SlideShare a Scribd company logo
1 of 17
What is a computer virus
1. An infective agent that typically consists of a
nucleic acid molecule in a protein coat, is too
small to be seen by light microscopy, and is able
to multiply only within the living cells of a host.
"the hepatitis B virus"
an infection or disease caused by a virus.
"I've had a virus"
a harmful or corrupting influence.
"the virus of cruelty that is latent in all human
beings"
2. A piece of code which is capable of copying
Signs of a virus
If you're conversant with computer code,
looking at the actual strings of code in a
suspect program can help spot suspicious or
out of place commands. But even if you don't
know your way around codes it may help to look
at the contents of a data file anyway. Strange
messages are commonly inserted by virus
writers and can be read within the code. Look
at a data file with a word processing program
and search for these.
• Applications that don't work properly.
• Disks can't be accessed.
• Printing doesn't work correctly.
• Pull-down menus are distorted.
• File size changes for no apparent reason.
• Date of last access does not match date of
last use.
• An increase in the number of files on the
system when nothing has been added
• Uncommanded disk drive activity.
• Unusual error messages.
• System slows down, freezes or crashes.
Signs of a virus conduit
Conduit is normally downloaded along with
software bundles, torrents, freeware,
and shareware as a third party add-on,
extension, toolbar, or plugin. You can also
knowingly download the Conduit
Community Toolbar for your browser
without realizing that it is harmful.
Malicious software developers distribute
their products with Conduit tools
Damage caused by computer virus
Computer virus can do something more than what you think.
Every single document that has been stored in the hard drive
will lost forever if you don’t free your system of virus. Losing
personal information is a nightmare and it can ruin a project or
your entire effort in just a few a minute. You can buy a new
computer, but it is quite impossible to get back all those
important documents once they are lost from the system.
A few people believe that using antivirus is not a mandatory
task when you are using a PC. However, they must remember
that total system failure is another issue and most of the time
virus seems responsible for this incident. It can happen to
both PCs and several desktops as well.
General types of virus
Boot virus
Program virus
Multipartite virus
Stealth virus
Polymorphic virus
Macro virus
Active x virus
Boot virus
Since nobody uses floppy disks anymore, these
types of computer virus are left to infect only
the master boot records of the hard disk. The
boot record program loads the operating
system in the memory at startup. These
viruses replace the boot record and move it to
a different part of the hard disk, or simply
overwrite it. As you can imagine, once you
start your operating system, it loads into
memory, along with the virus. Once the virus is
in the memory, it is free to do whatever it was
Program viruses
These types of computer virus will
infect only executable files (with
extensions like .BIN, .COM, .EXE, .OVL, .DRV, and
.SYS). Once executed, these programs load
into memory, along with the virus
contained within them. Once in the
memory, the scenario repeats – the virus
is free to act and infect other files or
Multipartite viruses
These computer viruses are hybrids,
derived from boot viruses and
program viruses. They infect
executable files, just like the
program viruses but, once the
executable is executed, it infects
the master boot records. The
scenario is similar to the boot virus’s
Stealth viruses
These viruses are specialized in
avoiding detection and will use a
number of techniques to do so. Most
of them simply redirect the hard
disk head, forcing it to read another
memory sector instead of their own.
Some of them also alter the reading
of the file size shown when listing
Polymorphic viruses
The polymorphic viruses will
always change their source
code from one infection to
another. Each infection is
different, and this makes
detection very hard. However,
detection is still possible,
Macro viruses
This virus is relatively new and it
infects macros within a template or
document. When you open a word
processing document, it activates the
virus. The virus infects the
Normal.dot template, which is a
general file used by all the
documents. So, whenever you open an
Active X viruses
Most people do not know how to
configure ActiveX and Java
controls, unconsciously leaving a
security hole. Applets are then
allowed to run freely on the
machine, delivering all ActiveX
viruses. By simply turning off
Anti- virus
Antivirus software is a computer
program that detects, prevents,
and takes action to disarm or
remove malicious software
programs, such as viruses and
worms. You can help protect your
computer against viruses by using
antivirus software, such as
Popular anti - virus
Computer virus (sarthak)

More Related Content

What's hot

Computer viruses
Computer virusesComputer viruses
Computer virusesBilliyan
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robertrobsworld
 
Cryptovirology - by Malathi
Cryptovirology - by MalathiCryptovirology - by Malathi
Cryptovirology - by MalathiSanthosh Sundar
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internetUltraUploader
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Pratimesh Pathak
 
Multiple Tools Required To Disinfect A Pc
Multiple Tools Required To Disinfect A PcMultiple Tools Required To Disinfect A Pc
Multiple Tools Required To Disinfect A PcRobert Sarkes
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisaDom Mike
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special virusesUltraUploader
 

What's hot (20)

Computervirus
ComputervirusComputervirus
Computervirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Virus vs Anti-Virus
Virus vs Anti-VirusVirus vs Anti-Virus
Virus vs Anti-Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Virus
VirusVirus
Virus
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robert
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
 
computer virus
computer virus computer virus
computer virus
 
Cryptovirology - by Malathi
Cryptovirology - by MalathiCryptovirology - by Malathi
Cryptovirology - by Malathi
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
 
Multiple Tools Required To Disinfect A Pc
Multiple Tools Required To Disinfect A PcMultiple Tools Required To Disinfect A Pc
Multiple Tools Required To Disinfect A Pc
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special viruses
 
Ict
IctIct
Ict
 
Ict
IctIct
Ict
 

Viewers also liked

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Bachelor's Degree Academic Transcript
Bachelor's Degree Academic TranscriptBachelor's Degree Academic Transcript
Bachelor's Degree Academic TranscriptReshma Shrestha
 
Following Joe Peters on the Campaign trail
Following Joe Peters on the Campaign trailFollowing Joe Peters on the Campaign trail
Following Joe Peters on the Campaign trailsmulrich77
 
CertificateMagic_04-03-35
CertificateMagic_04-03-35CertificateMagic_04-03-35
CertificateMagic_04-03-35Guy O'Connor
 
Compassion International By Lindsey Crown
Compassion International By Lindsey CrownCompassion International By Lindsey Crown
Compassion International By Lindsey CrownLindsey Crown
 
Why is politics not essentially contested?
Why is politics not essentially contested?Why is politics not essentially contested?
Why is politics not essentially contested?robustmotto3357
 
Images d'automne
Images d'automneImages d'automne
Images d'automneBalcon60
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Organisations in the age of algorithms
Organisations in the age of algorithmsOrganisations in the age of algorithms
Organisations in the age of algorithmsLee Bryant
 
Manejo de Hipervínculos en PowerPoint2013
Manejo de Hipervínculos en PowerPoint2013Manejo de Hipervínculos en PowerPoint2013
Manejo de Hipervínculos en PowerPoint2013Mariana Acosta
 
Pib – crecimiento económico
Pib – crecimiento económicoPib – crecimiento económico
Pib – crecimiento económicosteven castillo
 
Social Teams and Organisational Change in Utilities
Social Teams and Organisational Change in UtilitiesSocial Teams and Organisational Change in Utilities
Social Teams and Organisational Change in UtilitiesLee Bryant
 
Exposition AnselmKiefer 11mars126
Exposition AnselmKiefer 11mars126Exposition AnselmKiefer 11mars126
Exposition AnselmKiefer 11mars126marleroy
 
Android malware analysis
Android malware analysisAndroid malware analysis
Android malware analysisJason Ross
 

Viewers also liked (20)

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Bachelor's Degree Academic Transcript
Bachelor's Degree Academic TranscriptBachelor's Degree Academic Transcript
Bachelor's Degree Academic Transcript
 
Following Joe Peters on the Campaign trail
Following Joe Peters on the Campaign trailFollowing Joe Peters on the Campaign trail
Following Joe Peters on the Campaign trail
 
CertificateMagic_04-03-35
CertificateMagic_04-03-35CertificateMagic_04-03-35
CertificateMagic_04-03-35
 
Manual zanussi encimera zes3921 iba
Manual zanussi   encimera zes3921 ibaManual zanussi   encimera zes3921 iba
Manual zanussi encimera zes3921 iba
 
Manual zanussi encimera zev6340 xba
Manual zanussi   encimera zev6340 xbaManual zanussi   encimera zev6340 xba
Manual zanussi encimera zev6340 xba
 
Manual zanussi congelador zfc21400 wa
Manual zanussi   congelador zfc21400 waManual zanussi   congelador zfc21400 wa
Manual zanussi congelador zfc21400 wa
 
Manual zanussi cocina zcg510 g1xa
Manual zanussi   cocina zcg510 g1xaManual zanussi   cocina zcg510 g1xa
Manual zanussi cocina zcg510 g1xa
 
letter rec 3
letter rec 3letter rec 3
letter rec 3
 
Compassion International By Lindsey Crown
Compassion International By Lindsey CrownCompassion International By Lindsey Crown
Compassion International By Lindsey Crown
 
Why is politics not essentially contested?
Why is politics not essentially contested?Why is politics not essentially contested?
Why is politics not essentially contested?
 
Images d'automne
Images d'automneImages d'automne
Images d'automne
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Organisations in the age of algorithms
Organisations in the age of algorithmsOrganisations in the age of algorithms
Organisations in the age of algorithms
 
Manejo de Hipervínculos en PowerPoint2013
Manejo de Hipervínculos en PowerPoint2013Manejo de Hipervínculos en PowerPoint2013
Manejo de Hipervínculos en PowerPoint2013
 
Pib – crecimiento económico
Pib – crecimiento económicoPib – crecimiento económico
Pib – crecimiento económico
 
Social Teams and Organisational Change in Utilities
Social Teams and Organisational Change in UtilitiesSocial Teams and Organisational Change in Utilities
Social Teams and Organisational Change in Utilities
 
Exposition AnselmKiefer 11mars126
Exposition AnselmKiefer 11mars126Exposition AnselmKiefer 11mars126
Exposition AnselmKiefer 11mars126
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Android malware analysis
Android malware analysisAndroid malware analysis
Android malware analysis
 

Similar to Computer virus (sarthak)

Similar to Computer virus (sarthak) (20)

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus
VirusVirus
Virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Virus
VirusVirus
Virus
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

Computer virus (sarthak)

  • 1.
  • 2. What is a computer virus 1. An infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host. "the hepatitis B virus" an infection or disease caused by a virus. "I've had a virus" a harmful or corrupting influence. "the virus of cruelty that is latent in all human beings" 2. A piece of code which is capable of copying
  • 3. Signs of a virus If you're conversant with computer code, looking at the actual strings of code in a suspect program can help spot suspicious or out of place commands. But even if you don't know your way around codes it may help to look at the contents of a data file anyway. Strange messages are commonly inserted by virus writers and can be read within the code. Look at a data file with a word processing program and search for these.
  • 4. • Applications that don't work properly. • Disks can't be accessed. • Printing doesn't work correctly. • Pull-down menus are distorted. • File size changes for no apparent reason. • Date of last access does not match date of last use. • An increase in the number of files on the system when nothing has been added • Uncommanded disk drive activity. • Unusual error messages. • System slows down, freezes or crashes.
  • 5. Signs of a virus conduit Conduit is normally downloaded along with software bundles, torrents, freeware, and shareware as a third party add-on, extension, toolbar, or plugin. You can also knowingly download the Conduit Community Toolbar for your browser without realizing that it is harmful. Malicious software developers distribute their products with Conduit tools
  • 6. Damage caused by computer virus Computer virus can do something more than what you think. Every single document that has been stored in the hard drive will lost forever if you don’t free your system of virus. Losing personal information is a nightmare and it can ruin a project or your entire effort in just a few a minute. You can buy a new computer, but it is quite impossible to get back all those important documents once they are lost from the system. A few people believe that using antivirus is not a mandatory task when you are using a PC. However, they must remember that total system failure is another issue and most of the time virus seems responsible for this incident. It can happen to both PCs and several desktops as well.
  • 7. General types of virus Boot virus Program virus Multipartite virus Stealth virus Polymorphic virus Macro virus Active x virus
  • 8. Boot virus Since nobody uses floppy disks anymore, these types of computer virus are left to infect only the master boot records of the hard disk. The boot record program loads the operating system in the memory at startup. These viruses replace the boot record and move it to a different part of the hard disk, or simply overwrite it. As you can imagine, once you start your operating system, it loads into memory, along with the virus. Once the virus is in the memory, it is free to do whatever it was
  • 9. Program viruses These types of computer virus will infect only executable files (with extensions like .BIN, .COM, .EXE, .OVL, .DRV, and .SYS). Once executed, these programs load into memory, along with the virus contained within them. Once in the memory, the scenario repeats – the virus is free to act and infect other files or
  • 10. Multipartite viruses These computer viruses are hybrids, derived from boot viruses and program viruses. They infect executable files, just like the program viruses but, once the executable is executed, it infects the master boot records. The scenario is similar to the boot virus’s
  • 11. Stealth viruses These viruses are specialized in avoiding detection and will use a number of techniques to do so. Most of them simply redirect the hard disk head, forcing it to read another memory sector instead of their own. Some of them also alter the reading of the file size shown when listing
  • 12. Polymorphic viruses The polymorphic viruses will always change their source code from one infection to another. Each infection is different, and this makes detection very hard. However, detection is still possible,
  • 13. Macro viruses This virus is relatively new and it infects macros within a template or document. When you open a word processing document, it activates the virus. The virus infects the Normal.dot template, which is a general file used by all the documents. So, whenever you open an
  • 14. Active X viruses Most people do not know how to configure ActiveX and Java controls, unconsciously leaving a security hole. Applets are then allowed to run freely on the machine, delivering all ActiveX viruses. By simply turning off
  • 15. Anti- virus Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using antivirus software, such as
  • 16. Popular anti - virus