SlideShare a Scribd company logo
1 of 13
COMPUTER VIRUSES
DONE BY: ANAMIKA PRIYA,ALENA JOHN
There are mainly 9 types of viruses.
The viruses we are going to be discussing today
are:
● MULTIPARTITE VIRUS
● POLYMORPHIC VIRUS
● OVERWRITE VIRUS
● SPACEFILLER VIRUS
● FAT VIRUS
MULTIPARTITE VIRUS
● A multipartite virus is a fast-moving virus that uses file infectors or boot
infectors to attack the boot sector and executable files simultaneously.
● The multipartite virus can affect both the boot sector and the program files at
the same time.
● A multipartite virus is also known as a hybrid virus.
● The effects of a multipartite virus can be far-reaching and very damaging to a
computer system.
● A virus is launched at various points in time, making the computer inoperable
for even the simplest tasks.
● The program files may be cleaned up, but the boot sector may not be. If this
is the case, the multipartite virus will reproduce as it did when it originated
within the system.
❏ THE FIRST MULTIPARTITE VIRUS WAS GHOSTBALL
VIRUS.
❏ EXAMPLES OF MULTIPARTITE VIRUS ARE
FLIP,INVADER,TEQUILA.
POLYMORPHIC VIRUS
● A polymorphic virus is a complicated computer virus that
affects data types and functions.
● It is a self-encrypted virus designed to avoid detection by
a scanner.
● Upon infection, the polymorphic virus duplicates itself by
creating usable, albeit slightly modified, copies of itself.
● Removing polymorphic viruses requires that programmers
rewrite language strings, which can be time-consuming,
complex and costly.
● EXAMPLES OF VIRUSES INCLUDE
MARBURG,TUAREG,SATAN BUG,ELKERN
OVERWRITE VIRUS
● An overwriting virus is a malicious program which, after infection, will
effectively destroy the original program code, typically by overwriting data in
the system's memory.
● The only way to remove the virus is by deleting the infected file and therefore
the user loses its contents.
● It can infect a specific file in a software or a whole software.
● Spreads via email.
● It was active in targeting Windows NT and Windows 2000 systems in the
2000s.
❏ The trojan virus and Trj.reboot are some of the
examples of multipartite virus.
SPACEFILLER VIRUS
● a spacefiller virus is a rare type of computer virus that
attempts to install itself by filling in the empty sections of a
file.
● By only using empty sections of a file, the virus can infect
a file without the size of the file changing, making it more
difficult to detect.
● In the past this was difficult to do properly, but new file
formats make it easier.
● Also known as cavity virus.
● The lehigh virus is an example of spacefiller virus.
FAT VIRUS
● Short for file allocation table, FAT
● FAT viruses infect the file allocation systems of the computer and gain access
to the location of all the files.
● A lot of important files are split or fragmented into a number of parts. FAT
viruses are capable of detecting and tracking all of these fragments and
therefore effectively gain control over all the files on the system.
● As soon as the FAT makes contact with the corrupt file, the virus is triggered
infecting the system.
● A lot of FAT viruses are created to destroy or overwrite entire directories
which can result in permanent loss of data.
● Fat viruses have the ability to spread to other files and infect other sectors of
the system.
● FAT 12 & FAT 6 are some of the examples of file
allocation table (FAT) virus.
QUESTION
TIME………..

More Related Content

What's hot

Linux history & features
Linux history & featuresLinux history & features
Linux history & features
Rohit Kumar
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshooting
Jerome Luison
 
INSTALLING SOFTWARE
INSTALLING SOFTWAREINSTALLING SOFTWARE
INSTALLING SOFTWARE
EchelleOgatis
 

What's hot (20)

Windows Registry
Windows RegistryWindows Registry
Windows Registry
 
Maintain Computer Systems and Network.ppt
Maintain Computer Systems and Network.pptMaintain Computer Systems and Network.ppt
Maintain Computer Systems and Network.ppt
 
web browser ppt
web browser pptweb browser ppt
web browser ppt
 
Malware
MalwareMalware
Malware
 
File management
File managementFile management
File management
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Lesson 2.2
Lesson 2.2Lesson 2.2
Lesson 2.2
 
Defragmentation
DefragmentationDefragmentation
Defragmentation
 
Linux history & features
Linux history & featuresLinux history & features
Linux history & features
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshooting
 
Computer security
Computer securityComputer security
Computer security
 
Computer virus
Computer virusComputer virus
Computer virus
 
INSTALLING SOFTWARE
INSTALLING SOFTWAREINSTALLING SOFTWARE
INSTALLING SOFTWARE
 
Installing windows 10
Installing windows 10Installing windows 10
Installing windows 10
 
Common Computer Faults and Problems
Common Computer Faults and ProblemsCommon Computer Faults and Problems
Common Computer Faults and Problems
 
Computer Troubleshooting
Computer TroubleshootingComputer Troubleshooting
Computer Troubleshooting
 
Practical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbgPractical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbg
 
Partitioning a Hard Drive
Partitioning a Hard DrivePartitioning a Hard Drive
Partitioning a Hard Drive
 

Similar to Computer Viruses

Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
Sadaf Walliyani
 

Similar to Computer Viruses (20)

Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harm
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

More from MikaPriya

Thejaswiyaya vaagmi-CBSE-Grade 9-Notes(malayalam
Thejaswiyaya vaagmi-CBSE-Grade 9-Notes(malayalamThejaswiyaya vaagmi-CBSE-Grade 9-Notes(malayalam
Thejaswiyaya vaagmi-CBSE-Grade 9-Notes(malayalam
MikaPriya
 
Summary and values in the malayalam novel-latthiyum vediyundayam
Summary and values in the malayalam novel-latthiyum vediyundayamSummary and values in the malayalam novel-latthiyum vediyundayam
Summary and values in the malayalam novel-latthiyum vediyundayam
MikaPriya
 

More from MikaPriya (17)

Poster on importance of girl-child education
Poster on importance of girl-child educationPoster on importance of girl-child education
Poster on importance of girl-child education
 
Assignment poster on struggles of nelson mandela
Assignment  poster on struggles of nelson mandelaAssignment  poster on struggles of nelson mandela
Assignment poster on struggles of nelson mandela
 
Conservation laws
Conservation lawsConservation laws
Conservation laws
 
Air pollution-Cbse-Grade 9
Air pollution-Cbse-Grade 9Air pollution-Cbse-Grade 9
Air pollution-Cbse-Grade 9
 
Thejaswiyaya vaagmi-CBSE-Grade 9-Notes(malayalam
Thejaswiyaya vaagmi-CBSE-Grade 9-Notes(malayalamThejaswiyaya vaagmi-CBSE-Grade 9-Notes(malayalam
Thejaswiyaya vaagmi-CBSE-Grade 9-Notes(malayalam
 
Economics-Grade 9- assignment
Economics-Grade 9- assignmentEconomics-Grade 9- assignment
Economics-Grade 9- assignment
 
Gandhiji's vision
Gandhiji's visionGandhiji's vision
Gandhiji's vision
 
Quiz on the constitution of india
Quiz on the constitution of indiaQuiz on the constitution of india
Quiz on the constitution of india
 
Summary and values in the malayalam novel-latthiyum vediyundayam
Summary and values in the malayalam novel-latthiyum vediyundayamSummary and values in the malayalam novel-latthiyum vediyundayam
Summary and values in the malayalam novel-latthiyum vediyundayam
 
Travelouge in Malayalam
Travelouge in MalayalamTravelouge in Malayalam
Travelouge in Malayalam
 
Mahatma gandhi quiz
Mahatma gandhi  quizMahatma gandhi  quiz
Mahatma gandhi quiz
 
In the kingdom of fools-
In the kingdom of fools-In the kingdom of fools-
In the kingdom of fools-
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
About France
About FranceAbout France
About France
 
Natural phenomena
Natural phenomenaNatural phenomena
Natural phenomena
 
Temperate grasslands
Temperate grasslandsTemperate grasslands
Temperate grasslands
 
Kings and architecture
Kings and architectureKings and architecture
Kings and architecture
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Computer Viruses

  • 1. COMPUTER VIRUSES DONE BY: ANAMIKA PRIYA,ALENA JOHN
  • 2. There are mainly 9 types of viruses. The viruses we are going to be discussing today are: ● MULTIPARTITE VIRUS ● POLYMORPHIC VIRUS ● OVERWRITE VIRUS ● SPACEFILLER VIRUS ● FAT VIRUS
  • 3. MULTIPARTITE VIRUS ● A multipartite virus is a fast-moving virus that uses file infectors or boot infectors to attack the boot sector and executable files simultaneously. ● The multipartite virus can affect both the boot sector and the program files at the same time. ● A multipartite virus is also known as a hybrid virus. ● The effects of a multipartite virus can be far-reaching and very damaging to a computer system. ● A virus is launched at various points in time, making the computer inoperable for even the simplest tasks. ● The program files may be cleaned up, but the boot sector may not be. If this is the case, the multipartite virus will reproduce as it did when it originated within the system.
  • 4. ❏ THE FIRST MULTIPARTITE VIRUS WAS GHOSTBALL VIRUS. ❏ EXAMPLES OF MULTIPARTITE VIRUS ARE FLIP,INVADER,TEQUILA.
  • 5. POLYMORPHIC VIRUS ● A polymorphic virus is a complicated computer virus that affects data types and functions. ● It is a self-encrypted virus designed to avoid detection by a scanner. ● Upon infection, the polymorphic virus duplicates itself by creating usable, albeit slightly modified, copies of itself. ● Removing polymorphic viruses requires that programmers rewrite language strings, which can be time-consuming, complex and costly.
  • 6. ● EXAMPLES OF VIRUSES INCLUDE MARBURG,TUAREG,SATAN BUG,ELKERN
  • 7. OVERWRITE VIRUS ● An overwriting virus is a malicious program which, after infection, will effectively destroy the original program code, typically by overwriting data in the system's memory. ● The only way to remove the virus is by deleting the infected file and therefore the user loses its contents. ● It can infect a specific file in a software or a whole software. ● Spreads via email. ● It was active in targeting Windows NT and Windows 2000 systems in the 2000s.
  • 8. ❏ The trojan virus and Trj.reboot are some of the examples of multipartite virus.
  • 9. SPACEFILLER VIRUS ● a spacefiller virus is a rare type of computer virus that attempts to install itself by filling in the empty sections of a file. ● By only using empty sections of a file, the virus can infect a file without the size of the file changing, making it more difficult to detect. ● In the past this was difficult to do properly, but new file formats make it easier. ● Also known as cavity virus.
  • 10. ● The lehigh virus is an example of spacefiller virus.
  • 11. FAT VIRUS ● Short for file allocation table, FAT ● FAT viruses infect the file allocation systems of the computer and gain access to the location of all the files. ● A lot of important files are split or fragmented into a number of parts. FAT viruses are capable of detecting and tracking all of these fragments and therefore effectively gain control over all the files on the system. ● As soon as the FAT makes contact with the corrupt file, the virus is triggered infecting the system. ● A lot of FAT viruses are created to destroy or overwrite entire directories which can result in permanent loss of data. ● Fat viruses have the ability to spread to other files and infect other sectors of the system.
  • 12. ● FAT 12 & FAT 6 are some of the examples of file allocation table (FAT) virus.