SlideShare a Scribd company logo
1 of 10
Prepared For
Salmeen Rahman
Prepared By
MD ISMAIL HOSSAIN
AMINUR
BBA-A
#15102047
Computer virus
Topic:
Definition of virus:
A computer virus
is a small
software
program that
spreads from one
computer to
another, and
interferes with
computer
operation.
Types of virus
 Resident Viruses
 Worms viruses
 Direct Action Viruses
 Overwrite Viruses
 Boot Virus
 Macro Virus
 Directory Virus
 Polymorphic Virus
 Network Virus
 FAT Virus
How to spread virus:
Through attachments
Through email messages
Through funny images, greeting
cards
Through audio and video files.
Through downloads on the Internet
And the Common methods for
spreading viruses include floppy disks,
FTP file transfers, and copying files
between shared network drives.
Computer Virus Symptoms
1.Hardware Troubles
2.Slow Performance
3.Slow Startup
4.Crashing
5.Missing files
6.Unusual Error Messages
How I can help protect my computer from viruses
1.Install an update antivirus program:
2.Don't open email messages from
unfamiliar senders, or email
attachments that you don't recognize
3.Use a pop-up blocker with your
browser
4. Keep Windows updated
5. Use a firewall
6. Use your browser's privacy settings
7. Clear your Internet cache and your
browsing history
8. Scan any email or files downloaded
from the Internet before you open them
Antivirus software
Many users install
antivirus software
that can detect and
eliminate known
viruses when the
computer attempts
to download or run
the executable
Recovery strategies and methods
One can also reduce the
damage done by viruses
by making regular
backups of data on
different media, that are
either kept unconnected
to the system read-only or
not accessible for other
reasons, such as using
different file systems. This
way, if data is lost through
a virus, one can start again
using the backup
Virus removal
Many websites run by antivirus software
companies provide free online virus scanning,
with limited cleaning facilities . Some
websites—like Google subsidiary
VirusTotal.com—allow users to upload one or
more suspicious files to be scanned and
checked by one or more antivirus programs in
one operation.
Computer virus 2015

More Related Content

What's hot

Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all timeAlefyaM
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 

What's hot (20)

Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computervirus
Computervirus Computervirus
Computervirus
 
computer virus
computer viruscomputer virus
computer virus
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 

Similar to Computer virus 2015

Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750bhagatsigh
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisaDom Mike
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapperaschnapper
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingmentcheauyih
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus tayyaba rashid
 

Similar to Computer virus 2015 (20)

Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
M
MM
M
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
 
Sowmya
SowmyaSowmya
Sowmya
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Computer virus
Computer virusComputer virus
Computer virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
virus
virusvirus
virus
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 

More from fidel barrios

067902 barrios lucero fideloswaldo
067902 barrios lucero fideloswaldo067902 barrios lucero fideloswaldo
067902 barrios lucero fideloswaldofidel barrios
 
Presentación1 en ppt
Presentación1 en pptPresentación1 en ppt
Presentación1 en pptfidel barrios
 
Presentacion de fidel barrios pdf
Presentacion de fidel barrios pdfPresentacion de fidel barrios pdf
Presentacion de fidel barrios pdffidel barrios
 
Presentacion de fidel barrios pdf
Presentacion de fidel barrios pdfPresentacion de fidel barrios pdf
Presentacion de fidel barrios pdffidel barrios
 
Presentacion de fidel barrios
Presentacion de fidel barriosPresentacion de fidel barrios
Presentacion de fidel barriosfidel barrios
 
SILABO INFORMATICA GENERAL
SILABO INFORMATICA GENERALSILABO INFORMATICA GENERAL
SILABO INFORMATICA GENERALfidel barrios
 

More from fidel barrios (9)

067902 barrios lucero fideloswaldo
067902 barrios lucero fideloswaldo067902 barrios lucero fideloswaldo
067902 barrios lucero fideloswaldo
 
Global ore 2
Global ore 2Global ore 2
Global ore 2
 
Presentación1 en ppt
Presentación1 en pptPresentación1 en ppt
Presentación1 en ppt
 
Presentacion pdf
Presentacion pdfPresentacion pdf
Presentacion pdf
 
Presentacion de fidel barrios pdf
Presentacion de fidel barrios pdfPresentacion de fidel barrios pdf
Presentacion de fidel barrios pdf
 
Presentacion de fidel barrios pdf
Presentacion de fidel barrios pdfPresentacion de fidel barrios pdf
Presentacion de fidel barrios pdf
 
Presentacion de fidel barrios
Presentacion de fidel barriosPresentacion de fidel barrios
Presentacion de fidel barrios
 
SILABO INFORMATICA GENERAL
SILABO INFORMATICA GENERALSILABO INFORMATICA GENERAL
SILABO INFORMATICA GENERAL
 
2003 07-seguridad
2003 07-seguridad2003 07-seguridad
2003 07-seguridad
 

Recently uploaded

TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 

Recently uploaded (11)

TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 

Computer virus 2015

  • 1. Prepared For Salmeen Rahman Prepared By MD ISMAIL HOSSAIN AMINUR BBA-A #15102047 Computer virus Topic:
  • 2. Definition of virus: A computer virus is a small software program that spreads from one computer to another, and interferes with computer operation.
  • 3. Types of virus  Resident Viruses  Worms viruses  Direct Action Viruses  Overwrite Viruses  Boot Virus  Macro Virus  Directory Virus  Polymorphic Virus  Network Virus  FAT Virus
  • 4. How to spread virus: Through attachments Through email messages Through funny images, greeting cards Through audio and video files. Through downloads on the Internet And the Common methods for spreading viruses include floppy disks, FTP file transfers, and copying files between shared network drives.
  • 5. Computer Virus Symptoms 1.Hardware Troubles 2.Slow Performance 3.Slow Startup 4.Crashing 5.Missing files 6.Unusual Error Messages
  • 6. How I can help protect my computer from viruses 1.Install an update antivirus program: 2.Don't open email messages from unfamiliar senders, or email attachments that you don't recognize 3.Use a pop-up blocker with your browser 4. Keep Windows updated 5. Use a firewall 6. Use your browser's privacy settings 7. Clear your Internet cache and your browsing history 8. Scan any email or files downloaded from the Internet before you open them
  • 7. Antivirus software Many users install antivirus software that can detect and eliminate known viruses when the computer attempts to download or run the executable
  • 8. Recovery strategies and methods One can also reduce the damage done by viruses by making regular backups of data on different media, that are either kept unconnected to the system read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup
  • 9. Virus removal Many websites run by antivirus software companies provide free online virus scanning, with limited cleaning facilities . Some websites—like Google subsidiary VirusTotal.com—allow users to upload one or more suspicious files to be scanned and checked by one or more antivirus programs in one operation.