SlideShare a Scribd company logo
1 of 21
A Computer Virus is a computer
program that can copy itself and
infect a computer without permission
or knowledge of the user
A virus can only spread
from one computer to
another when its host is
taken to the uninfected
computer, for instance by
a user sending it over a
network or the Internet,
or by carrying it on a
removable medium such
as a floppy disk, CD, or
USB drive.
On the basis of scale there are five types of
viruses under one name:
MALWARE
Spyware Adware Worms Trojans Rootkits
VIRUSES: WHAT THEY INFECT
1. System SectorViruses -DOS boot sector or the Master
Boot Record
2. File Viruses -Program (COM and EXE) files
3. Macro Viruses -Data files having macro programs
4. Companion Viruses -EXE files by installing a same-named
COM file
5. Cluster Viruses -Changes the DOS directory information so
that directory entries point to the virus code instead of the
actual program
6. Source Code Viruses -Source code, by adding Trojan code
to it
Malware, from the words
malicious and software, is
a software designed to
infiltrate or damage a
computer system without
the owner's informed
consent .It includes
spyware, adware,
computer worms and
trojan horses.
Spyware is computer
software that is installed
secretly on a personal
computer to intercept or
take partial control over
the user's interaction with
the computer, without the
user's informed consent.
Adware or advertising-
supported software is any
software package which
automatically plays,
displays, or downloads
advertisements to a
computer after the
software is installed on it
or while the application is
being used.
Computer Worm is a self-
replicating computer
program. It uses a network
to send copies of itself to
other nodes (computer
terminals on the network)
and it may do so without
any user intervention. It
always cause harm to the
network, if only by
consuming bandwidth
A Trojan, is malware
that appears to
perform a desirable
function but in fact
performs undisclosed
malicious functions
A Rootkit is a computer
virus which consists of a
program designed to take
fundamental control of a
computer system, without
authorization by the
system's owners and
legitimate managers.
 Operating System may slow
down.
 Change the length of executable
(*.com/*.exe) files.
 Change to the reassignment of
system resources.
 Showing some funny and
suspicious behaviour (blinking of
the mouse).
Signs of viruses:
ANTI - VIRUS
Anti-Virus Software are
computer programs that
attempt to identify,
neutralize or eliminate
malicious software. Most
modern antivirus software is
now designed to combat a
wide range of threats,
including worms, rootkits,
Trojans, often described
collectively as malware.
1. THE SIGNATURE
APPROACH:
Just like the police traces patterns in
crimes back to a criminal ,software
engineers can reverse engineer a
virus to find the signature it leaves .this
signature is added to the database so
that when buster performs a virus
scan, each file is scanned for matches
with any virus’ signature
2.THE SANDBOX APPROACH:
A ‘sandbox is an advanced
program that emulates an OS.A
suspect executable file is run
within the confines of a sandbox
and then the sandbox is examined
to see what changes were made.
3.THE HEURISTIC APPROACH:
This analyses a program for
‘seemingly’ malicious behavior
,heuristics is effective against
undocumented viruses .The buster of
the future might eliminate the need for
continual monitoring of new viruses.
1.Delete your browsing history, temporary
internet files, internet cookies before exiting .
2.Always remember to scan any removable
hardware using anti-virus software before accessing
it. Removable hardware includes Floppy Disks, CD,
USB Drive.
3.Scan your computer every week using anti-virus
software like Norton, McAfee for prevention against
malware
4.Update your anti-virus for new and latest virus definitions.
5.Create a system restore point before installing any software
or freeware.
Kaspersky Anti-Virus
Norton Antivirus
AVG Antivirus
NOD32 Antivirus
Panda Antivirus
CONCLUSION:
•VIRUSES HAVE STIMULATED SCIENTIFIC
THINKING AND IDEAS
•SOME IDEAS CAN ALSO BE EXPORTED INTO
MEDICAL SCIENCE
•VIRUSES CAN ALSO BE PUT TO CONSTRUCTIVE
USE(GOOD VIRUSES)
•EACH USER MUST REALIZE THE GRAVE DANGER
POSED BY VIRUSES
•TAKE STEPS TO PREVENT INFECTION, AND IN
CASE OF INFECTION, PROPER AND SAFE WAYS OF
DEALING WITH THE INFECTION
THANK YOU!

More Related Content

What's hot (20)

Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Anti virus
Anti virusAnti virus
Anti virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked

Visio Sdlc Requirements Process Map
Visio Sdlc Requirements Process MapVisio Sdlc Requirements Process Map
Visio Sdlc Requirements Process Mapjdesteve
 
JDEdwards E1 Security
JDEdwards E1 SecurityJDEdwards E1 Security
JDEdwards E1 SecuritySanguine_Eva
 
Training MFG AAI
Training MFG AAITraining MFG AAI
Training MFG AAIjdesteve
 
Improving the Oracle JDEdwards Enterpriseone Workflow approval process in 9.1
Improving the Oracle JDEdwards Enterpriseone Workflow approval process in 9.1Improving the Oracle JDEdwards Enterpriseone Workflow approval process in 9.1
Improving the Oracle JDEdwards Enterpriseone Workflow approval process in 9.1Sergio Vargas
 
Jde commerce cx
Jde commerce cxJde commerce cx
Jde commerce cxephluxco
 
KPIT Supplier Portal for JDEdwards Enterprise One
KPIT Supplier Portal for JDEdwards Enterprise One KPIT Supplier Portal for JDEdwards Enterprise One
KPIT Supplier Portal for JDEdwards Enterprise One KPIT
 

Viewers also liked (8)

Visio Sdlc Requirements Process Map
Visio Sdlc Requirements Process MapVisio Sdlc Requirements Process Map
Visio Sdlc Requirements Process Map
 
JDEdwards E1 Security
JDEdwards E1 SecurityJDEdwards E1 Security
JDEdwards E1 Security
 
Training MFG AAI
Training MFG AAITraining MFG AAI
Training MFG AAI
 
Improving the Oracle JDEdwards Enterpriseone Workflow approval process in 9.1
Improving the Oracle JDEdwards Enterpriseone Workflow approval process in 9.1Improving the Oracle JDEdwards Enterpriseone Workflow approval process in 9.1
Improving the Oracle JDEdwards Enterpriseone Workflow approval process in 9.1
 
Jde commerce cx
Jde commerce cxJde commerce cx
Jde commerce cx
 
KPIT Supplier Portal for JDEdwards Enterprise One
KPIT Supplier Portal for JDEdwards Enterprise One KPIT Supplier Portal for JDEdwards Enterprise One
KPIT Supplier Portal for JDEdwards Enterprise One
 
Antivirus
AntivirusAntivirus
Antivirus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 

Similar to Computer viruses and antiviruses

COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwaresonajidongre
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 

Similar to Computer viruses and antiviruses (20)

COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus project
Virus projectVirus project
Virus project
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

More from Sanguine_Eva

More from Sanguine_Eva (6)

BERMUDA TRIANGLE
BERMUDA TRIANGLEBERMUDA TRIANGLE
BERMUDA TRIANGLE
 
26/11 MUMBAI
26/11 MUMBAI26/11 MUMBAI
26/11 MUMBAI
 
Area 51
Area 51Area 51
Area 51
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
DNS server configuration
DNS server configurationDNS server configuration
DNS server configuration
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Computer viruses and antiviruses

  • 1.
  • 2. A Computer Virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user
  • 3. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 4. On the basis of scale there are five types of viruses under one name: MALWARE Spyware Adware Worms Trojans Rootkits
  • 5. VIRUSES: WHAT THEY INFECT 1. System SectorViruses -DOS boot sector or the Master Boot Record 2. File Viruses -Program (COM and EXE) files 3. Macro Viruses -Data files having macro programs 4. Companion Viruses -EXE files by installing a same-named COM file 5. Cluster Viruses -Changes the DOS directory information so that directory entries point to the virus code instead of the actual program 6. Source Code Viruses -Source code, by adding Trojan code to it
  • 6. Malware, from the words malicious and software, is a software designed to infiltrate or damage a computer system without the owner's informed consent .It includes spyware, adware, computer worms and trojan horses.
  • 7. Spyware is computer software that is installed secretly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.
  • 8. Adware or advertising- supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.
  • 9. Computer Worm is a self- replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. It always cause harm to the network, if only by consuming bandwidth
  • 10. A Trojan, is malware that appears to perform a desirable function but in fact performs undisclosed malicious functions
  • 11. A Rootkit is a computer virus which consists of a program designed to take fundamental control of a computer system, without authorization by the system's owners and legitimate managers.
  • 12.  Operating System may slow down.  Change the length of executable (*.com/*.exe) files.  Change to the reassignment of system resources.  Showing some funny and suspicious behaviour (blinking of the mouse). Signs of viruses:
  • 14. Anti-Virus Software are computer programs that attempt to identify, neutralize or eliminate malicious software. Most modern antivirus software is now designed to combat a wide range of threats, including worms, rootkits, Trojans, often described collectively as malware.
  • 15. 1. THE SIGNATURE APPROACH: Just like the police traces patterns in crimes back to a criminal ,software engineers can reverse engineer a virus to find the signature it leaves .this signature is added to the database so that when buster performs a virus scan, each file is scanned for matches with any virus’ signature
  • 16. 2.THE SANDBOX APPROACH: A ‘sandbox is an advanced program that emulates an OS.A suspect executable file is run within the confines of a sandbox and then the sandbox is examined to see what changes were made.
  • 17. 3.THE HEURISTIC APPROACH: This analyses a program for ‘seemingly’ malicious behavior ,heuristics is effective against undocumented viruses .The buster of the future might eliminate the need for continual monitoring of new viruses.
  • 18. 1.Delete your browsing history, temporary internet files, internet cookies before exiting . 2.Always remember to scan any removable hardware using anti-virus software before accessing it. Removable hardware includes Floppy Disks, CD, USB Drive. 3.Scan your computer every week using anti-virus software like Norton, McAfee for prevention against malware 4.Update your anti-virus for new and latest virus definitions. 5.Create a system restore point before installing any software or freeware.
  • 19. Kaspersky Anti-Virus Norton Antivirus AVG Antivirus NOD32 Antivirus Panda Antivirus
  • 20. CONCLUSION: •VIRUSES HAVE STIMULATED SCIENTIFIC THINKING AND IDEAS •SOME IDEAS CAN ALSO BE EXPORTED INTO MEDICAL SCIENCE •VIRUSES CAN ALSO BE PUT TO CONSTRUCTIVE USE(GOOD VIRUSES) •EACH USER MUST REALIZE THE GRAVE DANGER POSED BY VIRUSES •TAKE STEPS TO PREVENT INFECTION, AND IN CASE OF INFECTION, PROPER AND SAFE WAYS OF DEALING WITH THE INFECTION