SlideShare a Scribd company logo
1 of 8
Abdullah shahzad
Computer virus:
 Computer virus:
 A computer virus is a program that may disturbed the
normal working of that may computer system without
the knowledge or permission of a user. Virus attaches
itself to a file in a flash drive hardware and email
attachment
Type of virus
 Worm:
 A worm is a harmful program that resides in the active
memory of the computer and duplicates itself. It can
propagate without human intervention, sending
copies of themselves to other computers by e-mail or
Internet Relay Chat
Trojan Horses:
A Trojan horse is a program in which malicious code is
hidden inside a seemingly harmless program. The
program’s harmful payload can enable the hacker to
destroy hard drives, corrupt files, control the computer
remotely, launch attacks against other computers, steal
passwords or Social Security numbers, and spy on
users by recording keystrokes and transmitting them
to a server operated by a third party. It can be delivered
as an e-mail attachment, downloaded from a Web site,
or contracted via a removable media device such as a
CD/DVD or USB memory stick.
Bot nets:
 Bot nets:
 A botnets is a large group of computer controlled from
one or more remote locations by hackers, without the
knowledge or consent of their owners.
 - Are frequently used to distribute spam and malicious
code.
 Cutwail, a large botnet, controlled approximately one
million active bots at a time.
Root kits:
 A root kits is a set of programs that enables its user to
gain administrator level access to a computer without
the end user’s consent or knowledge.
 Attackers can use the root kits to execute files, access
logs, monitor users activity, and change the computer’s
configuration. Root kits are one part of a blended
threat, consisting of the dropper, loader and root kit.
Spam:
 E-mail spam is the abuse of e-mail systems to send
unsolicited e-mail to large numbers of people.
 Most are in a form of low-cost commercial advertising
 It is also an extremely inexpensive method of
marketing used by many legitimate organizations.
 It may also be used to deliver harmful worms or other
malware.
Logic bomb:
 Logic bomb is also called a logic bomb. Its differ from
other viures.it is activated at a certain date and time
.its destroy data on the hard disk march 6.

More Related Content

What's hot

Computer viruses
Computer virusesComputer viruses
Computer virusesBilliyan
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Computer Virus
Computer VirusComputer Virus
Computer VirusAritra Das
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer VirusYo Maruf
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protectionscasyrichard
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 

Viewers also liked

Ud06 e03 copiado de s.o
Ud06 e03 copiado de s.oUd06 e03 copiado de s.o
Ud06 e03 copiado de s.oÁngela B
 
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HRDaniel Donatelli
 
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...블랙 핑크
 

Viewers also liked (8)

Pareceimposibleperosucedio!
Pareceimposibleperosucedio!Pareceimposibleperosucedio!
Pareceimposibleperosucedio!
 
Reunion de noviembre
Reunion de noviembreReunion de noviembre
Reunion de noviembre
 
Ud06 e03 copiado de s.o
Ud06 e03 copiado de s.oUd06 e03 copiado de s.o
Ud06 e03 copiado de s.o
 
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR
 
Ii+jornadas
Ii+jornadasIi+jornadas
Ii+jornadas
 
Mapa conceptual
Mapa conceptualMapa conceptual
Mapa conceptual
 
Article VI: Legislative Department
Article VI: Legislative DepartmentArticle VI: Legislative Department
Article VI: Legislative Department
 
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...
 

Similar to Computer Virus 2017

RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity AttacksZyrellLalaguna
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identificationsandeep shergill
 
Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threatsEC-Council
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 

Similar to Computer Virus 2017 (20)

RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
TIC
TICTIC
TIC
 
Mitppt
MitpptMitppt
Mitppt
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Information security
Information securityInformation security
Information security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
It ppt new
It ppt newIt ppt new
It ppt new
 
MALWARE
MALWAREMALWARE
MALWARE
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity Attacks
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threats
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 

Recently uploaded (20)

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 

Computer Virus 2017

  • 2. Computer virus:  Computer virus:  A computer virus is a program that may disturbed the normal working of that may computer system without the knowledge or permission of a user. Virus attaches itself to a file in a flash drive hardware and email attachment
  • 3. Type of virus  Worm:  A worm is a harmful program that resides in the active memory of the computer and duplicates itself. It can propagate without human intervention, sending copies of themselves to other computers by e-mail or Internet Relay Chat
  • 4. Trojan Horses: A Trojan horse is a program in which malicious code is hidden inside a seemingly harmless program. The program’s harmful payload can enable the hacker to destroy hard drives, corrupt files, control the computer remotely, launch attacks against other computers, steal passwords or Social Security numbers, and spy on users by recording keystrokes and transmitting them to a server operated by a third party. It can be delivered as an e-mail attachment, downloaded from a Web site, or contracted via a removable media device such as a CD/DVD or USB memory stick.
  • 5. Bot nets:  Bot nets:  A botnets is a large group of computer controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.  - Are frequently used to distribute spam and malicious code.  Cutwail, a large botnet, controlled approximately one million active bots at a time.
  • 6. Root kits:  A root kits is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge.  Attackers can use the root kits to execute files, access logs, monitor users activity, and change the computer’s configuration. Root kits are one part of a blended threat, consisting of the dropper, loader and root kit.
  • 7. Spam:  E-mail spam is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.  Most are in a form of low-cost commercial advertising  It is also an extremely inexpensive method of marketing used by many legitimate organizations.  It may also be used to deliver harmful worms or other malware.
  • 8. Logic bomb:  Logic bomb is also called a logic bomb. Its differ from other viures.it is activated at a certain date and time .its destroy data on the hard disk march 6.