SlideShare a Scribd company logo
1 of 18
VIRUS AND ANTI-VIRUS
University Of The Punjab Gujranwala Campus
Group Members
Sikander Hayat (BCS19-253)
M Umair Aslam (BCS19-234)
SUBMITTED TO:
Sir Abrar Khan
Table of Content
• Computer Virus
• What a computer virus can do?
• Who Create Computer Virus?
• History Of Computer Virus
• Types of Computer Virus
• Signs of viruses
• Why do people Create Computer virus?
• How do computer viruses spread?
• What is an Anti-Virus?
• How to protect system from viruses?
• How an Anti-Virus Works?
What is Computer Virus?
Computer Virus:
A computer virus is a type of malicious software that
attaches itself to other programs, self-replicates, and spreads to
other computers
What a computer virus can do?
 Stealing passwords or data
 Logging keystrokes
 Corrupting files
 Spamming your email contacts
 and even taking over your machine
Who Create a Virus?
Where do viruses come from? Every virus is created by an
author with a different motive—but all virus builders feel their
actions are justified. For some, a killer virus is the ultimate
technical challenge, like climbing a mountain. For others, creating
viruses is a form of self-expression. Some disgruntled employees,
consumers or citizens turn to virus building as revenge for perceived
injustices
History
The first computer virus, called "Creeper system", was an
experimental self-replicating virus released in 1971.
It was filling up the hard drive until a computer could not operate
any further.
This virus was created by BBN technologies in the US. The first
computer virus for MS-DOS was "Brain" and was released in 1986.
Types of Viruses
• Boot Sector Virus
• Program Virus
• Macro
Computer Viruses
Other Computer Viruses are:
• Worm
• Adware
• Trojan Horse
• Spyware
• Malware
• Spam
• Virus Hoaxes
Are you infected?
Signs of viruses:
 Your computer runs more slowly than normal
 Your computer stops responding or locks up often
 Your computer crashes and restarts every few minutes
 Your computer restarts on its own and then fails to run normally
 Applications on your computer don't work correctly.
Signs of viruses: Are you infected?
 You can't print correctly.
 You see unusual error messages.
 Disks or disk drives are inaccessible.
Why do people Create Computer virus?
Any programmer can make a virus to :
• To take money
• To prove ones skill or for revenge purpose
• To disable a computer or network
How do computer viruses spread?
 Removeable Drives or Media
 Internet
 CD/DVD disks
 E-mail Attachments
What is an Anti-Virus?
Antivirus software, also known as anti-malware, is a computer
program used to prevent, detect, and remove malware and other
malicious software’s like Worms ,Trojan etc. Antivirus software was
originally developed to detect and remove computer viruses, hence
the name.
Also Protect from further Virus
Attacks.
Like AVAST Anti-Virus, AVG etc.
How an Anti-Virus Works?
• Examine each file in a computer
• Examine its content with virus definition stored in its
virus dictionary
Virus Dictionary:
It is an inbuilt file belonging to an antivirus
software that contains code identified as a virus by the antivirus
authors.
How to protect system from viruses:
a) Install a good anti-virus software.
b) Update anti-virus regularly.
c) Use an Internet firewall .
d) Be Careful while downloading files or programs from internet.
e) Do Not use Pirated Software's.
f) Always scan your removeable drives before using them.
ANY QUESTION?

More Related Content

Similar to Virus.pptx

Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfAlefya1
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethicssamina khan
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Computer viruses
Computer virusesComputer viruses
Computer virusesBabita Pant
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxGDhanushia
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
COMPUTER VIRUS
COMPUTER VIRUS COMPUTER VIRUS
COMPUTER VIRUS AnaniaDaxo
 

Similar to Virus.pptx (20)

Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
information about virus
information about virusinformation about virus
information about virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
COMPUTER VIRUS
COMPUTER VIRUS COMPUTER VIRUS
COMPUTER VIRUS
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 

Recently uploaded (20)

DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 

Virus.pptx

  • 1. VIRUS AND ANTI-VIRUS University Of The Punjab Gujranwala Campus
  • 2.
  • 3. Group Members Sikander Hayat (BCS19-253) M Umair Aslam (BCS19-234) SUBMITTED TO: Sir Abrar Khan
  • 4. Table of Content • Computer Virus • What a computer virus can do? • Who Create Computer Virus? • History Of Computer Virus • Types of Computer Virus • Signs of viruses • Why do people Create Computer virus? • How do computer viruses spread? • What is an Anti-Virus? • How to protect system from viruses? • How an Anti-Virus Works?
  • 5. What is Computer Virus? Computer Virus: A computer virus is a type of malicious software that attaches itself to other programs, self-replicates, and spreads to other computers
  • 6. What a computer virus can do?  Stealing passwords or data  Logging keystrokes  Corrupting files  Spamming your email contacts  and even taking over your machine
  • 7. Who Create a Virus? Where do viruses come from? Every virus is created by an author with a different motive—but all virus builders feel their actions are justified. For some, a killer virus is the ultimate technical challenge, like climbing a mountain. For others, creating viruses is a form of self-expression. Some disgruntled employees, consumers or citizens turn to virus building as revenge for perceived injustices
  • 8. History The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. The first computer virus for MS-DOS was "Brain" and was released in 1986.
  • 9. Types of Viruses • Boot Sector Virus • Program Virus • Macro
  • 10. Computer Viruses Other Computer Viruses are: • Worm • Adware • Trojan Horse • Spyware • Malware • Spam • Virus Hoaxes
  • 11. Are you infected? Signs of viruses:  Your computer runs more slowly than normal  Your computer stops responding or locks up often  Your computer crashes and restarts every few minutes  Your computer restarts on its own and then fails to run normally  Applications on your computer don't work correctly.
  • 12. Signs of viruses: Are you infected?  You can't print correctly.  You see unusual error messages.  Disks or disk drives are inaccessible.
  • 13. Why do people Create Computer virus? Any programmer can make a virus to : • To take money • To prove ones skill or for revenge purpose • To disable a computer or network
  • 14. How do computer viruses spread?  Removeable Drives or Media  Internet  CD/DVD disks  E-mail Attachments
  • 15. What is an Anti-Virus? Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware and other malicious software’s like Worms ,Trojan etc. Antivirus software was originally developed to detect and remove computer viruses, hence the name. Also Protect from further Virus Attacks. Like AVAST Anti-Virus, AVG etc.
  • 16. How an Anti-Virus Works? • Examine each file in a computer • Examine its content with virus definition stored in its virus dictionary Virus Dictionary: It is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.
  • 17. How to protect system from viruses: a) Install a good anti-virus software. b) Update anti-virus regularly. c) Use an Internet firewall . d) Be Careful while downloading files or programs from internet. e) Do Not use Pirated Software's. f) Always scan your removeable drives before using them.