Binisha.pptx

Prepared By :
Binisha Tamang
Shree Rudrayanee Secondary School
Lalitpur, Nepal
A computer virus is a program that can copy
itself and infect a computer without the
permission or knowledge of the user.
 Boot sector virus
 File or Program virus
 Macro virus
 Multipartite virus
 Stealth virus
 Boot sector virus replace or implant themselves
in the boot sector, the area of the hard drive (or
any other disk) accessed when you first turn on
your computer. This kind of virus can prevent
you from being able to boot your hard disk. For
example:
 Danish Boot
 Brain
 Disk killer
 Michelangelo
 File viruses infect application programs. They
may attach themselves to any executable file,
usually .COM and .EXE files. An application
program infector takes control after the initial
use of the infected program For example:
 Acid Rain
 Alien.298
 Crazy A
 Macro viruses are written by using a simplified
macro programming language. These viruses
affect a Microsoft office document created
using MS-Word, MSExcel, MSAccess, etc. The
viruses can spread if the infected document is
open in another computer. For example:
 Melissa
 Word Concept
 Multipartite viruses can infect both application
programs and the boot sector of a disk. They
infect program files and when the infected
program is executed; these viruses infect boot
record. Next time, The virus from the boot
record loads in the memory and then starts
infecting other program files on the disk. For
example:
 Invader
 File
 Tequila
 Stealth viruses actively hide themselves from
antiviral software by either masking the size of
the file that they hide in or temporarily
removing itself from the infected file and
placing a copy of itself in another location on
the drive. For example:
 Frodo
 Joshi
 Whale
 Booting processing becomes slow
 Size of files may be changed
 Location of file may be changed
 Computer gives unnecessary message and
produces sounds
 Internet
 Email
 Infected files
 Infected removable storage devices
 Pirated software
 Programs take a longer time to load. Memory-
resident operations take a lot of time to start.
 A change occurs in dates and time of saved
files.
 Hard disk is suddenly accessed without a
logical reason.
 Viruses increases the use of disk space and
growth in file size. They attach themselves to
many files.
 Unnecessary massages are display on the
monitor.
 Scan downloaded files of the internet before
copying to your computer.
 Use a good antivirus program to scan floppy
disks before copying files. Recommended once
are Total AV, Norton Antivirus and McAfee.
 Do not install pirated software.
 Scan your computer system and removable
storage devices before use.
1 of 12

Recommended

Viruses notes1 by
Viruses notes1Viruses notes1
Viruses notes1Dara Corporates
510 views11 slides
Viruses notes by
Viruses notesViruses notes
Viruses notesDara Corporates
13.3K views11 slides
Computer virus by
Computer virusComputer virus
Computer viruskiran_a_c
1.1K views15 slides
Computer viruses and prevention techniques by
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
5.8K views34 slides
Computer viruses by joy chakraborty by
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
1.7K views9 slides
Computer virus by
Computer virusComputer virus
Computer virusdineshrwt911
57 views22 slides

More Related Content

Similar to Binisha.pptx

computer virus Report by
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
10.4K views16 slides
Introductions To Malwares by
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
153 views40 slides
Types of virus and saviour by
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
96 views21 slides
Virus vs anti virus by
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
15.8K views38 slides
Computer viruses by
Computer virusesComputer viruses
Computer virusesaagmansaini
2.6K views18 slides
Viruses by
VirusesViruses
VirusesShahidaffridi
2.1K views22 slides

Similar to Binisha.pptx(20)

computer virus Report by rawaabdullah
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah10.4K views
Introductions To Malwares by Cyber Vignan
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan153 views
Types of virus and saviour by Yastee Shah
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
Yastee Shah96 views
Virus vs anti virus by Xʎz ʞsɥ
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ15.8K views
Computer viruses by aagmansaini
Computer virusesComputer viruses
Computer viruses
aagmansaini2.6K views
Itc lec 15 Computer security risks by AnzaDar3
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar331 views
Introduction to Computer Virus by Imtiaz Ahmed
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed3.4K views
Computer virus (Microsoft Powerpoint) by ainizbahari97
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari9799.4K views
Computer virus by Goa App
Computer virusComputer virus
Computer virus
Goa App701 views
Computer Virus by izzul
Computer VirusComputer Virus
Computer Virus
izzul23.6K views
Computer Viruses- B S Kalyan Chakravarthy by Dipayan Sarkar
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan Chakravarthy
Dipayan Sarkar545 views

Recently uploaded

Affiliate Marketing by
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
17 views30 slides
IETF 118: Starlink Protocol Performance by
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
394 views22 slides
information by
informationinformation
informationkhelgishekhar
10 views4 slides
Marketing and Community Building in Web3 by
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
14 views64 slides
How to think like a threat actor for Kubernetes.pptx by
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
5 views33 slides
PORTFOLIO 1 (Bret Michael Pepito).pdf by
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdfbrejess0410
9 views6 slides

Recently uploaded(10)

IETF 118: Starlink Protocol Performance by APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC394 views
Marketing and Community Building in Web3 by Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast14 views
How to think like a threat actor for Kubernetes.pptx by LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 views
PORTFOLIO 1 (Bret Michael Pepito).pdf by brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04109 views
The Dark Web : Hidden Services by Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh5 views
Building trust in our information ecosystem: who do we trust in an emergency by Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat109 views

Binisha.pptx

  • 1. Prepared By : Binisha Tamang Shree Rudrayanee Secondary School Lalitpur, Nepal
  • 2. A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.
  • 3.  Boot sector virus  File or Program virus  Macro virus  Multipartite virus  Stealth virus
  • 4.  Boot sector virus replace or implant themselves in the boot sector, the area of the hard drive (or any other disk) accessed when you first turn on your computer. This kind of virus can prevent you from being able to boot your hard disk. For example:  Danish Boot  Brain  Disk killer  Michelangelo
  • 5.  File viruses infect application programs. They may attach themselves to any executable file, usually .COM and .EXE files. An application program infector takes control after the initial use of the infected program For example:  Acid Rain  Alien.298  Crazy A
  • 6.  Macro viruses are written by using a simplified macro programming language. These viruses affect a Microsoft office document created using MS-Word, MSExcel, MSAccess, etc. The viruses can spread if the infected document is open in another computer. For example:  Melissa  Word Concept
  • 7.  Multipartite viruses can infect both application programs and the boot sector of a disk. They infect program files and when the infected program is executed; these viruses infect boot record. Next time, The virus from the boot record loads in the memory and then starts infecting other program files on the disk. For example:  Invader  File  Tequila
  • 8.  Stealth viruses actively hide themselves from antiviral software by either masking the size of the file that they hide in or temporarily removing itself from the infected file and placing a copy of itself in another location on the drive. For example:  Frodo  Joshi  Whale
  • 9.  Booting processing becomes slow  Size of files may be changed  Location of file may be changed  Computer gives unnecessary message and produces sounds
  • 10.  Internet  Email  Infected files  Infected removable storage devices  Pirated software
  • 11.  Programs take a longer time to load. Memory- resident operations take a lot of time to start.  A change occurs in dates and time of saved files.  Hard disk is suddenly accessed without a logical reason.  Viruses increases the use of disk space and growth in file size. They attach themselves to many files.  Unnecessary massages are display on the monitor.
  • 12.  Scan downloaded files of the internet before copying to your computer.  Use a good antivirus program to scan floppy disks before copying files. Recommended once are Total AV, Norton Antivirus and McAfee.  Do not install pirated software.  Scan your computer system and removable storage devices before use.