SlideShare a Scribd company logo
1 of 19
Presented by:
Bennette Osae Addo.
ICT Teacher-GCIHS
COMPUTER VIRUS
What are Computer Viruses
Computer Viruses are small
software programs that are
designed to spread from one
computer to another and to
interfere with computer
operation.
Why people create computer
viruses
 Computer viruses do not come into existence
spontaneously. They are deliberately created
by programmers, or by people who use virus
creation software.
Virus writers can have various reasons for creating and
spreading malware. Viruses have been written as
research projects, pranks, to attack the products of
specific companies, to distribute political messages, and
financial gain from identity theft, spyware, and cryptoviral
extortion. Some virus writers consider their creations to be
works of art, and see virus writing as a creative hobby.
Ways computer viruses enter your computer
 Viruses are most easily spread by
attachments in e-mail messages or instant
messaging messages. That is why it is
essential that you never open e-mail
attachments unless you know who it's from
and you are expecting it.
 Viruses can be disguised as attachments of
funny images, greeting cards, or audio
and video files. Viruses also spread
through downloads on the Internet. They
can be hidden in illicit software or other
files or programs you might download.

How to detect virus?
Some Symptoms
q Program takes longer to load.
q The program size keeps changing.
q The drive light keeps flashing when you are
not doing anything.
q User created files have strange names.
q The computer doesn't remember CMOS
settings.
Examples of computer viruses
 Trojan Horse:
A destructive program that
masquerades as a benign
application. Unlike viruses, Trojan
horses do not replicate themselves
but they can be just as destructive.

One of the most insidious types of
Trojan horse is a program that claims
to rid your computer of viruses but
instead introduces viruses onto your
computer.

 Worm:
A worm is similar to a virus by its design,
and is considered to be a sub-class of a
virus. Worms spread from computer to
computer, but unlike a virus, it has the
capability to travel without any help from
a person. A worm takes advantage of file
or information transport features on your
system, which allows it to travel unaided.
 The biggest danger with a worm is its
capability to replicate itself on your
system, so rather than your computer
sending out a single worm, it could send
out hundreds or thousands of copies of
itself, creating a huge devastating effect.
 Boot sector Virus :
A virus which attaches itself to the first part
of the hard disk that is read by the
computer upon boot up. These are
normally spread by floppy disks.
Macro Virus:
Macro viruses are viruses that use another
application's macro programming
language to distribute themselves. They
infect documents such as MS Word or MS
Excel and are typically spread to other
similar documents.
Memory Resident Viruses:
Memory Resident Viruses reside in a
computers volatile memory (RAM). They
are initiated from a virus which runs on the
computer and they stay in memory after
it's initiating program closes.
Spy ware
 Spyware, on the other hand, is generally not
designed to damage your computer. Spyware
is broadly defined as any program that gets
into your computer without permission and
hides in the background while it makes
unwanted changes to your user experience.
 Most spyware targets only the Windows
operating system. Some of the more
notorious spyware companies include Gator,
Bonzi Buddy, 180 Solutions, DirectRevenue,
Cydoor, CoolWebSearch, Xupiter, XXXDial
and Euniverse.

How Did it Get on Your Computer?
 Spyware usually gets onto your machine
because of something you do, like clicking a
button on a pop-up window, installing a
software package or agreeing to add
functionality to your Web browser

How Did it Get on Your Computer?
 Drive-by download - This is when a Web site or
pop-up window automatically tries to download
and install spyware on your machine
 Browser add-ons - These are pieces of software
that add enhancements to your Web browser,
like a toolbar, animated pal or additional search
box.
 browser hijackers -- these embed themselves
deeply in your machine and take quite a bit of
work to get rid of.
Steps to avoid virus
 Don’t open e-mail that you are not sure.
 All thumb drive(Pendrive) need to scan by
anti-virus software.

 Always scan your PC with anti-virus software.
How to protect your computer from
computer viruses
 Only open e-mail attachments received
from sources you trust and that you are
expecting.

 Back up your hard drive files frequently and
maintain multiple backup sets.

 If you are experiencing unusually slow
performance, apparent file loss or
damage, or other abnormalities,
immediately check your hard drives and
diskettes for infection.
•Delete chain emails and junk email. Do not
forward or reply to any to them.
These types of email are considered spam, which is
unsolicited, intrusive mail that clogs up the
network.
•
•Download software only from sites you are
familiar with, and immediately check it with your
anti-virus software.
•
•Don't spread hoaxes and rumors.
TOP 10 ANTIVIRUS OF 2017
1. McAfee AntiVirus Plus
2. Symantec Norton AntiVirus Basic
3. Webroot SecureAnywhere AntiVirus
4. Bitdefender Antivirus Plus
5. Kaspersky Anti-Virus
6. Avast Pro Antivirus 2017
7. Emsisoft Anti-Malware 2017
8. ESET NOD32 Antivirus
9. F-Secure Anti-Virus (2017)
10.Trend Micro Antivirus+ Security
End
References
 http://www.webopedia.com/DidYouKnow/Internet/2004/vi
- The Difference Between a Virus, Worm, and
Trojan Horse.
 http://en.wikipedia.org/wiki/Computer_virus -
Computer Virus
 http://www.microsoft.com/protect/computer/basics/virus.m
- What is Computer Viruses
 http://www.soe.umich.edu/computingnetwork/howto/avo
- How To Avoid Computer Viruses

More Related Content

What's hot

Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer Virus
Computer VirusComputer Virus
Computer VirusAritra Das
 
Computer Virus
Computer Virus Computer Virus
Computer Virus Study Hub
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer VirusYo Maruf
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.QuratNaeem
 

What's hot (20)

Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus
computer viruscomputer virus
computer virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Virus
VirusVirus
Virus
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 

Similar to Computer virus (20)

Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Sowmya
SowmyaSowmya
Sowmya
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus
VirusVirus
Virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
virus
virusvirus
virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

Computer virus

  • 1. Presented by: Bennette Osae Addo. ICT Teacher-GCIHS COMPUTER VIRUS
  • 2.
  • 3. What are Computer Viruses Computer Viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
  • 4. Why people create computer viruses  Computer viruses do not come into existence spontaneously. They are deliberately created by programmers, or by people who use virus creation software. Virus writers can have various reasons for creating and spreading malware. Viruses have been written as research projects, pranks, to attack the products of specific companies, to distribute political messages, and financial gain from identity theft, spyware, and cryptoviral extortion. Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby.
  • 5. Ways computer viruses enter your computer  Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.  Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. 
  • 6. How to detect virus? Some Symptoms q Program takes longer to load. q The program size keeps changing. q The drive light keeps flashing when you are not doing anything. q User created files have strange names. q The computer doesn't remember CMOS settings.
  • 7. Examples of computer viruses  Trojan Horse: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.  One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. 
  • 8.  Worm: A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided.  The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.
  • 9.  Boot sector Virus : A virus which attaches itself to the first part of the hard disk that is read by the computer upon boot up. These are normally spread by floppy disks. Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volatile memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.
  • 10. Spy ware  Spyware, on the other hand, is generally not designed to damage your computer. Spyware is broadly defined as any program that gets into your computer without permission and hides in the background while it makes unwanted changes to your user experience.  Most spyware targets only the Windows operating system. Some of the more notorious spyware companies include Gator, Bonzi Buddy, 180 Solutions, DirectRevenue, Cydoor, CoolWebSearch, Xupiter, XXXDial and Euniverse. 
  • 11. How Did it Get on Your Computer?  Spyware usually gets onto your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser 
  • 12. How Did it Get on Your Computer?  Drive-by download - This is when a Web site or pop-up window automatically tries to download and install spyware on your machine  Browser add-ons - These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box.  browser hijackers -- these embed themselves deeply in your machine and take quite a bit of work to get rid of.
  • 13. Steps to avoid virus  Don’t open e-mail that you are not sure.  All thumb drive(Pendrive) need to scan by anti-virus software.   Always scan your PC with anti-virus software.
  • 14. How to protect your computer from computer viruses  Only open e-mail attachments received from sources you trust and that you are expecting.   Back up your hard drive files frequently and maintain multiple backup sets.   If you are experiencing unusually slow performance, apparent file loss or damage, or other abnormalities, immediately check your hard drives and diskettes for infection.
  • 15. •Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network. • •Download software only from sites you are familiar with, and immediately check it with your anti-virus software. • •Don't spread hoaxes and rumors.
  • 16. TOP 10 ANTIVIRUS OF 2017 1. McAfee AntiVirus Plus 2. Symantec Norton AntiVirus Basic 3. Webroot SecureAnywhere AntiVirus 4. Bitdefender Antivirus Plus 5. Kaspersky Anti-Virus 6. Avast Pro Antivirus 2017 7. Emsisoft Anti-Malware 2017 8. ESET NOD32 Antivirus 9. F-Secure Anti-Virus (2017) 10.Trend Micro Antivirus+ Security
  • 17.
  • 18. End
  • 19. References  http://www.webopedia.com/DidYouKnow/Internet/2004/vi - The Difference Between a Virus, Worm, and Trojan Horse.  http://en.wikipedia.org/wiki/Computer_virus - Computer Virus  http://www.microsoft.com/protect/computer/basics/virus.m - What is Computer Viruses  http://www.soe.umich.edu/computingnetwork/howto/avo - How To Avoid Computer Viruses