUS.
 HOW IT IS WORK.
 TYPES OF VIRUS.
 EXPLAIN THE TYPES OF ANTI-VIRUSES.
 ADVANTAGES.
WHAT IS A COMPUTER VIRUS:
 Computer Viruses are small software programs that are
designed to spread from one computer to another and to
interfere with computer operation.
HOW IT IS WORK:
 A virus is a small piece of software that piggybacks on real programs.
For example, a virus might attach itself to a program such as a
spreadsheet program. Each time the spreadsheet program runs,
the virus runs, too, and it has the chance to reproduce (by attaching to
other programs) or wreak havoc
WHAT IS A COMPUTER ANTI-
VIRUS:
 An antivirus software is a computer
program that identifies and removes
computer viruses, and other malicious
software like Worms and Trojans from
an infected computer. Not only this, an
antivirus software also protects the
computer from further virus attacks.
HOW IT IS WORK:
 The antivirus software examines each
and every file in a computer.
 It also examines its content with the virus
definitions stored in its virus dictionary.
 A virus dictionary is an inbuilt file belonging
to an antivirus software that contains code identified
as a virus by the antivirus authors.
TYPES OF VIRUSES:
 Trojan Horse
 Boot Sector Virus.
 Worms.
 Polymorphic virus.
 Macro virus.
 Memory Resident Virus
EXPLAIN
THE
TYPES
OF
VIRUSES:
Trojan Horse:
 A Trojan is a program file that claims to
do something but it actually does something
that is not required. Trojans can be employed
by cyber-thieves and hackers trying to gain
access to users' systems. Users are typically
tricked by some form of social engineering into
loading and executing Trojans on their systems.
Boot Sector Virus:
 The boot sector virus copies the
virus code in the boot sector and that infects
a storage device's master boot record (MBR).
It is not mandatory that a boot sector virus
Successfully boot the victim's PC to infect it.
As a result, even non-bootable media can
trigger the spread of boot sector viruses.
Worms:
 Worms are program that replicate
and spread to other system. Worms
almost always cause at least some harm
to the network, even if only by consuming
bandwidth., whereas viruses almost always
corrupt or modify files on a targeted computer.
TYPES OF ANTI-VIRUS:
AVG
MCAFEE
NORTON
KASPERSKY
AD-AWARE
EXPLAIN
THE
TYPES
OF
VIRUSES.
AVG ANTI-VIRUS:
 AVG is one of the most popular antivirus
programs. It can also work with a number
of different Windows operating systems. It
Is scanning all the files on the computer at
regular intervals. Additionally, it has the
ability to quarantine virus files so that they
cannot do any harm before they can be
checked and deleted.
McAfee ANTI-VIRUS:
 McAfee Virus Scan has been another very
popular antivirus program on the market for
years. It is necessary to take out a subscription
to use McAfee, but it will give you access to
continuously updating virus protection.
NORTON ANTI-VIRUS:
 Norton programs are used by the majority of
computer users on the market, who pay an annual
fee for a subscription service. Norton Anti-Virus
and Norton Internet Security are software programs
that search the computer regularly and delete any
viruses that they find.
DISADVANTAGES OF VIRUS:
• Viruscancrashwindow.
• Viruscanremovewindowfilesduetothisthecomputersystemslow
down.
• viruscanstolethevaluabledataofyourcomputer.
• Duetosomevirusthehardwareofcomputersystemcannotwork
properly.
ADVANTAGES OF ANTI-VIRUS:
Protection from Viruses & Spyware. ...
Protection from Phishing Attacks. ...
Provides Robust Web Protection. ...
Provides quick scan of removable device. ...
Two-Way Firewall. ...
Block Ads and Spam Website. ...
Provides Password Protection. ...
Parental Control.
REFERENCES:
 WWW.GOOGLE.COM
 SLIDE SHARE WEB
 TECHWAL.COM
 WIKIPEDIA
 The Art of Deception. Kevin D. Mitnick. ...
 Sandworm. Andy Greenberg. 05 Nov 2019. ...
 Black Hat Python. Justin Seitz. 21 Jan 2015. …
Viruses vs Antivirus Software

More Related Content

What's hot

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran universityRebaz Hamad
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 

What's hot (20)

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 

Similar to Viruses vs Antivirus Software

11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxbmokemane4
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxbmokemane4
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxbmokemane4
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 

Similar to Viruses vs Antivirus Software (20)

11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus
VirusVirus
Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
information about virus
information about virusinformation about virus
information about virus
 
Virus
VirusVirus
Virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Malware
MalwareMalware
Malware
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptx
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptx
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptx
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation2
Presentation2Presentation2
Presentation2
 

Recently uploaded

GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 

Recently uploaded (20)

GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 

Viruses vs Antivirus Software

  • 2. GROUP MEMBERS: Shazaib Malik 2019-BT-CIVL-02 M Abdullah 2019-BT –CIVIL-10 M Shazaib 2019-BT-CIVIL-05 M Faisal H Q 2019-BT-CIVIL-26
  • 3. CONTENT: VIRUS:  WHAT IS A COMPUTER VIRUS.  HOW IT IS WORK.  TYPES OF VIRUS.  EXPLAIN THE TYPES OF VIRUSES.  DISADVANTAGES. ANATI-VIRUS:  WHAT IS A COMPUTER ANTI-VIRUS.  HOW IT IS WORK.  TYPES OF VIRUS.  EXPLAIN THE TYPES OF ANTI-VIRUSES.  ADVANTAGES.
  • 4. WHAT IS A COMPUTER VIRUS:  Computer Viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
  • 5. HOW IT IS WORK:  A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc
  • 6. WHAT IS A COMPUTER ANTI- VIRUS:  An antivirus software is a computer program that identifies and removes computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks.
  • 7. HOW IT IS WORK:  The antivirus software examines each and every file in a computer.  It also examines its content with the virus definitions stored in its virus dictionary.  A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.
  • 8. TYPES OF VIRUSES:  Trojan Horse  Boot Sector Virus.  Worms.  Polymorphic virus.  Macro virus.  Memory Resident Virus
  • 10. Trojan Horse:  A Trojan is a program file that claims to do something but it actually does something that is not required. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.
  • 11. Boot Sector Virus:  The boot sector virus copies the virus code in the boot sector and that infects a storage device's master boot record (MBR). It is not mandatory that a boot sector virus Successfully boot the victim's PC to infect it. As a result, even non-bootable media can trigger the spread of boot sector viruses.
  • 12. Worms:  Worms are program that replicate and spread to other system. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth., whereas viruses almost always corrupt or modify files on a targeted computer.
  • 15. AVG ANTI-VIRUS:  AVG is one of the most popular antivirus programs. It can also work with a number of different Windows operating systems. It Is scanning all the files on the computer at regular intervals. Additionally, it has the ability to quarantine virus files so that they cannot do any harm before they can be checked and deleted.
  • 16. McAfee ANTI-VIRUS:  McAfee Virus Scan has been another very popular antivirus program on the market for years. It is necessary to take out a subscription to use McAfee, but it will give you access to continuously updating virus protection.
  • 17. NORTON ANTI-VIRUS:  Norton programs are used by the majority of computer users on the market, who pay an annual fee for a subscription service. Norton Anti-Virus and Norton Internet Security are software programs that search the computer regularly and delete any viruses that they find.
  • 18. DISADVANTAGES OF VIRUS: • Viruscancrashwindow. • Viruscanremovewindowfilesduetothisthecomputersystemslow down. • viruscanstolethevaluabledataofyourcomputer. • Duetosomevirusthehardwareofcomputersystemcannotwork properly.
  • 19. ADVANTAGES OF ANTI-VIRUS: Protection from Viruses & Spyware. ... Protection from Phishing Attacks. ... Provides Robust Web Protection. ... Provides quick scan of removable device. ... Two-Way Firewall. ... Block Ads and Spam Website. ... Provides Password Protection. ... Parental Control.
  • 20. REFERENCES:  WWW.GOOGLE.COM  SLIDE SHARE WEB  TECHWAL.COM  WIKIPEDIA  The Art of Deception. Kevin D. Mitnick. ...  Sandworm. Andy Greenberg. 05 Nov 2019. ...  Black Hat Python. Justin Seitz. 21 Jan 2015. …