SlideShare a Scribd company logo
1 of 24
Computer Viruses
What is a virus?
• A computer virus is a program that is
designed to damage or disrupt the
normal functions of your computer and
its files.
• Like biological viruses, computer viruses
attach themselves to a host, usually a
program file, data file, or a file in your
computer's operating system. From
here, it replicates itself, spreading the
infection to other files.
How viruses are transmitted from
computer to computer
• Viruses can find their way onto your
computer in many different ways.
• Viruses can be transmitted by email, in
downloads from the internet, through
network connections, by floppy disks or
by CDs, particular those that have been
burnt on a computer infected by
viruses.
What is a program
• A program is a recipe for a computer’s
behavior. Now, computers do not read
these things as we humans do.
• They cannot understand free text
messages – instead they have to rely on
numbers, because computers are really
only glorified calculators.
• For example, If the number 144 is
translated into binary it can be written
as 10010000 – which physically means
voltage on, off, off, on, off, off, off, off
in wires going into the processor.
• Computer viruses can cause very
serious damage to your computer's
program and data files, as well as affect
your computers hardware, such as your
hard drive. What a particular virus will
do to your computer depends on how it
was programmed when created.
MALWARE
• Viruses, Worms, Trojan horses, Logic Bombs
etc. are all examples of what is called
malicious software programs, or malware for
short.
• Malware is primarily an unwanted, uninvited,
potentially dangerous set of programs, but
there are important distinctions among the
different subtypes. The following overview
defines a few of the most important
categories:
VIRUS
• Viruses require a host, and their goal is to
infect other files so that the virus can “live”
longer. Some viruses perform destructive
actions although this is not necessarily the
case.
• Many viruses attempt to hide from being
discovered.
• Replicates?
• Yes. All viruses make copies of themselves,
infecting boot sectors, programs, or “data
files” as the opportunity arises.
WORM
• Worm viruses are self-contained programs
that remain hidden and propagate via email
or duplication, modify existing software so
that when run, the legitimate program
spawns copies of the virus, which is then
forwarded on in email or other files.
• Replicates?
• Yes. A worm makes copies of itself as it finds
the opportunity.
Trojan horse
• Trojan viruses pretend to be other software,
hence their name as in the Trojan Horse.
• Trojan viruses pretend to be a legitimate
piece of software, but in reality can attack
your hard drives, deleting files and re-writing
system files, causing your computer to
become unstable, particular when operating
system files are deleted.
• Replicates?
• No.
BOOT VIRUS
• Boot viruses attack the boot sectors on
your hard drive and interfere with your
computer's basic operation, making
your operating system run strangely or
even corrupt it all together.
• Boot viruses infect System Boot Sectors (SBS)
and Master Boot Sectors (MBS).
• The MBS is located on all physical hard
drives. It contains, among other data,
information about the partition table
(information about how a physical disk is
divided into logical disks), and a short
program that can interpret the partition
information to find out where the SBS is
located. The MBS is operating system
independent. The SBS contains, among other
data, a program whose purpose is to find and
run an operating system.
MACRO VIRUS
• Macro viruses tend to attack data files, like
word documents and spreadsheets, causing
you to loose files or cause your word or excel
software to not work properly.
• Ex. Microsoft Word files can contain
instructions that tells Word how to show a
particular document, Code Red is a binary
stream worm that employs the network.
Macro viruses are among the most common
viruses today. These are able to infect over
networks.
• As a general rule, computer viruses only
attack files in your computer. They do not
attack your computer's hardware, like the
monitor, mouse or keyboard.
• However, some viruses will attack the files
that operate your computer's hardware,
causing hard drives to reformat, video drivers
to be deleted or your operating system to
stop running.
• While this may cause your monitor to stop
working properly, it doesn't mean you need to
get a new monitor.
E-MAIL VIRUSES
• Email is probably the most common method
for spreading viruses. Plain text email
messages don't normally spread viruses. Most
email viruses are spread via attachments to
email messages, or in email messages
containing embedded executable code.
• For a virus contained in an email message to
attack your computer, it will normally require
your computer to executive some code, like
open an attachment or open a html link
embedded in the message.
E-MAIL VIRUSES
• To protect yourself against email viruses
it is important that you do not open
attachments from senders you don't
know, or come from a free email
source, like hotmail or yahoo.
• If you use an email client to check your
email, avoid clients that automatically
open attachments (like Outlook
Express).
Hoax
• A hoax is a chain letter, typically sent over e-
mail, which carries false warnings about
viruses or Trojans. This causes well meaning
users to send the warning on in the belief
that they are doing other users a favor.
• Often such warnings apparently sent from
well-known companies and organizations, but
this is not the case. Hoaxes may also contain
other messages that are supposed to trick
people to send the message on, for example
they will offer money or a cell phone as a
reward for forwarding the message to friends.
HOAX
• If you receive a warning about a virus, do not
pass the warning on to other users!
• This rule applies even if the virus actually
does exist, and applies doubly if the warning
asks to be sent on.
• Replicates?
• No, not by itself. They trick the user into
making copies instead.
Steps on how to minimize your
computer exposure to viruses
• The best way to minimize your chances
of getting a virus infection is to be pro
active and follow some basic steps
outlined below.
• Purchase and Install anti-virus software.
• Make sure the software you select is
compatible with your computer's
operating system, and offers an update
service.
• • Make sure that you regularly up date
your anti virus software definitions. New
viruses come out every day;
• so its important you make sure you
have updated your virus definitions.
Anti-virus software that hasn't been
updated for several months is practically
useless in protecting your computer.
• Make sure that you regularly scan your
computer for viruses using your anti-
virus software.
• If your software allows, use its
automatic protection features which will
check for viruses when ever you turn on
your computer.
• Virus scan any new programs or other
files that may contain executable files
before you run or open them,
particularly if it's a freeware or
shareware program.
• Scan floppy disks & CD’S before
opening them.
• • Don't open emails or email
attachments that have been sent by a
person or organization you don't know.
• Try to use an email client for checking
your email which doesn't automatically
execute or opens attachment.
• When you are browsing internet use
Fire wall.
Antivirus software's
• NORTON (SYMANTEC)
• AVG
• BIT DEFFENDER
• ANTIVIR
• McAFFE
FIREWALL
• SYGATE
• ZONE ALARM
• SYMANTEC NORTON
• MacAfee
• LAVASOFT

More Related Content

What's hot

What's hot (20)

Virus
VirusVirus
Virus
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer virus
Computer virusComputer virus
Computer virus
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
computer virus
computer viruscomputer virus
computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 

Similar to Protect Your Computer From Viruses

Computer virus
Computer virusComputer virus
Computer virusMaxie Santos
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Computer Virus
Computer VirusComputer Virus
Computer VirusRabab Munawar
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAman Chaudhary
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer virus
Computer virusComputer virus
Computer virusRahul Baghla
 
Computer virus
Computer virusComputer virus
Computer virusSarhad Baez
 
Virus
VirusVirus
Virusdddaou
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses Tanu Basoiya
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 

Similar to Protect Your Computer From Viruses (20)

Computer virus
Computer virusComputer virus
Computer virus
 
anti_virus
anti_virusanti_virus
anti_virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Presentation2
Presentation2Presentation2
Presentation2
 
Sowmya
SowmyaSowmya
Sowmya
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 

More from Tukaram Gundoor

Creating a virtual machine for ms dos
Creating a virtual machine for ms dosCreating a virtual machine for ms dos
Creating a virtual machine for ms dosTukaram Gundoor
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computersTukaram Gundoor
 
discrete mathematics precedence of logical operators
discrete mathematics precedence of logical operatorsdiscrete mathematics precedence of logical operators
discrete mathematics precedence of logical operatorsTukaram Gundoor
 
Scaling in research methodology
Scaling in research methodologyScaling in research methodology
Scaling in research methodologyTukaram Gundoor
 

More from Tukaram Gundoor (8)

Memory management
Memory managementMemory management
Memory management
 
Scanners
ScannersScanners
Scanners
 
Hard disk
Hard diskHard disk
Hard disk
 
Creating a virtual machine for ms dos
Creating a virtual machine for ms dosCreating a virtual machine for ms dos
Creating a virtual machine for ms dos
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
discrete mathematics precedence of logical operators
discrete mathematics precedence of logical operatorsdiscrete mathematics precedence of logical operators
discrete mathematics precedence of logical operators
 
Scaling in research methodology
Scaling in research methodologyScaling in research methodology
Scaling in research methodology
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Protect Your Computer From Viruses

  • 2. What is a virus? • A computer virus is a program that is designed to damage or disrupt the normal functions of your computer and its files. • Like biological viruses, computer viruses attach themselves to a host, usually a program file, data file, or a file in your computer's operating system. From here, it replicates itself, spreading the infection to other files.
  • 3. How viruses are transmitted from computer to computer • Viruses can find their way onto your computer in many different ways. • Viruses can be transmitted by email, in downloads from the internet, through network connections, by floppy disks or by CDs, particular those that have been burnt on a computer infected by viruses.
  • 4. What is a program • A program is a recipe for a computer’s behavior. Now, computers do not read these things as we humans do. • They cannot understand free text messages – instead they have to rely on numbers, because computers are really only glorified calculators.
  • 5. • For example, If the number 144 is translated into binary it can be written as 10010000 – which physically means voltage on, off, off, on, off, off, off, off in wires going into the processor.
  • 6. • Computer viruses can cause very serious damage to your computer's program and data files, as well as affect your computers hardware, such as your hard drive. What a particular virus will do to your computer depends on how it was programmed when created.
  • 7. MALWARE • Viruses, Worms, Trojan horses, Logic Bombs etc. are all examples of what is called malicious software programs, or malware for short. • Malware is primarily an unwanted, uninvited, potentially dangerous set of programs, but there are important distinctions among the different subtypes. The following overview defines a few of the most important categories:
  • 8. VIRUS • Viruses require a host, and their goal is to infect other files so that the virus can “live” longer. Some viruses perform destructive actions although this is not necessarily the case. • Many viruses attempt to hide from being discovered. • Replicates? • Yes. All viruses make copies of themselves, infecting boot sectors, programs, or “data files” as the opportunity arises.
  • 9. WORM • Worm viruses are self-contained programs that remain hidden and propagate via email or duplication, modify existing software so that when run, the legitimate program spawns copies of the virus, which is then forwarded on in email or other files. • Replicates? • Yes. A worm makes copies of itself as it finds the opportunity.
  • 10. Trojan horse • Trojan viruses pretend to be other software, hence their name as in the Trojan Horse. • Trojan viruses pretend to be a legitimate piece of software, but in reality can attack your hard drives, deleting files and re-writing system files, causing your computer to become unstable, particular when operating system files are deleted. • Replicates? • No.
  • 11. BOOT VIRUS • Boot viruses attack the boot sectors on your hard drive and interfere with your computer's basic operation, making your operating system run strangely or even corrupt it all together.
  • 12. • Boot viruses infect System Boot Sectors (SBS) and Master Boot Sectors (MBS). • The MBS is located on all physical hard drives. It contains, among other data, information about the partition table (information about how a physical disk is divided into logical disks), and a short program that can interpret the partition information to find out where the SBS is located. The MBS is operating system independent. The SBS contains, among other data, a program whose purpose is to find and run an operating system.
  • 13. MACRO VIRUS • Macro viruses tend to attack data files, like word documents and spreadsheets, causing you to loose files or cause your word or excel software to not work properly. • Ex. Microsoft Word files can contain instructions that tells Word how to show a particular document, Code Red is a binary stream worm that employs the network. Macro viruses are among the most common viruses today. These are able to infect over networks.
  • 14. • As a general rule, computer viruses only attack files in your computer. They do not attack your computer's hardware, like the monitor, mouse or keyboard. • However, some viruses will attack the files that operate your computer's hardware, causing hard drives to reformat, video drivers to be deleted or your operating system to stop running. • While this may cause your monitor to stop working properly, it doesn't mean you need to get a new monitor.
  • 15. E-MAIL VIRUSES • Email is probably the most common method for spreading viruses. Plain text email messages don't normally spread viruses. Most email viruses are spread via attachments to email messages, or in email messages containing embedded executable code. • For a virus contained in an email message to attack your computer, it will normally require your computer to executive some code, like open an attachment or open a html link embedded in the message.
  • 16. E-MAIL VIRUSES • To protect yourself against email viruses it is important that you do not open attachments from senders you don't know, or come from a free email source, like hotmail or yahoo. • If you use an email client to check your email, avoid clients that automatically open attachments (like Outlook Express).
  • 17. Hoax • A hoax is a chain letter, typically sent over e- mail, which carries false warnings about viruses or Trojans. This causes well meaning users to send the warning on in the belief that they are doing other users a favor. • Often such warnings apparently sent from well-known companies and organizations, but this is not the case. Hoaxes may also contain other messages that are supposed to trick people to send the message on, for example they will offer money or a cell phone as a reward for forwarding the message to friends.
  • 18. HOAX • If you receive a warning about a virus, do not pass the warning on to other users! • This rule applies even if the virus actually does exist, and applies doubly if the warning asks to be sent on. • Replicates? • No, not by itself. They trick the user into making copies instead.
  • 19. Steps on how to minimize your computer exposure to viruses • The best way to minimize your chances of getting a virus infection is to be pro active and follow some basic steps outlined below. • Purchase and Install anti-virus software. • Make sure the software you select is compatible with your computer's operating system, and offers an update service.
  • 20. • • Make sure that you regularly up date your anti virus software definitions. New viruses come out every day; • so its important you make sure you have updated your virus definitions. Anti-virus software that hasn't been updated for several months is practically useless in protecting your computer.
  • 21. • Make sure that you regularly scan your computer for viruses using your anti- virus software. • If your software allows, use its automatic protection features which will check for viruses when ever you turn on your computer. • Virus scan any new programs or other files that may contain executable files before you run or open them, particularly if it's a freeware or shareware program.
  • 22. • Scan floppy disks & CD’S before opening them. • • Don't open emails or email attachments that have been sent by a person or organization you don't know. • Try to use an email client for checking your email which doesn't automatically execute or opens attachment. • When you are browsing internet use Fire wall.
  • 23. Antivirus software's • NORTON (SYMANTEC) • AVG • BIT DEFFENDER • ANTIVIR • McAFFE
  • 24. FIREWALL • SYGATE • ZONE ALARM • SYMANTEC NORTON • MacAfee • LAVASOFT