SlideShare a Scribd company logo
1 of 21
Computer Virus
īƒ˜ What is Computer Virus?
īƒ˜ What do virus do?
īƒ˜ How virus enter your computer?
īƒ˜ How virus enter your computer?
īƒ˜ Type of viruses?
īƒ˜ How to protect your computer from virus
īƒ˜ How you know your computer affected with
virus?
īƒ˜ Malware
īƒ˜ Worms etc.
What is Computer Virus?
ī‚´A computer virus is a malicious piece of computer code
or program designed to spread from device to device. A
subset of malware, these self-copying threats are usually
designed to damage a device or steal data.
ī‚´Think of a biological virus – the kind that makes you sick.
It’s persistently nasty, keeps you from functioning
normally, and often requires something powerful to get
rid of it. A computer virus is very similar. Designed to
replicate relentlessly, computer viruses infect your
programs and files, alter the way your computer operates
or stop it from working altogether.
What do virus do?
ī‚´ Some computer viruses are programmed to harm
your computer by damaging programs, deleting files,
or reformatting the hard drive. Others simply replicate
themselves or flood a network with traffic, making it
impossible to perform any internet activity. Even less
harmful computer viruses can significantly disrupt
your system’s performance, sapping computer
memory and causing frequent computer crashes.
How virus enter your computer?
ī‚´Even if you’re careful, you can pick up computer
viruses through normal Web activities like:
ī‚´Sharing music, files, or photos with other users
ī‚´Visiting an infected website.
ī‚´Opening spam email or an email attachment.
ī‚´Downloading free games, toolbars, media players
and other system utilities.
ī‚´Installing mainstream software applications without
thoroughly reading license agreements.
Type of viruses?
ī‚´Cybercriminals are getting better and better at
stealing our confidential data and viruses that are
being created are evolving rapidly. There are
millions of viruses around the world, but here are
some common types you should be aware of:
Boot sector virus
ī‚´This type of virus can take control when you start —
or boot — your computer. One way it can spread is
by plugging an infected USB drive into your
computer.
File-infecting Virus
ī‚´A virus that attached itself to an executable program.
It is also called a parasitic virus which typically
infects files with .exe or .com extensions. Some file
infectors can overwrite host files and others can
damage your hard drive’s formatting.
Macro virus
ī‚´Macro viruses are written in the same macro
language used for software applications. Such
viruses spread when you open an infected
document, often through email attachments.
How to protect your computer from virus
ī‚´ Don't click on hyperlinks from unknown senders or open email
attachments.
ī‚´ Use filtering tools to block unsolicited emails, instant messages, and
pop-ups or spam blocking
ī‚´ Use strong passwords and change them regularly Exercise alert
when downloading records from the Internet. Just download from
confided sources
ī‚´ Back up records on your PCs routinely utilizing an external hard
drive. Dent keep delicate or hidden data on your PC. In case your
computer gets hacked,
ī‚´ Scan email attachments before opening it.
ī‚´ Avoid clicking on pop-up advertisements and get a pop-up blocker
for your web browser.
ī‚´ When routed to another website, don’t do anything, and
immediately leave the site.
ī‚´ Install a reliable anti-virus program and always keep it up to date.
How you know your computer affected with virus?
ī‚´A computer virus attack can produce a variety of symptoms.
Here are some of them:
ī‚´Frequent pop-up windows. Pop-ups might encourage you to
visit unusual sites. Or they might prod you to download
antivirus or other software programs.
ī‚´Changes to your homepage. Your usual homepage may change
to another website, for instance. Plus, you may be unable to
reset it.
ī‚´Mass emails being sent from your email account. A criminal
may take control of your account or send emails in your name
from another infected computer.
ī‚´Frequent crashes. A virus can inflict major damage on your
hard drive. This may cause your device to freeze or crash. It
Malware
ī‚´Malware is the collective name for a number of
malicious software variants, including viruses,
ransomware and spyware. Shorthand for malicious
software, malware typically consists of code developed
by cyber attackers, designed to cause extensive damage
to data and systems or to gain unauthorized access to a
network.
Worms
ī‚´A computer worm is a type of malware that spreads
copies of itself from computer to computer. A worm
can replicate itself without any human interaction,
and it does not need to attach itself to a software
program in order to cause damage.
A Trojan horse
ī‚´A Trojan horse, or Trojan, is a type of malicious code
or software that looks legitimate but can take control
of your computer. A Trojan is designed to damage,
disrupt, steal, or in general inflict some other
harmful action on your data or network.
ī‚´A Trojan is sometimes called a Trojan virus or a
Trojan horse virus, but that’s a misnomer. Viruses
can execute and replicate themselves. A Trojan
cannot. A user has to execute Trojans. Even so,
Trojan malware and Trojan virus are often used
interchangeably.
Spyware
ī‚´Spyware is defined as malicious software designed
to enter your computer device, gather data about
you, and forward it to a third-party without your
consent. Spyware can also refer to legitimate
software that monitors your data for commercial
purposes like advertising.
Ransomeware
ī‚´Ransomware is a form of malware that
encrypts a victim's files. The attacker then
demands a ransom from the victim to restore
access to the data upon payment.
Rootkits
ī‚´A rootkit is a collection of computer software,
typically malicious, designed to enable access to a
computer or an area of its software that is not
otherwise allowed (for example, to an unauthorized
user) and often masks its existence or the existence
of other software.
BACKDOOR
ī‚´A backdoor is a means to access a computer system
or encrypted data that bypasses the system's
customary security mechanisms. A developer may
create a backdoor so that an application or operating
system can be accessed for troubleshooting or other
purposes.
ANTIVIRUS
ī‚´Antivirus software is a program or set of
programs that are designed to prevent,
search for, detect, and
remove software viruses, and other
malicious software like worms, trojans,
adware, and more.
What does antivirus software do?
ī‚´Antivirus software helps protect your computer against
malware and cybercriminals. Antivirus software looks at
data — web pages, files, software, applications — traveling
over the network to your devices. It searches for known
threats and monitors the behavior of all programs, flagging
suspicious behavior.
ī‚´Antivirus software therefore performs three major
functions.
ī‚´Identifying malicious codes in the system.
ī‚´Removing them by destroying or isolating them.
ī‚´Most importantly, protecting your device from getting
Farewall
ī‚´A firewall is a network security device that monitors
incoming and outgoing network traffic and permits
or blocks data packets based on a set of security
rules. Its purpose is to establish a barrier between
your internal network and incoming traffic from
external sources (such as the internet) in order to
block malicious traffic like viruses and hackers.
Computer virus

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virusShubham Kafle
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Computer virus
Computer virusComputer virus
Computer virusPriti Singh
 
Computer Virus
Computer VirusComputer Virus
Computer VirusRabab Munawar
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAlfred George
 
Computer viruses
Computer virusesComputer viruses
Computer virusesPankaj Kumawat
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
Computer virus
Computer virusComputer virus
Computer virusMaxie Santos
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer virusesNitish Xavier Tirkey
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 

What's hot (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware
MalwareMalware
Malware
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 

Similar to Computer virus

What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptxJohnRebenRequinto1
 
computer security
computer securitycomputer security
computer securityAzhar Akhtar
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses Tanu Basoiya
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ictmakanaya
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 

Similar to Computer virus (20)

What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer security
computer securitycomputer security
computer security
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
TIC
TICTIC
TIC
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from Ankita Shirke

Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
All about Sikkim.pptx
All about Sikkim.pptxAll about Sikkim.pptx
All about Sikkim.pptxAnkita Shirke
 
ICT Skills.pptx
ICT Skills.pptxICT Skills.pptx
ICT Skills.pptxAnkita Shirke
 
Green skills.pptx
Green skills.pptxGreen skills.pptx
Green skills.pptxAnkita Shirke
 
Entrepreneurial Skills.pptx
Entrepreneurial Skills.pptxEntrepreneurial Skills.pptx
Entrepreneurial Skills.pptxAnkita Shirke
 
Communication and Self Management skills.pptx
Communication and Self Management skills.pptxCommunication and Self Management skills.pptx
Communication and Self Management skills.pptxAnkita Shirke
 
How to back up data.pptx
How to back up data.pptxHow to back up data.pptx
How to back up data.pptxAnkita Shirke
 
Artificial Intelligence.pptx
Artificial Intelligence.pptxArtificial Intelligence.pptx
Artificial Intelligence.pptxAnkita Shirke
 
Fundamentals of Computers.ppt
Fundamentals of Computers.pptFundamentals of Computers.ppt
Fundamentals of Computers.pptAnkita Shirke
 
Mail Merge.pptx
Mail Merge.pptxMail Merge.pptx
Mail Merge.pptxAnkita Shirke
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptxAnkita Shirke
 
Computer worksheet
Computer worksheetComputer worksheet
Computer worksheetAnkita Shirke
 
Computer periphirals
Computer periphiralsComputer periphirals
Computer periphiralsAnkita Shirke
 
More on Windows 10
More on Windows 10More on Windows 10
More on Windows 10Ankita Shirke
 
E commerce, blogging and podcasting
E commerce, blogging and podcastingE commerce, blogging and podcasting
E commerce, blogging and podcastingAnkita Shirke
 
Scratch programming introduction to game creation
Scratch programming  introduction to game creationScratch programming  introduction to game creation
Scratch programming introduction to game creationAnkita Shirke
 
File management and data organisation
File management and data organisationFile management and data organisation
File management and data organisationAnkita Shirke
 
Grade vi sub word processor tabular presentation unit 3
Grade vi  sub word processor   tabular presentation unit 3Grade vi  sub word processor   tabular presentation unit 3
Grade vi sub word processor tabular presentation unit 3Ankita Shirke
 

More from Ankita Shirke (20)

Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Python.pptx
Python.pptxPython.pptx
Python.pptx
 
All about Sikkim.pptx
All about Sikkim.pptxAll about Sikkim.pptx
All about Sikkim.pptx
 
ICT Skills.pptx
ICT Skills.pptxICT Skills.pptx
ICT Skills.pptx
 
Green skills.pptx
Green skills.pptxGreen skills.pptx
Green skills.pptx
 
Entrepreneurial Skills.pptx
Entrepreneurial Skills.pptxEntrepreneurial Skills.pptx
Entrepreneurial Skills.pptx
 
Communication and Self Management skills.pptx
Communication and Self Management skills.pptxCommunication and Self Management skills.pptx
Communication and Self Management skills.pptx
 
How to back up data.pptx
How to back up data.pptxHow to back up data.pptx
How to back up data.pptx
 
Artificial Intelligence.pptx
Artificial Intelligence.pptxArtificial Intelligence.pptx
Artificial Intelligence.pptx
 
Fundamentals of Computers.ppt
Fundamentals of Computers.pptFundamentals of Computers.ppt
Fundamentals of Computers.ppt
 
Mail Merge.pptx
Mail Merge.pptxMail Merge.pptx
Mail Merge.pptx
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
 
Computer worksheet
Computer worksheetComputer worksheet
Computer worksheet
 
Mailmerge
Mailmerge Mailmerge
Mailmerge
 
Computer periphirals
Computer periphiralsComputer periphirals
Computer periphirals
 
More on Windows 10
More on Windows 10More on Windows 10
More on Windows 10
 
E commerce, blogging and podcasting
E commerce, blogging and podcastingE commerce, blogging and podcasting
E commerce, blogging and podcasting
 
Scratch programming introduction to game creation
Scratch programming  introduction to game creationScratch programming  introduction to game creation
Scratch programming introduction to game creation
 
File management and data organisation
File management and data organisationFile management and data organisation
File management and data organisation
 
Grade vi sub word processor tabular presentation unit 3
Grade vi  sub word processor   tabular presentation unit 3Grade vi  sub word processor   tabular presentation unit 3
Grade vi sub word processor tabular presentation unit 3
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Computer virus

  • 1. Computer Virus īƒ˜ What is Computer Virus? īƒ˜ What do virus do? īƒ˜ How virus enter your computer? īƒ˜ How virus enter your computer? īƒ˜ Type of viruses? īƒ˜ How to protect your computer from virus īƒ˜ How you know your computer affected with virus? īƒ˜ Malware īƒ˜ Worms etc.
  • 2. What is Computer Virus? ī‚´A computer virus is a malicious piece of computer code or program designed to spread from device to device. A subset of malware, these self-copying threats are usually designed to damage a device or steal data. ī‚´Think of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps you from functioning normally, and often requires something powerful to get rid of it. A computer virus is very similar. Designed to replicate relentlessly, computer viruses infect your programs and files, alter the way your computer operates or stop it from working altogether.
  • 3. What do virus do? ī‚´ Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes.
  • 4. How virus enter your computer? ī‚´Even if you’re careful, you can pick up computer viruses through normal Web activities like: ī‚´Sharing music, files, or photos with other users ī‚´Visiting an infected website. ī‚´Opening spam email or an email attachment. ī‚´Downloading free games, toolbars, media players and other system utilities. ī‚´Installing mainstream software applications without thoroughly reading license agreements.
  • 5. Type of viruses? ī‚´Cybercriminals are getting better and better at stealing our confidential data and viruses that are being created are evolving rapidly. There are millions of viruses around the world, but here are some common types you should be aware of:
  • 6. Boot sector virus ī‚´This type of virus can take control when you start — or boot — your computer. One way it can spread is by plugging an infected USB drive into your computer.
  • 7. File-infecting Virus ī‚´A virus that attached itself to an executable program. It is also called a parasitic virus which typically infects files with .exe or .com extensions. Some file infectors can overwrite host files and others can damage your hard drive’s formatting.
  • 8. Macro virus ī‚´Macro viruses are written in the same macro language used for software applications. Such viruses spread when you open an infected document, often through email attachments.
  • 9. How to protect your computer from virus ī‚´ Don't click on hyperlinks from unknown senders or open email attachments. ī‚´ Use filtering tools to block unsolicited emails, instant messages, and pop-ups or spam blocking ī‚´ Use strong passwords and change them regularly Exercise alert when downloading records from the Internet. Just download from confided sources ī‚´ Back up records on your PCs routinely utilizing an external hard drive. Dent keep delicate or hidden data on your PC. In case your computer gets hacked, ī‚´ Scan email attachments before opening it. ī‚´ Avoid clicking on pop-up advertisements and get a pop-up blocker for your web browser. ī‚´ When routed to another website, don’t do anything, and immediately leave the site. ī‚´ Install a reliable anti-virus program and always keep it up to date.
  • 10. How you know your computer affected with virus? ī‚´A computer virus attack can produce a variety of symptoms. Here are some of them: ī‚´Frequent pop-up windows. Pop-ups might encourage you to visit unusual sites. Or they might prod you to download antivirus or other software programs. ī‚´Changes to your homepage. Your usual homepage may change to another website, for instance. Plus, you may be unable to reset it. ī‚´Mass emails being sent from your email account. A criminal may take control of your account or send emails in your name from another infected computer. ī‚´Frequent crashes. A virus can inflict major damage on your hard drive. This may cause your device to freeze or crash. It
  • 11. Malware ī‚´Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyber attackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network.
  • 12. Worms ī‚´A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
  • 13. A Trojan horse ī‚´A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. ī‚´A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but that’s a misnomer. Viruses can execute and replicate themselves. A Trojan cannot. A user has to execute Trojans. Even so, Trojan malware and Trojan virus are often used interchangeably.
  • 14. Spyware ī‚´Spyware is defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising.
  • 15. Ransomeware ī‚´Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment.
  • 16. Rootkits ī‚´A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
  • 17. BACKDOOR ī‚´A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms. A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes.
  • 18. ANTIVIRUS ī‚´Antivirus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
  • 19. What does antivirus software do? ī‚´Antivirus software helps protect your computer against malware and cybercriminals. Antivirus software looks at data — web pages, files, software, applications — traveling over the network to your devices. It searches for known threats and monitors the behavior of all programs, flagging suspicious behavior. ī‚´Antivirus software therefore performs three major functions. ī‚´Identifying malicious codes in the system. ī‚´Removing them by destroying or isolating them. ī‚´Most importantly, protecting your device from getting
  • 20. Farewall ī‚´A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) in order to block malicious traffic like viruses and hackers.