SlideShare a Scribd company logo
1 of 14
Introduction to Computer Virus
Imtiaz Ahmed
S10326
Mr. Muhammad Mohsin Hakro
Introduction to Virus
Final Practical Assignment
ISLAMABAD APPLIQUE
Learning Center of Arts & Technology
Trainee:
Code:
Tutor:
Subject:
Institute:
What is Virus?
A computer virus is a malware program that, when
executed, replicates by inserting copies of itself
(possibly modified) into other computer programs,
data files, or the boot sector of the hard drive; when this
replication succeeds, the affected areas are then said
to be "infected“
Viruses often perform some type of harmful activity on
infected hosts, such as stealing hard disk space
or CPU time, accessing private information, corrupting
data, displaying political or humorous messages on the
user's screen, spamming their contacts, logging their
keystrokes, or even rendering the computer useless
An inefficient virus kills its host.
A clever virus stays with it.
– James Lovelock
What is Virus?
 Computer viruses are small software
programs that are designed to spread from
one computer to another and to interfere with
computer operation.
 A virus might corrupt or delete data on your
computer, use your e-mail program to spread
itself to other computers, or even erase
everything on your hard disk.
 Viruses can be masked as attachments of
funny images, greeting cards, or audio and
video files.
What is Virus?
 Viruses are most easily spread by
attachments in e-mail messages or instant
messaging messages. That is why it is
essential that you never open e-mail
attachments unless you know who it's from
and you are expecting it.
 Viruses also spread through downloads on
the Internet. They can be hidden in illicit
software or other files or programs you might
download.
Types of Computer Viruses
 Boot Sector Viruses
Target the boot sector/Master Boot Record (MBR) of the
host's hard drive or removable (USB) storage media etc
 Resident Viruses
Remains in RAM when Computer starts
 Non-resident Viruses
When executed, scans the disk for targets, infects them, and then
exits
 Macro
That is written in a macro language, and embedded into these
documents so that when users open the file, the virus code is
executed, and can infect the user's computer
Other Types of Computer
Viruses
 Virus Hoaxes chain email to forward
 Trojan Horses misrepresents itself as useful
 Worms which replicates same copies
 Spam unsolicited bulk email, junk mail, or unsolicited
email
 Adware Unwanted Advertisement
 Spyware Gathers information and transmit
 Malware Disturb/access information to transmit
 Worms Slow computer
 Browser Hijacker Redirect to other webs
How Computer Virus Spreads
 Email attachments
 Downloads
 Shared files
 Fake Websites
 Networks
 Infected hard disks / USBs
 Hackers/fake Anti Virus Software
 From Mobile Devices
 Friends and Relatives
How to identify Computer
Viruses
 Computer speaks to me
 Computer running extremely slow
 Applications won’t start
 Can’t connect internet or internet slows
 Antivirus disappeared, Firewall disabled
 Making .exe files
 Hide files
 System memory and disk space is
reduced
 New windows open up at an alarming
rate
 Error messages on regular basis
How to identify Computer
Viruses
 Format hard disk
 Copy, rename and delete files
 Modify files dates and extensions
 Display false message every few times
 Damage data
 Damage software
 Random restarts
 Unknown and uninstalled icons on
desktop
 Icons change in appearance
Prevention from Computer
Viruses
 Install reliable Anti-virus program
 Avoid opening suspicious websites
 Never opening attachment without
scanning
 Set-up automatic scanning
 Know what to look
 Install a firewall (Screening)
Antivirus
 Antivirus software is a computer program that
detects, prevents, and takes action to disarm or
remove malicious software programs, such as
viruses and worms.
Well-known Antivirus
Programs
 BitDefender Antivirus
 KasperSky Antivirus
 Norton Antivirus
 F-Secure Antivirus
 AVG Antivirus
 BullGuard Antivirus
 G Data Antivirus
 Panda Antivirus
 Avast Antivirus
 McAfee Antivirus
Well-known Antivirus
Programs
 There are so many anti-viruses which works against
viruses but some anti-viruses are trusted and are very
famous.
 There are 10 ranked anti-viruses by
toptenreviews.com
http://anti-virus-software-review.toptenreviews.com/
Conclusion :
Thank you – Questions ?
 References
• https://en.wikipedia.org/wiki/Computer_virus
• http://www.antivirusworld.com/articles/history.php
• http://www.articlesbase.com/information-technology-
articles/antivirus-history-277310.html
• http://videos.howstuffworks.com/harvard-extension-schools-
computer-science-e-1-understand/2736-desktop-firewalls-
video.htm
“In God we trust, all others we virus scan”
– Anon

More Related Content

What's hot

Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system softwareshujra
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Application software
Application softwareApplication software
Application softwareshalivale
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 

What's hot (20)

Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system software
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Security threats
Security threatsSecurity threats
Security threats
 
Firewall
FirewallFirewall
Firewall
 
Application software
Application softwareApplication software
Application software
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 

Similar to Introduction to Computer Virus (20)

Computer virus
Computer virusComputer virus
Computer virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruses
VirusesViruses
Viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
viruses
virusesviruses
viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 

Recently uploaded (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

Introduction to Computer Virus

  • 1. Introduction to Computer Virus Imtiaz Ahmed S10326 Mr. Muhammad Mohsin Hakro Introduction to Virus Final Practical Assignment ISLAMABAD APPLIQUE Learning Center of Arts & Technology Trainee: Code: Tutor: Subject: Institute:
  • 2. What is Virus? A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected“ Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the computer useless An inefficient virus kills its host. A clever virus stays with it. – James Lovelock
  • 3. What is Virus?  Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.  A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.  Viruses can be masked as attachments of funny images, greeting cards, or audio and video files.
  • 4. What is Virus?  Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.  Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
  • 5. Types of Computer Viruses  Boot Sector Viruses Target the boot sector/Master Boot Record (MBR) of the host's hard drive or removable (USB) storage media etc  Resident Viruses Remains in RAM when Computer starts  Non-resident Viruses When executed, scans the disk for targets, infects them, and then exits  Macro That is written in a macro language, and embedded into these documents so that when users open the file, the virus code is executed, and can infect the user's computer
  • 6. Other Types of Computer Viruses  Virus Hoaxes chain email to forward  Trojan Horses misrepresents itself as useful  Worms which replicates same copies  Spam unsolicited bulk email, junk mail, or unsolicited email  Adware Unwanted Advertisement  Spyware Gathers information and transmit  Malware Disturb/access information to transmit  Worms Slow computer  Browser Hijacker Redirect to other webs
  • 7. How Computer Virus Spreads  Email attachments  Downloads  Shared files  Fake Websites  Networks  Infected hard disks / USBs  Hackers/fake Anti Virus Software  From Mobile Devices  Friends and Relatives
  • 8. How to identify Computer Viruses  Computer speaks to me  Computer running extremely slow  Applications won’t start  Can’t connect internet or internet slows  Antivirus disappeared, Firewall disabled  Making .exe files  Hide files  System memory and disk space is reduced  New windows open up at an alarming rate  Error messages on regular basis
  • 9. How to identify Computer Viruses  Format hard disk  Copy, rename and delete files  Modify files dates and extensions  Display false message every few times  Damage data  Damage software  Random restarts  Unknown and uninstalled icons on desktop  Icons change in appearance
  • 10. Prevention from Computer Viruses  Install reliable Anti-virus program  Avoid opening suspicious websites  Never opening attachment without scanning  Set-up automatic scanning  Know what to look  Install a firewall (Screening)
  • 11. Antivirus  Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms.
  • 12. Well-known Antivirus Programs  BitDefender Antivirus  KasperSky Antivirus  Norton Antivirus  F-Secure Antivirus  AVG Antivirus  BullGuard Antivirus  G Data Antivirus  Panda Antivirus  Avast Antivirus  McAfee Antivirus
  • 13. Well-known Antivirus Programs  There are so many anti-viruses which works against viruses but some anti-viruses are trusted and are very famous.  There are 10 ranked anti-viruses by toptenreviews.com http://anti-virus-software-review.toptenreviews.com/
  • 14. Conclusion : Thank you – Questions ?  References • https://en.wikipedia.org/wiki/Computer_virus • http://www.antivirusworld.com/articles/history.php • http://www.articlesbase.com/information-technology- articles/antivirus-history-277310.html • http://videos.howstuffworks.com/harvard-extension-schools- computer-science-e-1-understand/2736-desktop-firewalls- video.htm “In God we trust, all others we virus scan” – Anon