SlideShare a Scribd company logo
1 of 18
Download to read offline
ANTI VIRUS PACKAGES
V I R U S
!
Introduction to Virus.
Virus Protection, Deletion & Removal Utilities
Anti-Virus Packages to Prevent, detect & Delete Virus
Viruses, worms, Trojans, and bots are all pats of a class of software
called Malware.
Malware of malicious code is short for malicious software. It is code of
software that is specifically designed to damage, disrupt, steal, or in
general inflict some other “bad” of illegitimate action on data, hosts, or
networks.
Malware cannot damage the physical hardware of systems network
equipment, but is can damage the data and software residing on the
equipment.
What is Malware ?
INTRODUCTION TO VIRUS
A computer virus is a software programwith a abilityto make copies of itself , which
attacks itself to other application or files.
A virus cannot run by itself; it requires that its host programbe run to make the virus
active.
Almost all viruses are attached to an Executablefile.
Classification
VIRUS
4. TSR ( Terminateand stayresident )
1. Boot Virus
5. File infecting viruses ( ProgramVirus)
2. Micro Virus
3. Multipartite
1. Boot Viruses
Boot viruses infects the boot records of harddisk and floppy disks.
Generally these are consideredmore dangerous than programviruses.
A Boot record infectoris a piece of malware that inserts malicious code into
the boot sector of a disk.
2. Macro Virus
These viruses infects data files.
For example, Microsoft word document and template files are susceptibleto
macro virus attacks the spread rapidlyas infecteddocuments are sharedon
networks or downloaded frominternet sites.
3. Multipartite Virus
A multipartite virus is a virus that can infest eitherboot sectors or
executable.
Sucha virus typically has two parts, one for eachtype.
* When it infects an executable, it acts 3 as an executableinfector.
*When it infects a boot sector, it works as a boot sector infector.
4. Terminate and stay resident
A TSR virus is a virus that stays active in memory after the application ( or
bootstrapping, of disk mounting ) has terminated.
TSR viruses can be boot sector infectors or executable infectors.
The brain virus is a TSR virus.
5. File Infecting Viruses
These viruses infect programfiles, which have extensions such as .com, .exe,
.sys, .dll, .ovl or .scr. Programfiles are attractive targets for computer virus
because they are widelyused and have relativity, simpleformats to which
viruses can attach themselves.
Types of Viruses
1) Worms 2) Trojan Horse 3) Bombs
1). Computer Worm
A computer Wormis a standalone malware computer programthat
replicates itself in order to spread to other computers.
Examples : Klez, Nimda, Code Redetc.
2). Trojan Horse Viruses
Trojan Horse, or Trojan, is any malicious computer programwhichis used
to hack into a computer by misleading users of its true intent.
Logic Bombs that execute a certain payloadat a pre-definedtime or when
some other condition is met. This technique can be usedby a virus or worm
to gain momentumand spreadbefore being noticed.
Logic Bombs are usually timed to do maximumdamage.
3). Logic Bombs
 Replicating itself
 Interrupting system/network use
 Modifying configuration settings
 FlashingBIOS
 Format hard drive/destroy data
 Using computer/network resources
 Distribution of confidential information
 Denial of service attacks
How do viruses work ?
Once a virus gains access to a computer, its effects can vary. Possible attacks include.
Sources of Computer Virus Attack
 Removal media or drives
 Downloading internet files
 E-mail attachments
 Unpatchedsoftware and services
 Poor Administrator passwords
 Poor shared passwords
Computer Security
 Patchingthe operating system
 Patchingservices
 Patchingclient software
 Passwords
 Antivirus
 Software
 Firelwalls
Virus Prevention
Perform Basic Computer Safety Maintenance
 Use an internet Firewall
 Update Your Computer
 Virus Detection ( Antivirus Software )
 Strong Passwords
 ValidCertificates before installing software
collezian
Click Here
Name : Md. Azad
Branch : Computer Science and Engineering
Governments Polytechnic Chapra

More Related Content

What's hot

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)cdebraj16101991
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemLee Ray
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewallsJay Shah
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
 

What's hot (20)

Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Anti virus
Anti virusAnti virus
Anti virus
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Mitppt
MitpptMitppt
Mitppt
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 

Similar to Computer viruses

Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & MalwareT.J. Schiel
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 

Similar to Computer viruses (20)

Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Presentation2
Presentation2Presentation2
Presentation2
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Recently uploaded (20)

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

Computer viruses

  • 1. ANTI VIRUS PACKAGES V I R U S ! Introduction to Virus. Virus Protection, Deletion & Removal Utilities Anti-Virus Packages to Prevent, detect & Delete Virus
  • 2. Viruses, worms, Trojans, and bots are all pats of a class of software called Malware. Malware of malicious code is short for malicious software. It is code of software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” of illegitimate action on data, hosts, or networks. Malware cannot damage the physical hardware of systems network equipment, but is can damage the data and software residing on the equipment. What is Malware ?
  • 3. INTRODUCTION TO VIRUS A computer virus is a software programwith a abilityto make copies of itself , which attacks itself to other application or files. A virus cannot run by itself; it requires that its host programbe run to make the virus active. Almost all viruses are attached to an Executablefile.
  • 4. Classification VIRUS 4. TSR ( Terminateand stayresident ) 1. Boot Virus 5. File infecting viruses ( ProgramVirus) 2. Micro Virus 3. Multipartite
  • 5. 1. Boot Viruses Boot viruses infects the boot records of harddisk and floppy disks. Generally these are consideredmore dangerous than programviruses. A Boot record infectoris a piece of malware that inserts malicious code into the boot sector of a disk.
  • 6. 2. Macro Virus These viruses infects data files. For example, Microsoft word document and template files are susceptibleto macro virus attacks the spread rapidlyas infecteddocuments are sharedon networks or downloaded frominternet sites.
  • 7. 3. Multipartite Virus A multipartite virus is a virus that can infest eitherboot sectors or executable. Sucha virus typically has two parts, one for eachtype. * When it infects an executable, it acts 3 as an executableinfector. *When it infects a boot sector, it works as a boot sector infector.
  • 8. 4. Terminate and stay resident A TSR virus is a virus that stays active in memory after the application ( or bootstrapping, of disk mounting ) has terminated. TSR viruses can be boot sector infectors or executable infectors. The brain virus is a TSR virus.
  • 9. 5. File Infecting Viruses These viruses infect programfiles, which have extensions such as .com, .exe, .sys, .dll, .ovl or .scr. Programfiles are attractive targets for computer virus because they are widelyused and have relativity, simpleformats to which viruses can attach themselves.
  • 10. Types of Viruses 1) Worms 2) Trojan Horse 3) Bombs
  • 11. 1). Computer Worm A computer Wormis a standalone malware computer programthat replicates itself in order to spread to other computers. Examples : Klez, Nimda, Code Redetc.
  • 12. 2). Trojan Horse Viruses Trojan Horse, or Trojan, is any malicious computer programwhichis used to hack into a computer by misleading users of its true intent.
  • 13. Logic Bombs that execute a certain payloadat a pre-definedtime or when some other condition is met. This technique can be usedby a virus or worm to gain momentumand spreadbefore being noticed. Logic Bombs are usually timed to do maximumdamage. 3). Logic Bombs
  • 14.  Replicating itself  Interrupting system/network use  Modifying configuration settings  FlashingBIOS  Format hard drive/destroy data  Using computer/network resources  Distribution of confidential information  Denial of service attacks How do viruses work ? Once a virus gains access to a computer, its effects can vary. Possible attacks include.
  • 15. Sources of Computer Virus Attack  Removal media or drives  Downloading internet files  E-mail attachments  Unpatchedsoftware and services  Poor Administrator passwords  Poor shared passwords
  • 16. Computer Security  Patchingthe operating system  Patchingservices  Patchingclient software  Passwords  Antivirus  Software  Firelwalls Virus Prevention
  • 17. Perform Basic Computer Safety Maintenance  Use an internet Firewall  Update Your Computer  Virus Detection ( Antivirus Software )  Strong Passwords  ValidCertificates before installing software
  • 18. collezian Click Here Name : Md. Azad Branch : Computer Science and Engineering Governments Polytechnic Chapra