SlideShare a Scribd company logo
1 of 30
Q & A
Why Unnecessary Advertise open when using Internet ?
Malware
Malware Mean malicious software
Malware is any software used to disrupt computer operations, gather
sensitive information, display unwanted advertising.
Malware Coming Sources
• Internet
• via pirated website
• Pirated software
• when you are downloading Pirated Movie, Pirate Game.
• When You are click advertise on malicious website.
• Via E-Mail etc…
Malware Coming Sources
When Offline use
• Cd - DVD
• Pen drive
Three Type Of Malware
1. Virus
2. Trojan
3. Worm
All malware are work differently.
What Virus ?
Infecting computer programs can include as well, data files, or the boot sector
of the hard drive.
Ex. Microsoft Word Document corrupt
If are you share corrupted document any person then to establish virus our
friends computer
What Virus ?
What Virus ?
The first computer virus
The Creeper virus was first detected on ARPANET,
the forerunner of the Internet, in the early 1970s
The first computer virus
The first computer viruses
The first computer viruses
• Brain is the industry standard name for a computer virus that was released in its
first form in January 1986
• The first computer virus for MS-DOS.
• It infects the boot sector of storage media formatted with the DOS File Allocation
Table (FAT) file system.
• Brain was written by two brothers, Basit Farooq Alvi and Amjad Farooq Alvi, from
Lahore, Punjab, Pakistan.
What Trojan?
Trojan is any malicious computer program
which is used to hack into a computer by misleading
users of its true intent.
For Example : Speed Booster, Memory increase Speed, etc…
ट्रोजन किसी भी दुभभावनभपूर्ा िं प्यूटर प्रोग्रभम है जो अपने असली इरभदे उपयोगिर्भाओं िे िो
गुमरभह िरिे एि िं प्यूटर में हैि िरने िे ललए इस्र्ेमभल कियभ जभर्भ है।
Change face after coming your System
What Worm?
A computer worm is a standalone malware computer program that replicates
itself in order to spread to other computers.
For Example: Duplicate Copying in no’s of file
How to Protect with malware
• Visit Trusted website
• Don’t Click misguided Advertise
• E-Mail (Spam)
• Install Anti Virus Or Anti Malware Software (License)
• Don’t Install unknown Source via Pendrive
Firewall
What Is Firewall ?
Protect (a network or system) from unauthorized access with a firewall.
Types Of Firewall
1. Hardware base Firewall
2. Software based firewall
Hardware base Firewall
Hardware base Firewall
Software base Firewall
MacAfee
Norton
Etc…
In Windows Inbuilt Firewall system
Beast is a Windows-based backdoor Trojan horse, more commonly known in the hacking
community as a Remote Administration Tool or a "RAT"
How It Can Affect Malware in Your Computer
Malware, or malicious software, is on the rise and can be found in all corners of the Internet. By
simply navigating to a website or opening an email, you are at risk of infecting your computer.
Malware takes the form of code, scripts, content and even legitimate
software to obtain access to your computer and the
personal information it houses.
मभलवेयर आपिे िं प्यूटर और व्यक्तर्गर् जभनिभरी घरों र्ि पहुुँच प्रभप्र् िरने िे ललए िोड िे ,
ललपपयों, सभमग्री और यहभं र्ि कि ऐसभ वैध सॉफ़्टवेयर िभ रूप ले लेर्भ है।
Malware

More Related Content

What's hot

Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentationPhương Anh Pađi
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security riskssamthking25
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksJamesBennett15
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Computer virus
Computer virusComputer virus
Computer virusarif srk
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virusshusrusha
 

What's hot (20)

Malware
MalwareMalware
Malware
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Internet threats
Internet threatsInternet threats
Internet threats
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
information about virus
information about virusinformation about virus
information about virus
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Malwares
MalwaresMalwares
Malwares
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Computer virus
Computer virusComputer virus
Computer virus
 
Internet threat
Internet threatInternet threat
Internet threat
 
Software theft
Software theftSoftware theft
Software theft
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 

Similar to Malware

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Learning malware for fun and profit
Learning  malware for fun and profitLearning  malware for fun and profit
Learning malware for fun and profitsr1nu
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,Kahir_alrawi
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesadni_shadah
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 

Similar to Malware (20)

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Learning malware for fun and profit
Learning  malware for fun and profitLearning  malware for fun and profit
Learning malware for fun and profit
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
 
All about viruses
All about virusesAll about viruses
All about viruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus project
Virus projectVirus project
Virus project
 
Malicious
MaliciousMalicious
Malicious
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from MohsinHusenManasiya (20)

Ch - 01 [Eng-11] Chapter -1
Ch - 01 [Eng-11] Chapter -1Ch - 01 [Eng-11] Chapter -1
Ch - 01 [Eng-11] Chapter -1
 
Storage unit
Storage unitStorage unit
Storage unit
 
Satelite
SateliteSatelite
Satelite
 
RFID
RFIDRFID
RFID
 
QR CODE
QR CODEQR CODE
QR CODE
 
Qr
QrQr
Qr
 
Qr codes
Qr codesQr codes
Qr codes
 
Teamviewr
TeamviewrTeamviewr
Teamviewr
 
Q 1
Q 1Q 1
Q 1
 
Ppi
PpiPpi
Ppi
 
Nfc
NfcNfc
Nfc
 
Network
NetworkNetwork
Network
 
Mobile processor
Mobile processorMobile processor
Mobile processor
 
Lasik eye surgery
Lasik eye surgeryLasik eye surgery
Lasik eye surgery
 
Iris
IrisIris
Iris
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Ingestible robots
Ingestible robotsIngestible robots
Ingestible robots
 
I3 vs i5 vs i7
I3 vs i5 vs i7I3 vs i5 vs i7
I3 vs i5 vs i7
 
How does wireless inductive charging work
How does wireless inductive charging workHow does wireless inductive charging work
How does wireless inductive charging work
 
History of computer
History of computerHistory of computer
History of computer
 

Recently uploaded

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 

Recently uploaded (20)

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 

Malware

  • 2. Why Unnecessary Advertise open when using Internet ?
  • 4. Malware Mean malicious software Malware is any software used to disrupt computer operations, gather sensitive information, display unwanted advertising.
  • 5. Malware Coming Sources • Internet • via pirated website • Pirated software • when you are downloading Pirated Movie, Pirate Game. • When You are click advertise on malicious website. • Via E-Mail etc…
  • 6. Malware Coming Sources When Offline use • Cd - DVD • Pen drive
  • 7. Three Type Of Malware 1. Virus 2. Trojan 3. Worm All malware are work differently.
  • 8. What Virus ? Infecting computer programs can include as well, data files, or the boot sector of the hard drive. Ex. Microsoft Word Document corrupt If are you share corrupted document any person then to establish virus our friends computer
  • 11. The first computer virus The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s
  • 14. The first computer viruses • Brain is the industry standard name for a computer virus that was released in its first form in January 1986 • The first computer virus for MS-DOS. • It infects the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system. • Brain was written by two brothers, Basit Farooq Alvi and Amjad Farooq Alvi, from Lahore, Punjab, Pakistan.
  • 15. What Trojan? Trojan is any malicious computer program which is used to hack into a computer by misleading users of its true intent. For Example : Speed Booster, Memory increase Speed, etc… ट्रोजन किसी भी दुभभावनभपूर्ा िं प्यूटर प्रोग्रभम है जो अपने असली इरभदे उपयोगिर्भाओं िे िो गुमरभह िरिे एि िं प्यूटर में हैि िरने िे ललए इस्र्ेमभल कियभ जभर्भ है। Change face after coming your System
  • 16. What Worm? A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. For Example: Duplicate Copying in no’s of file
  • 17. How to Protect with malware • Visit Trusted website • Don’t Click misguided Advertise • E-Mail (Spam) • Install Anti Virus Or Anti Malware Software (License) • Don’t Install unknown Source via Pendrive
  • 19. What Is Firewall ? Protect (a network or system) from unauthorized access with a firewall.
  • 20. Types Of Firewall 1. Hardware base Firewall 2. Software based firewall
  • 23.
  • 24. Software base Firewall MacAfee Norton Etc… In Windows Inbuilt Firewall system
  • 25.
  • 26. Beast is a Windows-based backdoor Trojan horse, more commonly known in the hacking community as a Remote Administration Tool or a "RAT"
  • 27. How It Can Affect Malware in Your Computer
  • 28. Malware, or malicious software, is on the rise and can be found in all corners of the Internet. By simply navigating to a website or opening an email, you are at risk of infecting your computer.
  • 29. Malware takes the form of code, scripts, content and even legitimate software to obtain access to your computer and the personal information it houses. मभलवेयर आपिे िं प्यूटर और व्यक्तर्गर् जभनिभरी घरों र्ि पहुुँच प्रभप्र् िरने िे ललए िोड िे , ललपपयों, सभमग्री और यहभं र्ि कि ऐसभ वैध सॉफ़्टवेयर िभ रूप ले लेर्भ है।