SlideShare a Scribd company logo
1 of 21
Introduction 
 Computer virus have become today’s 
headline news. 
 With the increasing use of the internet, it 
has become easier for virus to spread. 
 Virus show us loopholes in software. 
 Most virus are targeted at the MS 
Windows OS.
What is a Virus ? 
 A virus is just a computer program. Like any 
other program, it contains instructions that 
tell your computer what to do. 
 But unlike an application, a virus usually 
tells your computer to do something you 
don't want it to do, and it can usually spread 
itself to other files on your computer -- and 
other people's computers.
 In some cases, a virus will execute only a 
gentle "personality quirk," such as causing 
your computer to make seemingly random 
bleeps. 
 But a virus can be very destructive; it could 
format your hard drive, overwrite your hard 
drive boot sector, or delete files and render 
your machine inoperable.
History of Viruses 
 As time progressed many other types of viruses 
were developed. 
 In 1992, four students at Cornell University 
created the MBDF virus. 
 This virus attacked Apple Macintosh 
computers. 
 The virus was released in three shareware 
programs: Obnoxious Tetris (computer game), 
Ten Tile Puzzle (computer game), and Tetris 
cycle (Trojan Horse program). 
 This virus was benign, but the perpetrators 
were severely punished.
General virus types 
 Boot Sector Virus 
 Macro Virus 
 Multipartite Virus 
 Polymorphic Virus 
 Worms 
 Trojan horses 
 E-mail viruses 
 Stealth Virus
How They Spread ? 
 Early viruses were pieces of code attached to 
a common program like a popular game or a 
popular word processor. 
 A person might download an infected game 
from the internet or copy it from a floppy 
disk and run it. 
 A virus like this is a small piece of code 
embedded in a larger, legitimate program. 
Any virus is designed to run first when the 
legitimate program gets executed.
 If one of the infected programs is given to 
another person on a floppy disk, or if it is 
uploaded to internet, then other programs get 
infected. 
 This is how the virus spreads.
The impact of viruses 
 ICSA Labs estimates that the cost of a 
virus disaster is between $50,000 and 
$500,000 
 Average server downtime for a virus 
is 14 hours
The impact of viruses
Examples of risky file types 
 The following file types should never be 
opened: 
 .EXE 
 .PIF 
 .BAT 
 .VBS 
 .COM
TOP 5 Viruses Reported 
14 
12 
10 
8 
6 
4 
2 
0 
W32/klez/h W32- 
Bugbear-A 
Percent Reported to 
Sophos 2003 
W32/ElKern- 
C
Symptoms of Virus Attack 
 Computer no longer boots up. 
 Screen sometimes flicker. 
 Computer runs slower then usual. 
 PC speaker beeps periodically. 
 System crashes for no reason. 
 Files/directories sometimes disappear. 
 Denial of service (dos)….. & Many More.
Prevention is the best cure 
 Run a secure operating system like 
UNIX or Windows NT. 
 Install virus protection software. 
 Avoid programs from unknown 
sources. 
 Disable floppy disk booting
 Macro Virus Protection is enabled in all 
Microsoft applications. 
 Never double-click on an attachment that 
contains an executable that arrives as an 
e-mail attachment.
Protect Yourself from Computer Viruses 
 AVIEN & AVI-EWS 
 CERT 
 STOPzilla 
 GFI Mail Security for 
Exchange 
 Anti Virus eScan 2003 
 CIAC 
 Cyber notes 
 ICSA 
 Information Security 
Magazine 
 NIPC (National 
Infrastructure Protection 
Ctr) 
 SANS Institute 
 Virus Bulletin
How To Scan?
Anti-Virus Is Scanning
Finding Out A Virus
Top 9 Virus Protectors are... 
1) PANDA ANTIVIRUS PLATIINUM v7.0 
2) NORTON ANTIVIRUS 2003 
3) F-PROT FOR WINDOWS 
4) MCAFEE VIRUSSCAN HOME EDITION 
7.0 
5) NORMAN VIRUS CONTROL 
6) PC-CILLIN 
7) BIT DEFENDER PROFESSIONAL v6.5 
8) NOD 32 
9) STOPzilla!
Computer virus

More Related Content

What's hot (20)

Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Computer virus
Computer virusComputer virus
Computer virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
spyware
spywarespyware
spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
spyware
spywarespyware
spyware
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus
computer viruscomputer virus
computer virus
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Ransomware
RansomwareRansomware
Ransomware
 

Viewers also liked

As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Monday july 6 july 10,2015 epp lp
Monday                   july 6  july 10,2015 epp lpMonday                   july 6  july 10,2015 epp lp
Monday july 6 july 10,2015 epp lpEDITHA HONRADEZ
 
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ictIct lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ictMary Ann Encinas
 
Panganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusPanganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusMarie Jaja Tan Roa
 
Pagsusunod sunod ng mga pangyayari
Pagsusunod sunod ng mga pangyayariPagsusunod sunod ng mga pangyayari
Pagsusunod sunod ng mga pangyayaricaraganalyn
 
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)Jonah Salcedo
 
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virusIct lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virusMary Ann Encinas
 

Viewers also liked (9)

As computer virus
As computer virusAs computer virus
As computer virus
 
Monday july 6 july 10,2015 epp lp
Monday                   july 6  july 10,2015 epp lpMonday                   july 6  july 10,2015 epp lp
Monday july 6 july 10,2015 epp lp
 
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ictIct lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
 
Malware
MalwareMalware
Malware
 
Panganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusPanganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at Virus
 
Malware
MalwareMalware
Malware
 
Pagsusunod sunod ng mga pangyayari
Pagsusunod sunod ng mga pangyayariPagsusunod sunod ng mga pangyayari
Pagsusunod sunod ng mga pangyayari
 
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
 
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virusIct lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
 

Similar to Computer virus (20)

Virus
VirusVirus
Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus.pptx
Computer Virus.pptxComputer Virus.pptx
Computer Virus.pptx
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 

More from Shailendra Gohil

Cng as alternate to gasoline
Cng as alternate to gasolineCng as alternate to gasoline
Cng as alternate to gasolineShailendra Gohil
 
Document authentication system with graphical security and sound
Document authentication system with graphical security and soundDocument authentication system with graphical security and sound
Document authentication system with graphical security and soundShailendra Gohil
 

More from Shailendra Gohil (6)

Combinational circuit
Combinational circuitCombinational circuit
Combinational circuit
 
Xml
Xml Xml
Xml
 
Features Of Office 2007
Features Of Office 2007Features Of Office 2007
Features Of Office 2007
 
Cng as alternate to gasoline
Cng as alternate to gasolineCng as alternate to gasoline
Cng as alternate to gasoline
 
Document authentication system with graphical security and sound
Document authentication system with graphical security and soundDocument authentication system with graphical security and sound
Document authentication system with graphical security and sound
 
History of orkut
History of orkutHistory of orkut
History of orkut
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Computer virus

  • 1.
  • 2. Introduction  Computer virus have become today’s headline news.  With the increasing use of the internet, it has become easier for virus to spread.  Virus show us loopholes in software.  Most virus are targeted at the MS Windows OS.
  • 3. What is a Virus ?  A virus is just a computer program. Like any other program, it contains instructions that tell your computer what to do.  But unlike an application, a virus usually tells your computer to do something you don't want it to do, and it can usually spread itself to other files on your computer -- and other people's computers.
  • 4.  In some cases, a virus will execute only a gentle "personality quirk," such as causing your computer to make seemingly random bleeps.  But a virus can be very destructive; it could format your hard drive, overwrite your hard drive boot sector, or delete files and render your machine inoperable.
  • 5. History of Viruses  As time progressed many other types of viruses were developed.  In 1992, four students at Cornell University created the MBDF virus.  This virus attacked Apple Macintosh computers.  The virus was released in three shareware programs: Obnoxious Tetris (computer game), Ten Tile Puzzle (computer game), and Tetris cycle (Trojan Horse program).  This virus was benign, but the perpetrators were severely punished.
  • 6. General virus types  Boot Sector Virus  Macro Virus  Multipartite Virus  Polymorphic Virus  Worms  Trojan horses  E-mail viruses  Stealth Virus
  • 7. How They Spread ?  Early viruses were pieces of code attached to a common program like a popular game or a popular word processor.  A person might download an infected game from the internet or copy it from a floppy disk and run it.  A virus like this is a small piece of code embedded in a larger, legitimate program. Any virus is designed to run first when the legitimate program gets executed.
  • 8.  If one of the infected programs is given to another person on a floppy disk, or if it is uploaded to internet, then other programs get infected.  This is how the virus spreads.
  • 9. The impact of viruses  ICSA Labs estimates that the cost of a virus disaster is between $50,000 and $500,000  Average server downtime for a virus is 14 hours
  • 10. The impact of viruses
  • 11. Examples of risky file types  The following file types should never be opened:  .EXE  .PIF  .BAT  .VBS  .COM
  • 12. TOP 5 Viruses Reported 14 12 10 8 6 4 2 0 W32/klez/h W32- Bugbear-A Percent Reported to Sophos 2003 W32/ElKern- C
  • 13. Symptoms of Virus Attack  Computer no longer boots up.  Screen sometimes flicker.  Computer runs slower then usual.  PC speaker beeps periodically.  System crashes for no reason.  Files/directories sometimes disappear.  Denial of service (dos)….. & Many More.
  • 14. Prevention is the best cure  Run a secure operating system like UNIX or Windows NT.  Install virus protection software.  Avoid programs from unknown sources.  Disable floppy disk booting
  • 15.  Macro Virus Protection is enabled in all Microsoft applications.  Never double-click on an attachment that contains an executable that arrives as an e-mail attachment.
  • 16. Protect Yourself from Computer Viruses  AVIEN & AVI-EWS  CERT  STOPzilla  GFI Mail Security for Exchange  Anti Virus eScan 2003  CIAC  Cyber notes  ICSA  Information Security Magazine  NIPC (National Infrastructure Protection Ctr)  SANS Institute  Virus Bulletin
  • 19. Finding Out A Virus
  • 20. Top 9 Virus Protectors are... 1) PANDA ANTIVIRUS PLATIINUM v7.0 2) NORTON ANTIVIRUS 2003 3) F-PROT FOR WINDOWS 4) MCAFEE VIRUSSCAN HOME EDITION 7.0 5) NORMAN VIRUS CONTROL 6) PC-CILLIN 7) BIT DEFENDER PROFESSIONAL v6.5 8) NOD 32 9) STOPzilla!