SlideShare a Scribd company logo
1 of 61
PRESENTATION
ON VIRUS
Tayyaba Abbas
CONTENT
• Introduction​
• Malware, Worms, Trojans, Adware
• Which antivirus can detect spyware?
• Ransomware attack solution
• Common Signs of Computer Viruses
• The negative impact of a computer infection
• What is an Anti-Virus?
• Functions of an Antivirus Software
Major antivirus software
• history of computer viruses
• Protecting yourself against the unknown
What Causes Computer Viruses?
• Structure of computer virus
• How to deal with computer viruses and malware
• Conclusion
• ​References
INTRODUCTION
A computer virus is a type of malicious software, or
malware, that spreads between computers and causes
damage to data and software. Computer viruses aim to
disrupt systems, cause major operational issues, and
result in data loss and leakage.
Virus 3
WHAT IS THE DATA LEAKAGE?
• A data breach or data leak is the release of sensitive, confidential or
protected data to an untrusted environment. Data breaches can occur
as a result of a hacker attack.
• This is often caused by poor data security and sanitization, outdated
systems, or a lack of employee training. Data leaks could lead to
identity theft, data breaches, or ransomware installation.
Presentation title 4
COMPUTER VIRUSES
COMPUTER VIRUS
STATISTICS
58% of all known computer malware is known to come
from trojans. 13% of all computer malware infections
are known to come from viruses. 9% of all malware
infections across the globe are known to come from
scripts. 53% of all computer viruses are known to be
spread by the use of .exe files.
WHICH ANTIVIRUS
CAN DETECT
SPYWARE?
•McAfee — Advanced Anti-Spyware That's Great for
Families. ...
•Intego — Excellent Spyware Protection for Mac. ...
•Avira — Best Free Spyware Protection. ...
•Malwarebytes — Minimalistic Antivirus With Good
Spyware Protection.
•MacKeeper — Simple, Fast Spyware Removal (Mac
Only)
RANSOMWARE ATTACK
SOLUTION
Use anti-virus and anti-malware software or
other security policies to block known payloads
from launching. Make frequent, comprehensive
backups of all important files and isolate them
from local and open networks.
COMMON SIGNS OF COMPUTER VIRUSES
Presentation on Virus 12
1. Unexpected pop-up windows:
Unexpected or unusual dialog boxes and windows can be a bad sign. Fake virus
warnings claim you have security threats on your computer and usually prompt you to
click a link or call a number.
“One of the things we always tell people is that, as of right now, there’s no way a
website can tell you if your computer is infected,” Armstrong said. “Sometimes, Skype
will pop up a message saying, ‘Urgent security vulnerability.’ But Skype can’t tell if
your computer is infected.”
Legitimate protection software, such as Windows Defender and virus-scanning
programs, will never prompt you to call a customer service number.
2. RANDOM SOUNDS
• Infected computers are often programmed to respond with an audio signal to things you
can’t control.
• “They’ll be things like warning beeps,” Armstrong said. “When an error message pops up,
a lot of times, it comes along with a warning message. Certain pieces of malware stifle
that window so you can’t see it. But you might still hear the warning message – a sound in
the background that you didn’t initiate.”
• If you regularly hear chimes and bells from your computer that seem phantom, your
computer may have a virus or malware infection.
Presentation title 13
3. UNEXPLAINED FILE OR FOLDER
CHANGES
• Your files might be missing, or the icons and content of your files may be
different. Your computer won’t make these types of changes to your files
unless you have a virus or technical problem, though corrupted browser
bookmarks shouldn’t be regarded as a warning sign. It’s common for
bookmark icons to become jumbled by a browser such as Chrome.
Presentation title 14
4. SLOW OPERATION
• Pay attention to whether your computer is running more slowly than usual, especially if its
hard drive light (if it has one) is constantly on or its fan is operating at full speed. This
suggests the computer’s resources are being redirected away from legitimate programs.
• “One of the popular scams right now is something called ‘pay per install,'” Armstrong said.
“There are third-party companies out there in places like Russia and China that allow
[someone] to go to their forums and sign up to receive a piece of software. They then pay
[that person] for every thousand users they can fool into installing the software.”
Presentation title 15
Money is a massive incentive for
cybercriminals. “So, these people who try to
trick you into installing rogue software will
put as many things on your computer as
possible at the same time to make the most
money,” Armstrong added. “And with all this
spyware and applications running at the
same time, you’ll see a slowdown in
performance.”
5. RANDOM CONNECTIONS TO UNKNOWN
WEBSITES
• Another sign of an infection is when your legitimate antivirus software alerts you that an
application is trying to connect to a website you’ve never heard of.
• In general, your computer doesn’t make its own connections; someone has to initiate
them. If you didn’t initiate these connections, problematic software could be doing it for
you.
Presentation title 17
6. UNEXPECTED
IMAGES
You might see pornographic images pop up or replace
benign images, such as photos on news sites. A related
sign that your computer is infected is the constant
appearance of pop-up ads for sites you don’t usually visit.
Presentation title 18
7. INABILITY TO DOWNLOAD ANTIVIRUS
PROGRAMS OR UPDATES
• Computer viruses aren’t living things, but some are programmed with a self-
preservation instinct. For the average computer user, the best way to kill a
virus is via an antivirus scan. If you’re having trouble downloading and
installing the antivirus software, or you’re unable to update your existing
program, the virus may be defending itself. Some antivirus software
solutions provide rescue disks to scan and clean an infected PC.
Presentation title 19
8. SPAM SENT FROM
YOUR EMAIL ADDRESS
OR SOCIAL MEDIA
Malware can work in many different ways. One variant
sends random messages to your contacts list. This
infection spreads across the internet by tricking people
into clicking on an infected link. The link then spreads
the malware to that person, who unwittingly spreads it
throughout their friend list. By logging out of your
accounts, creating strong passwords and implementing
security measures like two-factor authentication, you can
thwart any further intrusion.
9. SUDDEN LACK OF HARD DRIVE
SPACE
• Have you suddenly run out of space on your hard drive? Self-replicating
viruses or worms (often called “disk bombs”) can wreak havoc on a
computer system by rapidly filling hard drives with copies of itself. In many
cases, the files it injects into a hard drive are invisible under default file-
browsing settings.
Presentation title 21
10. STRANGE RUNNING PROCESSES
• If your computer is acting strangely or not running as smoothly as you’d
expect, type “Task Manager” into the search bar of Windows. This will list
all processes consuming system resources, including rogue processes
running in the background.
• If an unfamiliar piece of software is consuming a disproportionate share of
system resources (specifically CPU, memory and disk space), there may
be a problem.
Presentation title 22
Presentation title 23
THE NEGATIVE IMPACT OF A
COMPUTER INFECTION
• A virus or malware will negatively impact your system,
leaving you vulnerable to fraud, but the degree of
impact depends on the infection’s type and scope.
• Here are some of the possible consequences of a
computer infection:
• Loss of performance: Malware can make your
computer process things more slowly, hogging system
resources and taking far longer than usual to get work
done.
• Loss of bandwidth: Botnets are networks of
computers serving a central remote system, often
distributing large volumes of data and consuming all
broadband bandwidth.
Presentation title 24
• Loss of function: In extreme cases, the virus can degrade
your computer performance or programming so severely that
you can no longer use your machine.
• Exposure to other dangerous software: The purpose of
some malware is to entice you to download even more
dangerous software.
• Loss of information: Viruses might delete stored files or data,
while ransomware may destroy your entire hard drive if specific
demands aren’t met.
Presentation title 25
• Breach of privacy: Viruses sometimes seek to gather
information for identity theft or fraud. This could result in
financial losses if your accounts are breached and even
punitive fines if your firm didn’t follow local and state
business regulations surrounding data privacy.
WHAT IS AN ANTI-VIRUS?
Presentation title 26
• An anti-virus is a software which comprises programs or set of programs
which can detect and remove all the harmful and malicious software from
your device. This anti-virus software is designed in a manner that they can
search through the files in a computer and determine the files which are
heavy or mildly infected by a virus.
FUNCTIONS OF AN
ANTIVIRUS SOFTWARE
•Scans the specific files and directories for
malware patterns which can indicate any malware.
•Allows the users to schedule scans according to
them.
•Users can also scan the system anytime they
want.
•If it detects any malicious software it removes it
from the system.
27
Presentation title
MAJOR ANTIVIRUS SOFTWARE
Norton Antivirus:
Security software protects your computers, tablets and smartphones
from getting malware and viruses. Norton 360 plans include both
VPN & Security, plus additional features to help protect your devices
and your online privacy.
Presentation title 28
F-SECURE ANTIVIRUS
Internet Security protects you against viruses,
ransomware, spyware, infected email
attachments and other malware. Top-rated for
protection and performance, the app ensures
that your devices stay clean and fast — whether
you are using a PC, Mac, Android or iOS device.
KASPERSKY
ANTIVIRUS
Kaspersky's antivirus software does its job well: it keeps
you safe from malware and shows excellent results in
external tests. On top of that, it offers countless
additional security and privacy features that users can
benefit from, like an ad blocker, VPN, anti-fraud features,
and performance optimization options.
AVAST ANTIVIRUS
• Our Verdict. Avast has a great reputation for protecting
computers from viruses and malware. With free and premium
options, it delivers a complete security solution. Avast offers a
wide range of tools beyond basic antivirus protection, including
password protection, data shredder, webcam shield, sandbox
and more.
Presentation title 31
COMODO ANTIVIRUS
Comodo Antivirus isn't unsafe in
itself, but it can't fully protect you
from malware or other online
threats. Comodo's software will
provide you with more protection
than if you have no antivirus
software at all.
The VPN feature lets you securely
and anonymously connect to the
internet through an encrypted
proxy hosted by Comodo
32
MCAFEE ANTIVIRUS
MacAfee is an excellent choice
if you are looking for antivirus
software with real-time malware
detection for all your devices at
an affordable price.
MacAfee does and doesn't slow
down your computer.
MacAfeeÂŽ total protection
includes identity protection and
a VPN to protect your personal
info. Rest assured that with our
free 30-day trial you'll get all the
features of our flagship product,
including antivirus, web
protection, password manager,
and more.
33
A SHORT HISTORY OF COMPUTER
VIRUSES
“Richard The first computer virus,
called "Creeper system", was an
experimental self-replicating virus
released in 1971. It was filling up the
hard drive until a computer could not
operate any further. This virus was
created by BBN technologies in the
US.
”
34
The first computer virus for
MS-DOS was "Brain" and
was released in 1986. It
would overwrite the boot
sector on the floppy disk and
prevent the computer from
booting. It was written by two
brothers from Pakistan and
was originally designed as a
copy protection.
WHO DEVELOPED THE
C BRAIN?
Brain was written by Amjad Farooq Alvi
and Basit Farooq Alvi, who at the time
lived in Chah Miran, near Lahore Railway
Station, in Lahore, Pakistan. The brothers
told Time magazine they had written it to
protect their medical software from illegal
copying, and it was supposed to target
copyright infringement only.
36
"The Morris" was the first computer virus which
spread extensively in the wild in 1988. It was
written by Robert Morris, a graduate student
from Cornell university who wanted to use it to
determine the size of the internet. His approach
used security holes in send mail and other Unix
applications as well as weak passwords
37
MORRIS WORM
but due to a programming mistake it spread too fast and
started to interfere with the normal operation of the
computers. It infected around 15,000 computers in 15 hours,
which back then was most of the internet.
Robert Tappan Morris (born November 8, 1965) is an
American computer scientist and entrepreneur. He is
best known for creating the Morris worm in 1988,
considered the first computer worm on the Internet.
Presentation on virus 38
A systems administrator known for
discovering and subsequently tracking the
hacker Markus Hess three years earlier,
helped fight the worm, writing in 1989 that
"I surveyed the network, and found that
two thousand computers were infected
within fifteen hours. These machines were
dead in the water—useless until
disinfected. And removing the virus often
took two days."
39
PROTECTING YOURSELF AGAINST THE
UNKNOWN
Presentation of Virus 40
• Do not open emails and email attachments, when you are not 100%
certain that they are legitimate.
• Do not click on links in emails or their attachments unless you were
expecting to receive them. Remember, email accounts can be
spoofed or hacked, so although a message may appear to come
from a legitimate source, if the content is not what you expect from
that sender it may not be trustworthy.
•Keep your computer up to date with the
latest software updates and security
patches.
•Check for spelling or grammar mistakes
- this includes in the URL of websites
you visit as well as the body of emails.
For example, mistaking ofice.com for
Microsoft's office.com will take you to a
known malware site.
41
Presentation on Virus
WHAT CAUSES COMPUTER VIRUSES?
42
• Computer viruses are standard programs;
instead of offering useful resources, these
programs can damage your device. Computer
viruses are typically crafted by hackers with
various intentions, like stealing sensitive data
to causing chaos in systems.
Some hackers create these malicious programs
for fun or as a challenge, while others have
more sinister motives like financial gain or cyber
warfare.
The delivery of a computer virus can happen in
several ways. One common method is via
a phishing email. Another technique is hosting
malware on a server that promises to provide a
legitimate program. It can be delivered using
macros or by injecting malicious code into
legitimate software files.
43
5 Common Ways of Getting a Computer
Virus
•Opening Links in Emails from Unknown Senders. This
is probably the most effective way of disseminating
malware.
•Downloading Malware from Untrustworthy Sites.
•Clicking Online Ads.
•Social Media Scams.
•Software that Hasn't Been Patched Properly.
STRUCTURE OF
COMPUTER VIRUS
A computer virus generally contains three
parts: the infection mechanism, which finds
and infects new files, the payload, which is the
malicious code to execute, and the trigger,
which determines when to activate the
payload. Also called the infection vector, this is
how the virus spreads.
INFECTION MECHANISM
• This mechanism includes how a virus propagates and
enables it to replicate. It has two sub-components:
• Search: It is used to search for the host program.
• Copy: It is used by the virus to copy itself into the
executable program.
Presentation title 46
TRIGGER
• The event or condition determines when the payload is activated.
47
PAYLOAD
• It performs the functions for which the virus was designed. It may involve
harmful or benign activities.
48
49
HOW TO DEAL
WITH COMPUTER
VIRUSES AND
MALWARE
AVOID UNFAMILIAR
URLS.
Compromised websites are often loaded with malware,
and some top-level domains (the final part of any
website’s address, or URL) are synonymous with
malware. Threat intelligence experts
at Spamhaus reported in June 2022 that a website
bearing the .ci TLD (top-level domain) is over 86% more
likely to be associated with spam in some way. .ci is the
country code TLD for Ivory Coast.
Other widely abused TLDs include .mw, .surf, .cn and
.top. If you’re “invited” to visit a website at any of these
domains, especially through an unsolicited message,
approach them with great caution; they are likely
malware and spyware repositories.
51
MAINTAIN YOUR INSTALLED
PROGRAMS.
• One of the primary ways viruses gain access to a system is through
security lapses in existing software. A first step to prevent your computer
from getting infected is to ensure your applications, antivirus software and
operating system are up to date.
• This is doubly important for your operating system since Apple, Microsoft
and other providers regularly release security patches to deal with potential
cybersecurity weaknesses. You can also reduce potential vulnerabilities for
cybercriminals to exploit by uninstalling applications you don’t use.
Presentation title 52
INSTALL ONLY ONE ANTIVIRUS
SOLUTION.
• It may seem wise to have multiple layers of antivirus protection to secure your devices
from hackers, but the law of diminishing returns applies. If you have more than one
antivirus software program installed on your machine, you run the risk of having them
cancel each other out because each thinks the other is a virus. This can result in limited
antivirus protection at best or file corruption at worst.
• Note that the integrated Windows Defender utility preloaded onto PCs is designed to run
alongside third-party software from firms like McAfee, Kaspersky and AVG.
Presentation title 53
AUTOMATE VIRUS
SCANS
You don’t always have to be next to your computer when it
conducts a virus scan. Most modern antivirus software has
automation features that let you set a specific time for the
computer to run a scan. By setting the process for a time
when you don’t need to use the computer – like when
you’re sleeping – you can ensure your system is safe
without hindering your productivity.
Presentation title 54
POP THOSE POP-
UPS.
If you’re dealing with rogue pop-ups on your
computer, stop the process running the pop-up.
•Windows PC: Launch the Task Manager, locate the
process you suspect is running the pop-up and stop
the pop-up.
•Mac: Select the Apple Menu and choose “Force
Quit.” Locate the process you suspect is running the
pop-up and click “Force Quit.”
This doesn’t remove the infection. Your next step
should be installing and running an antivirus solution
to find and remove the problem.
RESTART YOUR
COMPUTER IN SAFE
MODE.
Starting your computer in safe mode gives you a chance
to run your antivirus software and take a closer look at
the issue. Begin by rebooting the computer.
•Windows: On a Windows PC, press and hold F8 as
soon as the reboot begins, and then choose Safe Mode
from the menu that appears.
•Mac: On a Mac, hold down the
Shift key while rebooting, and then
perform an antivirus scan to
eliminate any other potential
infections
BOOT FROM A RESCUE CD.
• Some malware can destroy antivirus software. When that happens, you may be able to
create a Linux-based rescue CD to reboot your computer and disinfect or repair corrupted
files. Most major antivirus software makers offer these files for free, but you’ll need access
to another PC with a broadband connection and a CD burner. Without a disk drive, this
option won’t work for you.
Presentation title 58
CONCLUSION
Regardless of type, malware can cause
significant problems for any machine in any
business. If you can identify what you’re dealing
with, you may be able to take specific steps to
foil the program. Consult your antivirus software,
IT expert or online tech support service to learn
the best way to handle your system’s infection.
REFERENCES
Presentation on Virus 60
https://www.businessnewsdaily.com/
https://en.wikipedia.org/
https://www.malwarebytes.com/
https://www.avast.com/
THANK YOU

More Related Content

Similar to computer virus full explain ppt.pptx

How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Computer virus
Computer virusComputer virus
Computer virusSanthiNivas
 
ratzan2.ppt
ratzan2.pptratzan2.ppt
ratzan2.pptamyray28
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virusComputer Science
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
List of Malwares
List of MalwaresList of Malwares
List of MalwaresVishalya Dulam
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Computer viruses
Computer virusesComputer viruses
Computer virusesYousef Bahaa
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 

Similar to computer virus full explain ppt.pptx (20)

How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Computer virus
Computer virusComputer virus
Computer virus
 
ratzan2.ppt
ratzan2.pptratzan2.ppt
ratzan2.ppt
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Malicious
MaliciousMalicious
Malicious
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
information about virus
information about virusinformation about virus
information about virus
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

computer virus full explain ppt.pptx

  • 2. CONTENT • Introduction​ • Malware, Worms, Trojans, Adware • Which antivirus can detect spyware? • Ransomware attack solution • Common Signs of Computer Viruses • The negative impact of a computer infection • What is an Anti-Virus? • Functions of an Antivirus Software Major antivirus software • history of computer viruses • Protecting yourself against the unknown What Causes Computer Viruses? • Structure of computer virus • How to deal with computer viruses and malware • Conclusion • ​References
  • 3. INTRODUCTION A computer virus is a type of malicious software, or malware, that spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. Virus 3
  • 4. WHAT IS THE DATA LEAKAGE? • A data breach or data leak is the release of sensitive, confidential or protected data to an untrusted environment. Data breaches can occur as a result of a hacker attack. • This is often caused by poor data security and sanitization, outdated systems, or a lack of employee training. Data leaks could lead to identity theft, data breaches, or ransomware installation. Presentation title 4
  • 6. COMPUTER VIRUS STATISTICS 58% of all known computer malware is known to come from trojans. 13% of all computer malware infections are known to come from viruses. 9% of all malware infections across the globe are known to come from scripts. 53% of all computer viruses are known to be spread by the use of .exe files.
  • 7.
  • 8.
  • 9. WHICH ANTIVIRUS CAN DETECT SPYWARE? •McAfee — Advanced Anti-Spyware That's Great for Families. ... •Intego — Excellent Spyware Protection for Mac. ... •Avira — Best Free Spyware Protection. ... •Malwarebytes — Minimalistic Antivirus With Good Spyware Protection. •MacKeeper — Simple, Fast Spyware Removal (Mac Only)
  • 10.
  • 11. RANSOMWARE ATTACK SOLUTION Use anti-virus and anti-malware software or other security policies to block known payloads from launching. Make frequent, comprehensive backups of all important files and isolate them from local and open networks.
  • 12. COMMON SIGNS OF COMPUTER VIRUSES Presentation on Virus 12 1. Unexpected pop-up windows: Unexpected or unusual dialog boxes and windows can be a bad sign. Fake virus warnings claim you have security threats on your computer and usually prompt you to click a link or call a number. “One of the things we always tell people is that, as of right now, there’s no way a website can tell you if your computer is infected,” Armstrong said. “Sometimes, Skype will pop up a message saying, ‘Urgent security vulnerability.’ But Skype can’t tell if your computer is infected.” Legitimate protection software, such as Windows Defender and virus-scanning programs, will never prompt you to call a customer service number.
  • 13. 2. RANDOM SOUNDS • Infected computers are often programmed to respond with an audio signal to things you can’t control. • “They’ll be things like warning beeps,” Armstrong said. “When an error message pops up, a lot of times, it comes along with a warning message. Certain pieces of malware stifle that window so you can’t see it. But you might still hear the warning message – a sound in the background that you didn’t initiate.” • If you regularly hear chimes and bells from your computer that seem phantom, your computer may have a virus or malware infection. Presentation title 13
  • 14. 3. UNEXPLAINED FILE OR FOLDER CHANGES • Your files might be missing, or the icons and content of your files may be different. Your computer won’t make these types of changes to your files unless you have a virus or technical problem, though corrupted browser bookmarks shouldn’t be regarded as a warning sign. It’s common for bookmark icons to become jumbled by a browser such as Chrome. Presentation title 14
  • 15. 4. SLOW OPERATION • Pay attention to whether your computer is running more slowly than usual, especially if its hard drive light (if it has one) is constantly on or its fan is operating at full speed. This suggests the computer’s resources are being redirected away from legitimate programs. • “One of the popular scams right now is something called ‘pay per install,'” Armstrong said. “There are third-party companies out there in places like Russia and China that allow [someone] to go to their forums and sign up to receive a piece of software. They then pay [that person] for every thousand users they can fool into installing the software.” Presentation title 15
  • 16. Money is a massive incentive for cybercriminals. “So, these people who try to trick you into installing rogue software will put as many things on your computer as possible at the same time to make the most money,” Armstrong added. “And with all this spyware and applications running at the same time, you’ll see a slowdown in performance.”
  • 17. 5. RANDOM CONNECTIONS TO UNKNOWN WEBSITES • Another sign of an infection is when your legitimate antivirus software alerts you that an application is trying to connect to a website you’ve never heard of. • In general, your computer doesn’t make its own connections; someone has to initiate them. If you didn’t initiate these connections, problematic software could be doing it for you. Presentation title 17
  • 18. 6. UNEXPECTED IMAGES You might see pornographic images pop up or replace benign images, such as photos on news sites. A related sign that your computer is infected is the constant appearance of pop-up ads for sites you don’t usually visit. Presentation title 18
  • 19. 7. INABILITY TO DOWNLOAD ANTIVIRUS PROGRAMS OR UPDATES • Computer viruses aren’t living things, but some are programmed with a self- preservation instinct. For the average computer user, the best way to kill a virus is via an antivirus scan. If you’re having trouble downloading and installing the antivirus software, or you’re unable to update your existing program, the virus may be defending itself. Some antivirus software solutions provide rescue disks to scan and clean an infected PC. Presentation title 19
  • 20. 8. SPAM SENT FROM YOUR EMAIL ADDRESS OR SOCIAL MEDIA Malware can work in many different ways. One variant sends random messages to your contacts list. This infection spreads across the internet by tricking people into clicking on an infected link. The link then spreads the malware to that person, who unwittingly spreads it throughout their friend list. By logging out of your accounts, creating strong passwords and implementing security measures like two-factor authentication, you can thwart any further intrusion.
  • 21. 9. SUDDEN LACK OF HARD DRIVE SPACE • Have you suddenly run out of space on your hard drive? Self-replicating viruses or worms (often called “disk bombs”) can wreak havoc on a computer system by rapidly filling hard drives with copies of itself. In many cases, the files it injects into a hard drive are invisible under default file- browsing settings. Presentation title 21
  • 22. 10. STRANGE RUNNING PROCESSES • If your computer is acting strangely or not running as smoothly as you’d expect, type “Task Manager” into the search bar of Windows. This will list all processes consuming system resources, including rogue processes running in the background. • If an unfamiliar piece of software is consuming a disproportionate share of system resources (specifically CPU, memory and disk space), there may be a problem. Presentation title 22
  • 23. Presentation title 23 THE NEGATIVE IMPACT OF A COMPUTER INFECTION • A virus or malware will negatively impact your system, leaving you vulnerable to fraud, but the degree of impact depends on the infection’s type and scope. • Here are some of the possible consequences of a computer infection: • Loss of performance: Malware can make your computer process things more slowly, hogging system resources and taking far longer than usual to get work done. • Loss of bandwidth: Botnets are networks of computers serving a central remote system, often distributing large volumes of data and consuming all broadband bandwidth.
  • 24. Presentation title 24 • Loss of function: In extreme cases, the virus can degrade your computer performance or programming so severely that you can no longer use your machine. • Exposure to other dangerous software: The purpose of some malware is to entice you to download even more dangerous software. • Loss of information: Viruses might delete stored files or data, while ransomware may destroy your entire hard drive if specific demands aren’t met.
  • 25. Presentation title 25 • Breach of privacy: Viruses sometimes seek to gather information for identity theft or fraud. This could result in financial losses if your accounts are breached and even punitive fines if your firm didn’t follow local and state business regulations surrounding data privacy.
  • 26. WHAT IS AN ANTI-VIRUS? Presentation title 26 • An anti-virus is a software which comprises programs or set of programs which can detect and remove all the harmful and malicious software from your device. This anti-virus software is designed in a manner that they can search through the files in a computer and determine the files which are heavy or mildly infected by a virus.
  • 27. FUNCTIONS OF AN ANTIVIRUS SOFTWARE •Scans the specific files and directories for malware patterns which can indicate any malware. •Allows the users to schedule scans according to them. •Users can also scan the system anytime they want. •If it detects any malicious software it removes it from the system. 27 Presentation title
  • 28. MAJOR ANTIVIRUS SOFTWARE Norton Antivirus: Security software protects your computers, tablets and smartphones from getting malware and viruses. Norton 360 plans include both VPN & Security, plus additional features to help protect your devices and your online privacy. Presentation title 28
  • 29. F-SECURE ANTIVIRUS Internet Security protects you against viruses, ransomware, spyware, infected email attachments and other malware. Top-rated for protection and performance, the app ensures that your devices stay clean and fast — whether you are using a PC, Mac, Android or iOS device.
  • 30. KASPERSKY ANTIVIRUS Kaspersky's antivirus software does its job well: it keeps you safe from malware and shows excellent results in external tests. On top of that, it offers countless additional security and privacy features that users can benefit from, like an ad blocker, VPN, anti-fraud features, and performance optimization options.
  • 31. AVAST ANTIVIRUS • Our Verdict. Avast has a great reputation for protecting computers from viruses and malware. With free and premium options, it delivers a complete security solution. Avast offers a wide range of tools beyond basic antivirus protection, including password protection, data shredder, webcam shield, sandbox and more. Presentation title 31
  • 32. COMODO ANTIVIRUS Comodo Antivirus isn't unsafe in itself, but it can't fully protect you from malware or other online threats. Comodo's software will provide you with more protection than if you have no antivirus software at all. The VPN feature lets you securely and anonymously connect to the internet through an encrypted proxy hosted by Comodo 32
  • 33. MCAFEE ANTIVIRUS MacAfee is an excellent choice if you are looking for antivirus software with real-time malware detection for all your devices at an affordable price. MacAfee does and doesn't slow down your computer. MacAfeeÂŽ total protection includes identity protection and a VPN to protect your personal info. Rest assured that with our free 30-day trial you'll get all the features of our flagship product, including antivirus, web protection, password manager, and more. 33
  • 34. A SHORT HISTORY OF COMPUTER VIRUSES “Richard The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. ” 34
  • 35. The first computer virus for MS-DOS was "Brain" and was released in 1986. It would overwrite the boot sector on the floppy disk and prevent the computer from booting. It was written by two brothers from Pakistan and was originally designed as a copy protection.
  • 36. WHO DEVELOPED THE C BRAIN? Brain was written by Amjad Farooq Alvi and Basit Farooq Alvi, who at the time lived in Chah Miran, near Lahore Railway Station, in Lahore, Pakistan. The brothers told Time magazine they had written it to protect their medical software from illegal copying, and it was supposed to target copyright infringement only. 36
  • 37. "The Morris" was the first computer virus which spread extensively in the wild in 1988. It was written by Robert Morris, a graduate student from Cornell university who wanted to use it to determine the size of the internet. His approach used security holes in send mail and other Unix applications as well as weak passwords 37 MORRIS WORM
  • 38. but due to a programming mistake it spread too fast and started to interfere with the normal operation of the computers. It infected around 15,000 computers in 15 hours, which back then was most of the internet. Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris worm in 1988, considered the first computer worm on the Internet. Presentation on virus 38
  • 39. A systems administrator known for discovering and subsequently tracking the hacker Markus Hess three years earlier, helped fight the worm, writing in 1989 that "I surveyed the network, and found that two thousand computers were infected within fifteen hours. These machines were dead in the water—useless until disinfected. And removing the virus often took two days." 39
  • 40. PROTECTING YOURSELF AGAINST THE UNKNOWN Presentation of Virus 40 • Do not open emails and email attachments, when you are not 100% certain that they are legitimate. • Do not click on links in emails or their attachments unless you were expecting to receive them. Remember, email accounts can be spoofed or hacked, so although a message may appear to come from a legitimate source, if the content is not what you expect from that sender it may not be trustworthy.
  • 41. •Keep your computer up to date with the latest software updates and security patches. •Check for spelling or grammar mistakes - this includes in the URL of websites you visit as well as the body of emails. For example, mistaking ofice.com for Microsoft's office.com will take you to a known malware site. 41 Presentation on Virus
  • 42. WHAT CAUSES COMPUTER VIRUSES? 42 • Computer viruses are standard programs; instead of offering useful resources, these programs can damage your device. Computer viruses are typically crafted by hackers with various intentions, like stealing sensitive data to causing chaos in systems.
  • 43. Some hackers create these malicious programs for fun or as a challenge, while others have more sinister motives like financial gain or cyber warfare. The delivery of a computer virus can happen in several ways. One common method is via a phishing email. Another technique is hosting malware on a server that promises to provide a legitimate program. It can be delivered using macros or by injecting malicious code into legitimate software files. 43
  • 44. 5 Common Ways of Getting a Computer Virus •Opening Links in Emails from Unknown Senders. This is probably the most effective way of disseminating malware. •Downloading Malware from Untrustworthy Sites. •Clicking Online Ads. •Social Media Scams. •Software that Hasn't Been Patched Properly.
  • 45. STRUCTURE OF COMPUTER VIRUS A computer virus generally contains three parts: the infection mechanism, which finds and infects new files, the payload, which is the malicious code to execute, and the trigger, which determines when to activate the payload. Also called the infection vector, this is how the virus spreads.
  • 46. INFECTION MECHANISM • This mechanism includes how a virus propagates and enables it to replicate. It has two sub-components: • Search: It is used to search for the host program. • Copy: It is used by the virus to copy itself into the executable program. Presentation title 46
  • 47. TRIGGER • The event or condition determines when the payload is activated. 47 PAYLOAD • It performs the functions for which the virus was designed. It may involve harmful or benign activities.
  • 48. 48
  • 49. 49
  • 50. HOW TO DEAL WITH COMPUTER VIRUSES AND MALWARE
  • 51. AVOID UNFAMILIAR URLS. Compromised websites are often loaded with malware, and some top-level domains (the final part of any website’s address, or URL) are synonymous with malware. Threat intelligence experts at Spamhaus reported in June 2022 that a website bearing the .ci TLD (top-level domain) is over 86% more likely to be associated with spam in some way. .ci is the country code TLD for Ivory Coast. Other widely abused TLDs include .mw, .surf, .cn and .top. If you’re “invited” to visit a website at any of these domains, especially through an unsolicited message, approach them with great caution; they are likely malware and spyware repositories. 51
  • 52. MAINTAIN YOUR INSTALLED PROGRAMS. • One of the primary ways viruses gain access to a system is through security lapses in existing software. A first step to prevent your computer from getting infected is to ensure your applications, antivirus software and operating system are up to date. • This is doubly important for your operating system since Apple, Microsoft and other providers regularly release security patches to deal with potential cybersecurity weaknesses. You can also reduce potential vulnerabilities for cybercriminals to exploit by uninstalling applications you don’t use. Presentation title 52
  • 53. INSTALL ONLY ONE ANTIVIRUS SOLUTION. • It may seem wise to have multiple layers of antivirus protection to secure your devices from hackers, but the law of diminishing returns applies. If you have more than one antivirus software program installed on your machine, you run the risk of having them cancel each other out because each thinks the other is a virus. This can result in limited antivirus protection at best or file corruption at worst. • Note that the integrated Windows Defender utility preloaded onto PCs is designed to run alongside third-party software from firms like McAfee, Kaspersky and AVG. Presentation title 53
  • 54. AUTOMATE VIRUS SCANS You don’t always have to be next to your computer when it conducts a virus scan. Most modern antivirus software has automation features that let you set a specific time for the computer to run a scan. By setting the process for a time when you don’t need to use the computer – like when you’re sleeping – you can ensure your system is safe without hindering your productivity. Presentation title 54
  • 55. POP THOSE POP- UPS. If you’re dealing with rogue pop-ups on your computer, stop the process running the pop-up. •Windows PC: Launch the Task Manager, locate the process you suspect is running the pop-up and stop the pop-up. •Mac: Select the Apple Menu and choose “Force Quit.” Locate the process you suspect is running the pop-up and click “Force Quit.” This doesn’t remove the infection. Your next step should be installing and running an antivirus solution to find and remove the problem.
  • 56. RESTART YOUR COMPUTER IN SAFE MODE. Starting your computer in safe mode gives you a chance to run your antivirus software and take a closer look at the issue. Begin by rebooting the computer. •Windows: On a Windows PC, press and hold F8 as soon as the reboot begins, and then choose Safe Mode from the menu that appears.
  • 57. •Mac: On a Mac, hold down the Shift key while rebooting, and then perform an antivirus scan to eliminate any other potential infections
  • 58. BOOT FROM A RESCUE CD. • Some malware can destroy antivirus software. When that happens, you may be able to create a Linux-based rescue CD to reboot your computer and disinfect or repair corrupted files. Most major antivirus software makers offer these files for free, but you’ll need access to another PC with a broadband connection and a CD burner. Without a disk drive, this option won’t work for you. Presentation title 58
  • 59. CONCLUSION Regardless of type, malware can cause significant problems for any machine in any business. If you can identify what you’re dealing with, you may be able to take specific steps to foil the program. Consult your antivirus software, IT expert or online tech support service to learn the best way to handle your system’s infection.
  • 60. REFERENCES Presentation on Virus 60 https://www.businessnewsdaily.com/ https://en.wikipedia.org/ https://www.malwarebytes.com/ https://www.avast.com/