SlideShare a Scribd company logo
1 of 15
Presentation 
Personal Firewalls 
Spyware and Adware Removers 
Anti Viruses 
1 
Presented By: 
Adeel Khurram 
Supervised By: 
Engr.Zahra Noor 
adeel2khurram@gmail.com
What is Personal FireWalls? 
A personal firewall is a utility that detects and 
protects a personal computer from unauthorized 
disturbance. Personal firewalls constantly 
monitor all transmissions to and from a 
computer. When connected to the Internet, your 
computer is open to attacks from a hacker . 
adeel2khurram@gmail.com 
2
INTERNET 
Firewall 
My 
PC 
Secure 
Private 
Network 
adeel2khurram@gmail.com 3
Who are Hackers? 
4 
Hacker 
A hacker is someone who tries to access a 
computer or network illegally. 
adeel2khurram@gmail.com
Operating systems often include a personal 
firewall. Windows automatically enables its 
built-in personal firewall, called Windows 
Firewall, upon installation of the operating 
system. If your operating system does not 
include a personal firewall or you want 
additional protection, you can purchase a 
stand-alone personal firewall utility 
5 
Continue….. 
adeel2khurram@gmail.com
What is an Anti Virus? 
• An antivirus program protects a computer 
against viruses by identifying and removing 
any computer viruses found in memory, on 
storage media, or on incoming files. Most 
antivirus programs also protect against worms 
and Trojan horses. When you purchase a new 
computer, it often includes antivirus software. 
adeel2khurram@gmail.com 
6
Most Famous Anti viruses 
adeel2khurram@gmail.com 7
What is a Virus ? 
adeel2khurram@gmail.com 
8
• The term, computer virus, describes a 
potentially damaging computer program that 
affects, or infects, a computer negatively by 
altering the way the computer works without 
the user’s knowledge or permission. Once the 
virus is in a computer, it can spread 
throughout and may damage your files and 
operating system. 
9 
Virus….. 
adeel2khurram@gmail.com
• Viruses are just one type of malicious 
software. Malware (short for malicious 
software) is software that acts without a 
user’s knowledge and deliberately 
alters the computer’s operations. In addition 
to viruses, worms and Trojan horses are 
malware. 
10 
Continue…. 
adeel2khurram@gmail.com
Worms And Trojan Horse 
• A worm, such as Sasser or Klez, copies itself 
repeatedly, for example, in memory or over a 
network, using up system resources and 
possibly shutting down the system. 
adeel2khurram@gmail.com 
11
Worms And Trojan Horse 
• Trojan HorseTrojan horse (named after the Greek 
myth) hides within or looks like a genuine 
program such as a screen saver. A certain 
condition or action usually start the Trojan 
horse. Unlike a virus or worm, a Trojan horse 
does not reproduce itself to other computers. 
adeel2khurram@gmail.com 
12
Spyware and Adware Remover 
• A spyware remover is a program 
that detects and deletes spyware 
and other similar programs. 
• An adware remover is a program 
that detects and deletes adware. 
adeel2khurram@gmail.com 
13
Spyware and Adware Remover 
• Spyware is a program placed on a computer 
without the user’s knowledge that secretly collects 
information about the user, often related toWeb 
browsing habits. Spyware can enter a computer as a 
virus or as a result of a user installing a new 
program. 
adeel2khurram@gmail.com 
14
Spyware and Adware Remover 
• Adware is a program that displays an online 
advertisement in a banner or pop-up window 
on Web pages, e-mail, or other Internet 
services. Sometimes, spyware is hidden in 
adware. 
adeel2khurram@gmail.com 
15

More Related Content

What's hot

Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security riskssamthking25
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus Ranjeta Muniandy
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virusAbrish06
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your ComputerDom Cole
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentationDavid Lombrozo
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?Sunjoonah Kambbs
 
Safe computing (circa 2004)
Safe computing (circa 2004)Safe computing (circa 2004)
Safe computing (circa 2004)Azmi Mohd Tamil
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirusVishwarajYadav
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Shobhit Sharma
 
Malware
MalwareMalware
MalwareHHSome
 

What's hot (20)

Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
Network Security
Network SecurityNetwork Security
Network Security
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
CryptoWall
CryptoWallCryptoWall
CryptoWall
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your Computer
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
 
Safe computing (circa 2004)
Safe computing (circa 2004)Safe computing (circa 2004)
Safe computing (circa 2004)
 
Network security
Network securityNetwork security
Network security
 
Malware
MalwareMalware
Malware
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Worm
WormWorm
Worm
 
Spyware
SpywareSpyware
Spyware
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1
 
Malware
MalwareMalware
Malware
 
Sowmya
SowmyaSowmya
Sowmya
 

Similar to Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses

Personal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and virusesPersonal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and virusesAdeel Khurram
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxsachingwalani24
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 

Similar to Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses (20)

Personal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and virusesPersonal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and viruses
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus project
Virus projectVirus project
Virus project
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Malicious
MaliciousMalicious
Malicious
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from Adeel Khurram

What is active directory
What is active directoryWhat is active directory
What is active directoryAdeel Khurram
 
Usages of May and can
Usages of May and canUsages of May and can
Usages of May and canAdeel Khurram
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standardsAdeel Khurram
 
Coaxial cable and its types
Coaxial cable and its typesCoaxial cable and its types
Coaxial cable and its typesAdeel Khurram
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 

More from Adeel Khurram (8)

What is active directory
What is active directoryWhat is active directory
What is active directory
 
Usages of May and can
Usages of May and canUsages of May and can
Usages of May and can
 
English Punctuation
English PunctuationEnglish Punctuation
English Punctuation
 
Computer simulation
Computer simulationComputer simulation
Computer simulation
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
 
Coaxial cable and its types
Coaxial cable and its typesCoaxial cable and its types
Coaxial cable and its types
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Gps2014
Gps2014Gps2014
Gps2014
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses

  • 1. Presentation Personal Firewalls Spyware and Adware Removers Anti Viruses 1 Presented By: Adeel Khurram Supervised By: Engr.Zahra Noor adeel2khurram@gmail.com
  • 2. What is Personal FireWalls? A personal firewall is a utility that detects and protects a personal computer from unauthorized disturbance. Personal firewalls constantly monitor all transmissions to and from a computer. When connected to the Internet, your computer is open to attacks from a hacker . adeel2khurram@gmail.com 2
  • 3. INTERNET Firewall My PC Secure Private Network adeel2khurram@gmail.com 3
  • 4. Who are Hackers? 4 Hacker A hacker is someone who tries to access a computer or network illegally. adeel2khurram@gmail.com
  • 5. Operating systems often include a personal firewall. Windows automatically enables its built-in personal firewall, called Windows Firewall, upon installation of the operating system. If your operating system does not include a personal firewall or you want additional protection, you can purchase a stand-alone personal firewall utility 5 Continue….. adeel2khurram@gmail.com
  • 6. What is an Anti Virus? • An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. Most antivirus programs also protect against worms and Trojan horses. When you purchase a new computer, it often includes antivirus software. adeel2khurram@gmail.com 6
  • 7. Most Famous Anti viruses adeel2khurram@gmail.com 7
  • 8. What is a Virus ? adeel2khurram@gmail.com 8
  • 9. • The term, computer virus, describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. Once the virus is in a computer, it can spread throughout and may damage your files and operating system. 9 Virus….. adeel2khurram@gmail.com
  • 10. • Viruses are just one type of malicious software. Malware (short for malicious software) is software that acts without a user’s knowledge and deliberately alters the computer’s operations. In addition to viruses, worms and Trojan horses are malware. 10 Continue…. adeel2khurram@gmail.com
  • 11. Worms And Trojan Horse • A worm, such as Sasser or Klez, copies itself repeatedly, for example, in memory or over a network, using up system resources and possibly shutting down the system. adeel2khurram@gmail.com 11
  • 12. Worms And Trojan Horse • Trojan HorseTrojan horse (named after the Greek myth) hides within or looks like a genuine program such as a screen saver. A certain condition or action usually start the Trojan horse. Unlike a virus or worm, a Trojan horse does not reproduce itself to other computers. adeel2khurram@gmail.com 12
  • 13. Spyware and Adware Remover • A spyware remover is a program that detects and deletes spyware and other similar programs. • An adware remover is a program that detects and deletes adware. adeel2khurram@gmail.com 13
  • 14. Spyware and Adware Remover • Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user, often related toWeb browsing habits. Spyware can enter a computer as a virus or as a result of a user installing a new program. adeel2khurram@gmail.com 14
  • 15. Spyware and Adware Remover • Adware is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services. Sometimes, spyware is hidden in adware. adeel2khurram@gmail.com 15