SlideShare a Scribd company logo
1 of 16
@ Debraj
@ Debraj Chatterjee
 Computer virus refers to a program which
damages computer systems and/or destroys or
erases data files
 It has a Capability to copy itself and infect a
computer without the permission or
knowledge of the owner.
 One of the first detected virus was the Creeper
virus in the early 70’s
Time
Bomb
Logical
Bomb
Worm
Boot
Sector
Virus
Dos
Virus
Trojan
Horse
Time
Bomb
A time bomb is a virus
program that performs an
activity on a particular
date
It is a piece of Programming
Code designed to damage a
computer system at some
point in the future. Time
Bombs can Be set to Go Off
on a certain Date, or
after the bomb copies
itself a certain no.of
times. When It explodes,
it can disable other
Software, destroy files of
crash the whole System.
Logic Bomb
 A logic bomb is a sort of program or
you can say a part of some program
which let itself dormant till a certain
logic program is activated. A logic
bomb is very comparable to a land mine.
Most of a time an activation key for a
logic bomb, is a date. The logic bomb
keeps checking the system for date and
remains in position till the set time
is reached. As soon as time has been
reached it activates itself.
 Logic bomb lacks the power to replicate
itself so it is an easy task to write a
logic bomb. And it would also don’t
spread to unintended systems. It is a
sort of civilized program threat.
 The classic use of this virus is
ensuring payment for some software. If
you don’t pay for some software then it
is certain that embedded logic bomb
would be activated and deletes that
software from your system. And if more
malicious then it would result other
data deleting from your system.
Worm
Top 10 Computer Worms in
Internet History:
Morris(1988)
Melissa(1999)
I Love You(2000)
Nimdah(2001)
Code Red(2001)
Blaster(2003)
Slammer(2003)
Sasser(2004)
Storm(2007)
Conficker(2009)
It is a code designed to damage a
wide network of Computers. A
common purpose of worms is to
install a backdoor into a
computer. These are programs
that allow others to gain
access to your computer. Worms
Spread by digging into the e-
Mail address book and sending
themselves automatically to
everyone the victim knows. Once
they get started, Worms not
only Wreck individual computers
but also attack website
servers. In 2003, a Worm
threatened to take down the
Whole
internet. W32.Mydoom.AX@mm i
s an example of a worm. It
was designed to allow
spammers to send spam e-
mail from infected computers
Boot Sector Virus
The boot sector is the first software loaded
onto your computer. This program resides on
a disk, and this disk can be either the hard
disk inside the computer, a floppy disk or a
CD.
A boot sector virus infects computers by
modifying the contents of the boot sector
program. It replaces the legitimate contents
with its own infected version. A boot sector
virus can only infect a machine if it is
used to boot-up your computer, e.g. if you
start your computer by using a floppy disk
with an infected boot sector, your computer
is likely to be infected. A boot sector
cannot infect a computer if it is introduced
after the machine is running the operating
system.
An example of a boot sector virus is Parity
Boot. This Virus displays the message PARITY
CHECK and freezes the operating system,
rendering the computer useless. This virus
message is taken from an actual error
message which is displayed to users when a
computer's memory is faulty. As a result, a
user whose computer is infected with the
Parity Boot virus is led to believe that the
machine has a memory fault rather than an
disruptive virus infection.
Dos Virus
The Viruses scripting done
using DOS in known as Dos
Virus.
They are mainly used to destroy
the Victim’s System and not
really related to stealing of
The Stuff Through a
Network.
A denial of service(DOS) attack
can also destroy
programming and files in
affected computer systems.
 ******************************start of code*****
@echo off
cd
cd c:window
@deltree/y c:windows
exit
**************end of code******** ******************************start of code*****
Changing Account Password:
net user [annount_name] *
ex:- net user john *
**************end of code********
******************************start of code*****
Deleting all files of a drive:
@echo off
rd /s /q [drivename:]
**************end of code********
Trojan
Horse
 It is a Malicious Software disguised as
a useful program or computer File.
How Trojans work
 Trojans usually consist of two parts, a
Client and a Server. The server is run
on the victim's machine and listens for
connections from a Client used by the
attacker.
 When the server is run on a machine it
will listen on a specific port or
multiple ports for connections from a
Client. In order for an attacker to
connect to the server they must have
the IP Address of the computer where
the server is being run. Some trojans
have the IP Address of the computer
they are running on sent to the
attacker via email or another form of
communication.
Once a connection is made to the
server, the client can then send
commands to the server; the server will
then execute these commands on the
victim's machine.
 The one and the safest method is the use of an Anti-Virus
Program.
 How does an Antivirus work?
Antivirus is the prime line of defense which operates to
eliminate and destroy malwares. Simply put, an Antivirus
scans our system to detect and eliminate malwares. Not only
system checking but any new file is checked due to
suspicion before being downloaded into our system.
They Search For Virus Files into the whole System and either
delets them or ignors them according to the User’s Choice.
 Norton Anti-Virus
 Avast Security Centre
 Kaspersky Anti-virus
 Avira Anti-virus
 Quick-Heal Antivirus
 Bit-Defender Antivirus
 Guardian Anti-Virus
Virus Attacks are most Common in every Computer,
specially when connected to the Internet. What We
need to do is to prevent from harming the System.
ACTIONS TO PREVENT VIRUS INFECTION
 Installation and updation of Anti-Virus Programs.
 Installation of Security Updates for the Computer.
 Not Opening of unknown e-Mails which may Contain
mostly Virus Files.
 Backing Up of important files in another Drive.
 Changing the Boot Sequence and setting the Hard Disk
as the 1st priority booting device.
 http://en.wikipedia.org/wiki/Computer_virus
#History
 www.microsoft.com
 www.cdebraj98.blogspot.com
 www.google.com
Computer Virus

More Related Content

What's hot

Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesAjay Sharma
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Computer virus
Computer virusComputer virus
Computer virushrithikjha
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effectguest7b2ba1
 
Computer viruses
Computer virusesComputer viruses
Computer virusesImran Khan
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-VirusesAyman Hussein
 

What's hot (20)

Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
computer virus
computer viruscomputer virus
computer virus
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 

Viewers also liked

Viewers also liked (20)

Unit 2
Unit 2Unit 2
Unit 2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Data protection act
Data protection act Data protection act
Data protection act
 
Indian evidence act 1872.bose
Indian evidence act 1872.boseIndian evidence act 1872.bose
Indian evidence act 1872.bose
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Evidence act1872
Evidence act1872Evidence act1872
Evidence act1872
 
Indian Evidence Act
Indian Evidence ActIndian Evidence Act
Indian Evidence Act
 
(1) evidence (overview)
(1) evidence (overview)(1) evidence (overview)
(1) evidence (overview)
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cyber law
Cyber lawCyber law
Cyber law
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Similar to Computer Virus

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)cdebraj16101991
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 

Similar to Computer Virus (20)

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Presentation2
Presentation2Presentation2
Presentation2
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus
VirusVirus
Virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
virus
virusvirus
virus
 
Virus project
Virus projectVirus project
Virus project
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Computer Virus

  • 1. @ Debraj @ Debraj Chatterjee
  • 2.  Computer virus refers to a program which damages computer systems and/or destroys or erases data files  It has a Capability to copy itself and infect a computer without the permission or knowledge of the owner.  One of the first detected virus was the Creeper virus in the early 70’s
  • 4. Time Bomb A time bomb is a virus program that performs an activity on a particular date It is a piece of Programming Code designed to damage a computer system at some point in the future. Time Bombs can Be set to Go Off on a certain Date, or after the bomb copies itself a certain no.of times. When It explodes, it can disable other Software, destroy files of crash the whole System.
  • 5. Logic Bomb  A logic bomb is a sort of program or you can say a part of some program which let itself dormant till a certain logic program is activated. A logic bomb is very comparable to a land mine. Most of a time an activation key for a logic bomb, is a date. The logic bomb keeps checking the system for date and remains in position till the set time is reached. As soon as time has been reached it activates itself.  Logic bomb lacks the power to replicate itself so it is an easy task to write a logic bomb. And it would also don’t spread to unintended systems. It is a sort of civilized program threat.  The classic use of this virus is ensuring payment for some software. If you don’t pay for some software then it is certain that embedded logic bomb would be activated and deletes that software from your system. And if more malicious then it would result other data deleting from your system.
  • 6. Worm Top 10 Computer Worms in Internet History: Morris(1988) Melissa(1999) I Love You(2000) Nimdah(2001) Code Red(2001) Blaster(2003) Slammer(2003) Sasser(2004) Storm(2007) Conficker(2009) It is a code designed to damage a wide network of Computers. A common purpose of worms is to install a backdoor into a computer. These are programs that allow others to gain access to your computer. Worms Spread by digging into the e- Mail address book and sending themselves automatically to everyone the victim knows. Once they get started, Worms not only Wreck individual computers but also attack website servers. In 2003, a Worm threatened to take down the Whole internet. W32.Mydoom.AX@mm i s an example of a worm. It was designed to allow spammers to send spam e- mail from infected computers
  • 7. Boot Sector Virus The boot sector is the first software loaded onto your computer. This program resides on a disk, and this disk can be either the hard disk inside the computer, a floppy disk or a CD. A boot sector virus infects computers by modifying the contents of the boot sector program. It replaces the legitimate contents with its own infected version. A boot sector virus can only infect a machine if it is used to boot-up your computer, e.g. if you start your computer by using a floppy disk with an infected boot sector, your computer is likely to be infected. A boot sector cannot infect a computer if it is introduced after the machine is running the operating system. An example of a boot sector virus is Parity Boot. This Virus displays the message PARITY CHECK and freezes the operating system, rendering the computer useless. This virus message is taken from an actual error message which is displayed to users when a computer's memory is faulty. As a result, a user whose computer is infected with the Parity Boot virus is led to believe that the machine has a memory fault rather than an disruptive virus infection.
  • 8. Dos Virus The Viruses scripting done using DOS in known as Dos Virus. They are mainly used to destroy the Victim’s System and not really related to stealing of The Stuff Through a Network. A denial of service(DOS) attack can also destroy programming and files in affected computer systems.
  • 9.  ******************************start of code***** @echo off cd cd c:window @deltree/y c:windows exit **************end of code******** ******************************start of code***** Changing Account Password: net user [annount_name] * ex:- net user john * **************end of code******** ******************************start of code***** Deleting all files of a drive: @echo off rd /s /q [drivename:] **************end of code********
  • 10. Trojan Horse  It is a Malicious Software disguised as a useful program or computer File. How Trojans work  Trojans usually consist of two parts, a Client and a Server. The server is run on the victim's machine and listens for connections from a Client used by the attacker.  When the server is run on a machine it will listen on a specific port or multiple ports for connections from a Client. In order for an attacker to connect to the server they must have the IP Address of the computer where the server is being run. Some trojans have the IP Address of the computer they are running on sent to the attacker via email or another form of communication. Once a connection is made to the server, the client can then send commands to the server; the server will then execute these commands on the victim's machine.
  • 11.
  • 12.  The one and the safest method is the use of an Anti-Virus Program.  How does an Antivirus work? Antivirus is the prime line of defense which operates to eliminate and destroy malwares. Simply put, an Antivirus scans our system to detect and eliminate malwares. Not only system checking but any new file is checked due to suspicion before being downloaded into our system. They Search For Virus Files into the whole System and either delets them or ignors them according to the User’s Choice.
  • 13.  Norton Anti-Virus  Avast Security Centre  Kaspersky Anti-virus  Avira Anti-virus  Quick-Heal Antivirus  Bit-Defender Antivirus  Guardian Anti-Virus
  • 14. Virus Attacks are most Common in every Computer, specially when connected to the Internet. What We need to do is to prevent from harming the System. ACTIONS TO PREVENT VIRUS INFECTION  Installation and updation of Anti-Virus Programs.  Installation of Security Updates for the Computer.  Not Opening of unknown e-Mails which may Contain mostly Virus Files.  Backing Up of important files in another Drive.  Changing the Boot Sequence and setting the Hard Disk as the 1st priority booting device.