SlideShare a Scribd company logo
1 of 18
At
Glance
What is Virus?
Hackers &
Crackers
Types of
Computer
Viruses
Some other
Harmful
Programs
How you
Protect your
System
against
Viruses ?
A virus is a program that enters the computer system
by attacking itself to another program and then
spreads itself across the system.
There are two different types of people who write
computer virus programs –
Hackers
Crackers
Hackers refers to the people who use their skills to enter into
computer system without authorization. Hackers are
computer enthusiasts, who break into secure systems to gain
knowledge about them and possibly use their knowledge to
play pranks.
A Cracker is malicious programmer who gain unauthorized
access to computer system for the purpose of stealing,
altering or corrupting information.
There are so many types of computer
viruses.
Some of them are :
Macro Virus
File Infector
Resident Virus
Network Virus
Logic Bomb
Boot Sector Virus
Multipartite Virus
Stealth Virus
A macro virus is a computer virus that "infects" a
Microsoft Word or similar application and causes a
sequence of actions to be performed automatically
when the application is started or something else
triggers it. Macro viruses tend to be surprising but
relatively harmless. A typical effect is the undesired
insertion of some comic text at certain points when
writing a line. A macro virus is often spread as an e-
mail virus. A well-known example in March, 1999 was
the Melissa virus virus.
Phrasp the most common type of virus, the file infector
takes root in a host file and then begins its operation
when the file is executed.
The virus may completely
overwrite the file that it infects, or may only replace
parts of the file. Some file infector
viruses attack
themselves to program file, usually selected .COM or
.EXE file.
A board virus definition applies to any
virus that inserts itself into a system’s
memory
A kind of virus spreads across networks in computers,
for example, Nimda and SQL SLAMMER worms are
viruses which spread over corporated networks or the
internet via e-mails.
A logic Bomb is a program that get executed only
when specific condition is met. The virus: Friday the
13th, , was so programmed so as to get executed on
that perticular date.
A boot sector virus hides in the boot sector of hard
disk. The boot sector is where your operating
system is. So every time you boot your computer
the virus gets loaded into the computer memory.
Examples of boot-sector viruses are Polyboot B,
AntiEXE.
This virus is spread by infected floppies and CDs.
These viruses first infect the boot sector of hard drive
and then infect the executable files stored in it. For ex.-
Ywinz.
These are some virus which try to hide
themselves from Anti-virus software by
resorting some tricks. Stealth virus can
safely show an anti-virus software that a
certain file is uninfected.
A Trojan Horse program is a file that appears
harmless unless it has executed. The Trojan Horse
program disguises itself as a game or a utility
program but when executed it can destroy the data
stored in the computer. The name Trojan Horse has
been derived from Greek mythology.
Worms are small pieces of software that use
computer network and security holes to replicate
itself.
Worms on the internet spread by e-mail it
searches for all the address book of the mailing
system. It then mails to all recipients.

Install a good Anti-Virus software on your computer.

Update Anti-Virus regularly.

Be careful while Downloading files or programs from the
internet.

Always scan your floppies, CDs, flash drives before using
them.

Do not use pirated software.

Turn on firewall of your computer operating system.
Presented By:

More Related Content

Similar to presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx

Similar to presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx (20)

Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
virus
virusvirus
virus
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from NORTHCUSTOMS

informatique1as_project-virus.pptx
informatique1as_project-virus.pptxinformatique1as_project-virus.pptx
informatique1as_project-virus.pptxNORTHCUSTOMS
 
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).pptd8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).pptNORTHCUSTOMS
 
901130_computer1.ppt
901130_computer1.ppt901130_computer1.ppt
901130_computer1.pptNORTHCUSTOMS
 
virus-part2-150726093824-lva1-app6891.pdf
virus-part2-150726093824-lva1-app6891.pdfvirus-part2-150726093824-lva1-app6891.pdf
virus-part2-150726093824-lva1-app6891.pdfNORTHCUSTOMS
 
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.pptd8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.pptNORTHCUSTOMS
 
تحرير الكتب الرسمية وكتابة المختصر .pptx
تحرير الكتب الرسمية وكتابة المختصر .pptxتحرير الكتب الرسمية وكتابة المختصر .pptx
تحرير الكتب الرسمية وكتابة المختصر .pptxNORTHCUSTOMS
 

More from NORTHCUSTOMS (7)

informatique1as_project-virus.pptx
informatique1as_project-virus.pptxinformatique1as_project-virus.pptx
informatique1as_project-virus.pptx
 
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).pptd8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
 
901130_computer1.ppt
901130_computer1.ppt901130_computer1.ppt
901130_computer1.ppt
 
virus-part2-150726093824-lva1-app6891.pdf
virus-part2-150726093824-lva1-app6891.pdfvirus-part2-150726093824-lva1-app6891.pdf
virus-part2-150726093824-lva1-app6891.pdf
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.pptd8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
 
تحرير الكتب الرسمية وكتابة المختصر .pptx
تحرير الكتب الرسمية وكتابة المختصر .pptxتحرير الكتب الرسمية وكتابة المختصر .pptx
تحرير الكتب الرسمية وكتابة المختصر .pptx
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx

  • 1.
  • 2. At Glance What is Virus? Hackers & Crackers Types of Computer Viruses Some other Harmful Programs How you Protect your System against Viruses ?
  • 3. A virus is a program that enters the computer system by attacking itself to another program and then spreads itself across the system.
  • 4. There are two different types of people who write computer virus programs – Hackers Crackers Hackers refers to the people who use their skills to enter into computer system without authorization. Hackers are computer enthusiasts, who break into secure systems to gain knowledge about them and possibly use their knowledge to play pranks. A Cracker is malicious programmer who gain unauthorized access to computer system for the purpose of stealing, altering or corrupting information.
  • 5. There are so many types of computer viruses. Some of them are : Macro Virus File Infector Resident Virus Network Virus Logic Bomb Boot Sector Virus Multipartite Virus Stealth Virus
  • 6. A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless. A typical effect is the undesired insertion of some comic text at certain points when writing a line. A macro virus is often spread as an e- mail virus. A well-known example in March, 1999 was the Melissa virus virus.
  • 7. Phrasp the most common type of virus, the file infector takes root in a host file and then begins its operation when the file is executed. The virus may completely overwrite the file that it infects, or may only replace parts of the file. Some file infector viruses attack themselves to program file, usually selected .COM or .EXE file.
  • 8. A board virus definition applies to any virus that inserts itself into a system’s memory
  • 9. A kind of virus spreads across networks in computers, for example, Nimda and SQL SLAMMER worms are viruses which spread over corporated networks or the internet via e-mails.
  • 10. A logic Bomb is a program that get executed only when specific condition is met. The virus: Friday the 13th, , was so programmed so as to get executed on that perticular date.
  • 11. A boot sector virus hides in the boot sector of hard disk. The boot sector is where your operating system is. So every time you boot your computer the virus gets loaded into the computer memory. Examples of boot-sector viruses are Polyboot B, AntiEXE.
  • 12. This virus is spread by infected floppies and CDs. These viruses first infect the boot sector of hard drive and then infect the executable files stored in it. For ex.- Ywinz.
  • 13. These are some virus which try to hide themselves from Anti-virus software by resorting some tricks. Stealth virus can safely show an anti-virus software that a certain file is uninfected.
  • 14. A Trojan Horse program is a file that appears harmless unless it has executed. The Trojan Horse program disguises itself as a game or a utility program but when executed it can destroy the data stored in the computer. The name Trojan Horse has been derived from Greek mythology.
  • 15. Worms are small pieces of software that use computer network and security holes to replicate itself. Worms on the internet spread by e-mail it searches for all the address book of the mailing system. It then mails to all recipients.
  • 16.  Install a good Anti-Virus software on your computer.  Update Anti-Virus regularly.  Be careful while Downloading files or programs from the internet.
  • 17.  Always scan your floppies, CDs, flash drives before using them.  Do not use pirated software.  Turn on firewall of your computer operating system.