SlideShare a Scribd company logo
1 of 17
ANTI-VIRUS SOFTWARE
Prepared by:-
Harsh Gajipara
Contents
Virus and its types
History of anti virus
Meaning of antivirus
How does antivirus works
Install and upgrade antivirus software
Example of anti virus
What is computer virus ?
 Computer viruses are small software programs that are designesd to spread
from one computer to another and to interfere with computer operation.
 A virus might corrupts or delete data on your computer, use your e-mail
program to spread itself to other computers, or even erase everything on your
hard disk.
 Viruses can be disguised as attachments of funny images, greeting card or audio
and video files.
 Viruses are most easily spread by attachments in e-mail messages or instant messaging
messages. That is why it is essential that you never open e-mail attachments unless you
know who it's from and you are expecting it.
 Viruses also spread through downloads on the Internet. They can be hidden in illicit
software or other files or programs you might download.
Types of virus :-
1. Boot sector viruses
2. Program viruses
3. Macro
What should I do if I have a virus?
 Clean your computer with anti-virus software. If your computer is still not functioning
and you have data you are concerned about recovering, consider hiring a trusted expert.
Often data can be successfully extracted from an injured hard drive, but the process is
complex and will involve another computer, special software, and a technician with a lot
of experience in data recovery.
Virus
Infection of more than 75,000 vulnerable computers in 10 minutes
What is antivirus software ?
 Computer programs inteneded to Identify and Eliminate Computer viruses.
What is an antivirus ?
 Antivirus software is a class of program that searches a hard drive and floppy disk for
any known or potential viruses.
 Antivirus program runs in the Random Accesses Memory of a computer.
 Anti-virus software typically uses two different techniques to accomplish this:
Examining files to look for known viruses by means of a virus dictionary.
 Identifying suspicious behavior from any computer program which might indicate
infection. Most commercial anti-virus software uses both of these approaches, with an
emphasis on the virus dictionary approach.
What is an antivirus ?
 Once you have installed an anti-virus package, you should scan your entire computer
periodically. Always leave your Anti-virus software running so it can provide constant
protection.
 Automatic scans- Depending what software you choose, you may be able to configure
it to automatically scan specific files or directories and prompt you at set intervals to
perform complete scans.
 Manual scans- It is also a good idea to manually scan files you receive from an outside
source before opening them.
This includes: Saving and scanning email attachments or web downloads rather than
selecting the option to open them directly from the source. Scanning floppy disks, CDs, or
DVDs for viruses before opening any of the files
How does antivirus works ?
 Anti-virus applications maintain a database of known viruses and compare scanned files
that match the characteristics of known viruses. If a scanned files matches those
characteristics of known viruses. If a scanned file matches those characteristics, it is
quarantined (which means moved to a new, presumably safe location on disk and
renamed, so you can find it should you ever need it) so that it cannot affect other files on
your system.
 Signature detection is just one way of identifying viruses and is only effective if the
virus database is up-to-date and contains the signature of a virus. Anti-virus programs
also attempt to identify suspicious behavior include an application attempting to write to
an executable file, altering needed system files, making suspicious registry entrees, or
adding to the list of items that execute automatically upon system start up.
How does antivirus works ?
 Once the file is quarantined, the application can attempt to repair it, delete it, or
prompt you for a decision on what to do about the file infected.
 This approach helps protect against unidentified or encrypted viruses and can alert
you to suspicious behavior happening on your computer. This interesting is an area
where anti-spyware/anti-adware and anti-virus software often notice the same
kinds of activities, because they are typical for adware and spyware as well as
malware
How Antivirus Software Works:
Source System
Interception
Disinfection
Alert
Destination System
Source System
Interception
Disinfection
Alert
Interception
Disinfection
Why didn’t my antivirus software
works ?
 It's crucial to keep your antivirus software current with the latest updates (usually called
definition files) that help the tool identify and remove the latest threats.
 In addition, not all antivirus tools are the same; if you find that the one you use isn't
working to your satisfaction, you should do some research and try an alternative.
How do I install and update antivirus software if I
can’t use my pc ?
 It might be difficult to download tools or update your computer if your
computer has a virus. In this case, use a friend's or other computer to download
the tools to a disk
QA
Thanks

More Related Content

What's hot

What's hot (20)

How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Anti virus slide show presentation
Anti virus slide show presentationAnti virus slide show presentation
Anti virus slide show presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 

Similar to Anti virus software

Similar to Anti virus software (20)

Virus
VirusVirus
Virus
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Unmasking the Secret How Antivirus works.docx
Unmasking the Secret How Antivirus works.docxUnmasking the Secret How Antivirus works.docx
Unmasking the Secret How Antivirus works.docx
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 

Recently uploaded

Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 

Recently uploaded (20)

Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 

Anti virus software

  • 2. Contents Virus and its types History of anti virus Meaning of antivirus How does antivirus works Install and upgrade antivirus software Example of anti virus
  • 3. What is computer virus ?  Computer viruses are small software programs that are designesd to spread from one computer to another and to interfere with computer operation.  A virus might corrupts or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.  Viruses can be disguised as attachments of funny images, greeting card or audio and video files.
  • 4.  Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.  Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
  • 5. Types of virus :- 1. Boot sector viruses 2. Program viruses 3. Macro
  • 6. What should I do if I have a virus?  Clean your computer with anti-virus software. If your computer is still not functioning and you have data you are concerned about recovering, consider hiring a trusted expert. Often data can be successfully extracted from an injured hard drive, but the process is complex and will involve another computer, special software, and a technician with a lot of experience in data recovery.
  • 7. Virus Infection of more than 75,000 vulnerable computers in 10 minutes
  • 8. What is antivirus software ?  Computer programs inteneded to Identify and Eliminate Computer viruses.
  • 9. What is an antivirus ?  Antivirus software is a class of program that searches a hard drive and floppy disk for any known or potential viruses.  Antivirus program runs in the Random Accesses Memory of a computer.  Anti-virus software typically uses two different techniques to accomplish this: Examining files to look for known viruses by means of a virus dictionary.  Identifying suspicious behavior from any computer program which might indicate infection. Most commercial anti-virus software uses both of these approaches, with an emphasis on the virus dictionary approach.
  • 10. What is an antivirus ?  Once you have installed an anti-virus package, you should scan your entire computer periodically. Always leave your Anti-virus software running so it can provide constant protection.  Automatic scans- Depending what software you choose, you may be able to configure it to automatically scan specific files or directories and prompt you at set intervals to perform complete scans.  Manual scans- It is also a good idea to manually scan files you receive from an outside source before opening them. This includes: Saving and scanning email attachments or web downloads rather than selecting the option to open them directly from the source. Scanning floppy disks, CDs, or DVDs for viruses before opening any of the files
  • 11. How does antivirus works ?  Anti-virus applications maintain a database of known viruses and compare scanned files that match the characteristics of known viruses. If a scanned files matches those characteristics of known viruses. If a scanned file matches those characteristics, it is quarantined (which means moved to a new, presumably safe location on disk and renamed, so you can find it should you ever need it) so that it cannot affect other files on your system.  Signature detection is just one way of identifying viruses and is only effective if the virus database is up-to-date and contains the signature of a virus. Anti-virus programs also attempt to identify suspicious behavior include an application attempting to write to an executable file, altering needed system files, making suspicious registry entrees, or adding to the list of items that execute automatically upon system start up.
  • 12. How does antivirus works ?  Once the file is quarantined, the application can attempt to repair it, delete it, or prompt you for a decision on what to do about the file infected.  This approach helps protect against unidentified or encrypted viruses and can alert you to suspicious behavior happening on your computer. This interesting is an area where anti-spyware/anti-adware and anti-virus software often notice the same kinds of activities, because they are typical for adware and spyware as well as malware
  • 13. How Antivirus Software Works: Source System Interception Disinfection Alert Destination System Source System Interception Disinfection Alert Interception Disinfection
  • 14. Why didn’t my antivirus software works ?  It's crucial to keep your antivirus software current with the latest updates (usually called definition files) that help the tool identify and remove the latest threats.  In addition, not all antivirus tools are the same; if you find that the one you use isn't working to your satisfaction, you should do some research and try an alternative.
  • 15. How do I install and update antivirus software if I can’t use my pc ?  It might be difficult to download tools or update your computer if your computer has a virus. In this case, use a friend's or other computer to download the tools to a disk
  • 16.