SlideShare a Scribd company logo
1 of 22
By-
Anubhav Sinha
IX A
What’s Inside?
• What is a virus?
• More about virus
• Who wrote it and why?
• How do they spread?
• Kinds of virus……………….
• What is a worm?
• Difference between virus and worms
• 2014
What is a virus?
– An executable code
– That could make copies of itself or attach
itself to other executable codes
– Most of computer viruses have their
latency period.
– Attack programs or data on your hard
drive on a specific day when conditions
has been fulfilled.
More about Virus…..
• A virus is a small piece of software that piggybacks
on real programs.
• Computer viruses are called viruses because they
share some of the same traits of biological viruses.
Who write virus and why?
To prove their own theories.
– To see if they can do it.
– People who are political, religionary ardor.
– People usually publish their virus source
codes in BBSes or the Internet for users
who are interested in computer virus
programming.
– Most of them belong to specific
organizations
Difference between a worm and a virus
• Virus
– Usually small size programs ( 3-30k )
– Designed to evade detection
• Worm
– Sends itself to other systems
– Bigger in size than virus
– Not easy to write
From where does these virus spread?
• Medium
– Hard disk , Floppy disks , Tape
– Optical media
– Memory
• Internet
– E-mail attachments
– .exe .bat .vbs
• Research : One in every five hundred e-mail
messages contain a virus.
Kinds of virus
Memory Resident Virus
Hideout: This type of virus hides in the RAM
and stays there even after the malicious
code is executed
• Target: It can corrupt files and programs
that are opened, closed, copied, renamed,
etc.
• Examples: Randex, CMJ, Meve, and
MrKlunky
• Protection: Install an antivirus program.
Direct Action Viruses
Hideout: The viruses keep changing their
location into new files whenever the code
is executed, but are generally found in the
hard disk's root directory.
• Target: It can corrupt files.
• Examples: Vienna virus
• Protection: Install an antivirus scanner.
Overwrite Viruses
Hideout: The virus replaces the file content.
However, it does not change the file size.
• Examples: Way, Trj.Reboot, Trivial.88.D
• Protection: The only way to clean a file
infected by an overwrite virus is to delete
the file completely, thus losing the original
content.
Boot Sector Virus
• HIdeout: It hides in the memory until DOS
accesses the floppy disk, and whichever
boot data is accessed, the virus infects it.
• Examples: Polyboot.B, AntiEXE
• Protection: Ensure that floppy disks are
write-protected
Macro Virus
Hideout: These hide in documents that
are shared via e-mail or networks.
Examples: Relax, Melissa. A, Bablas,
O97M/Y2
Protection: Avoid opening e-mails from
unknown senders. Also, disabling macros
can help to protect your useful data.
Polymorphic Virus
Polymorphic viruses encrypt or encode
themselves in a different way (using
different algorithms and encryption keys)
every time they infect a system.
Examples: Elkern, Marburg, Satan Bug
and Tureen.
Protection: Install a high-end antivirus as
the normal ones are incapable of detecting
this type of virus.
FAT Virus
Hideout FAT virus attacks the FAT section and
may damage crucial information. It can be
especially dangerous as it prevents access to
certain sections of the disk where important files
are stored.
Examples: Link Virus
Protection: Before the virus attacks all the
files on the computer, locate all the files
that are actually needed on the hard drive,
and then delete the ones that are not
needed.
Multipartite Virus
Hideout: In the initial phase, these viruses
tend to hide in the memory as the resident
viruses do; then they infect the hard disk.
Examples: Invader, Flip and Tequila
Protection: You need to clean the boot
sector and also the disk to get rid of the
virus, and then reload all the data in it.
Trojans
• Trojans
In fact, it is a program which disguises
itself as a useful program or application.
▶ Beware of the fact that these viruses
copy files in your computer (when their
carrier program is executed) that can
damage your data, and even delete it.
2014's Worst Viruses
! Flame: It is said to be the first of its kind that uses
Bluetooth as the spread medium. It was first detected in a
Russian lab.
! Belgian Computer Crime Virus: This virus spread
globally and asked the users for some vital information
and a processing fee, claiming that it was for police records.
! Shamoon: This virus is dangerous as it creates files of
the data on your hard disk, and then this compiled data is
sent to the attacker.
Computer viruses - A daily harm
Computer viruses - A daily harm
Computer viruses - A daily harm

More Related Content

What's hot

What's hot (20)

Isas
IsasIsas
Isas
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
 
Types of computer viruses
Types of computer viruses Types of computer viruses
Types of computer viruses
 
Program security
Program securityProgram security
Program security
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Virus
VirusVirus
Virus
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
 
Viruses
VirusesViruses
Viruses
 
Viruspresentacion10
Viruspresentacion10Viruspresentacion10
Viruspresentacion10
 

Viewers also liked

Viewers also liked (20)

Virus
VirusVirus
Virus
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
Virusppt
ViruspptVirusppt
Virusppt
 
Virus part1
Virus part1Virus part1
Virus part1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Similar to Computer viruses - A daily harm

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studydilsherece
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 

Similar to Computer viruses - A daily harm (20)

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
information about virus
information about virusinformation about virus
information about virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
anti_virus
anti_virusanti_virus
anti_virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Computer viruses - A daily harm

  • 2. What’s Inside? • What is a virus? • More about virus • Who wrote it and why? • How do they spread? • Kinds of virus………………. • What is a worm? • Difference between virus and worms • 2014
  • 3. What is a virus? – An executable code – That could make copies of itself or attach itself to other executable codes – Most of computer viruses have their latency period. – Attack programs or data on your hard drive on a specific day when conditions has been fulfilled.
  • 4. More about Virus….. • A virus is a small piece of software that piggybacks on real programs. • Computer viruses are called viruses because they share some of the same traits of biological viruses.
  • 5. Who write virus and why? To prove their own theories. – To see if they can do it. – People who are political, religionary ardor. – People usually publish their virus source codes in BBSes or the Internet for users who are interested in computer virus programming. – Most of them belong to specific organizations
  • 6. Difference between a worm and a virus • Virus – Usually small size programs ( 3-30k ) – Designed to evade detection • Worm – Sends itself to other systems – Bigger in size than virus – Not easy to write
  • 7. From where does these virus spread? • Medium – Hard disk , Floppy disks , Tape – Optical media – Memory • Internet – E-mail attachments – .exe .bat .vbs • Research : One in every five hundred e-mail messages contain a virus.
  • 9.
  • 10. Memory Resident Virus Hideout: This type of virus hides in the RAM and stays there even after the malicious code is executed • Target: It can corrupt files and programs that are opened, closed, copied, renamed, etc. • Examples: Randex, CMJ, Meve, and MrKlunky • Protection: Install an antivirus program.
  • 11. Direct Action Viruses Hideout: The viruses keep changing their location into new files whenever the code is executed, but are generally found in the hard disk's root directory. • Target: It can corrupt files. • Examples: Vienna virus • Protection: Install an antivirus scanner.
  • 12. Overwrite Viruses Hideout: The virus replaces the file content. However, it does not change the file size. • Examples: Way, Trj.Reboot, Trivial.88.D • Protection: The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.
  • 13. Boot Sector Virus • HIdeout: It hides in the memory until DOS accesses the floppy disk, and whichever boot data is accessed, the virus infects it. • Examples: Polyboot.B, AntiEXE • Protection: Ensure that floppy disks are write-protected
  • 14. Macro Virus Hideout: These hide in documents that are shared via e-mail or networks. Examples: Relax, Melissa. A, Bablas, O97M/Y2 Protection: Avoid opening e-mails from unknown senders. Also, disabling macros can help to protect your useful data.
  • 15. Polymorphic Virus Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. Examples: Elkern, Marburg, Satan Bug and Tureen. Protection: Install a high-end antivirus as the normal ones are incapable of detecting this type of virus.
  • 16. FAT Virus Hideout FAT virus attacks the FAT section and may damage crucial information. It can be especially dangerous as it prevents access to certain sections of the disk where important files are stored. Examples: Link Virus Protection: Before the virus attacks all the files on the computer, locate all the files that are actually needed on the hard drive, and then delete the ones that are not needed.
  • 17. Multipartite Virus Hideout: In the initial phase, these viruses tend to hide in the memory as the resident viruses do; then they infect the hard disk. Examples: Invader, Flip and Tequila Protection: You need to clean the boot sector and also the disk to get rid of the virus, and then reload all the data in it.
  • 18. Trojans • Trojans In fact, it is a program which disguises itself as a useful program or application. ▶ Beware of the fact that these viruses copy files in your computer (when their carrier program is executed) that can damage your data, and even delete it.
  • 19. 2014's Worst Viruses ! Flame: It is said to be the first of its kind that uses Bluetooth as the spread medium. It was first detected in a Russian lab. ! Belgian Computer Crime Virus: This virus spread globally and asked the users for some vital information and a processing fee, claiming that it was for police records. ! Shamoon: This virus is dangerous as it creates files of the data on your hard disk, and then this compiled data is sent to the attacker.