SlideShare a Scribd company logo
1 of 13
VIRUS
‫الطالب‬:‫شيخ‬ ‫مالئم‬ ‫محمد‬
 What is anti-virus ?
 How an anti-virus work?
 Some of the symptoms of an infected computer !
 Does Antivirus undamaged file.?!
 What is the difference between Free & Paid Antivirus Software?
 Some examples of antivirus software’s…
 How to make a simple antivirus ?!
ANTIVIRUS
Antivirus Software is a computer program
that identify and remove computer viruses,
and other malicious software like Worms and
Trojan from an infected computer.
Not only this, an antivirus software also
protects the computer from further virus
attacks.
(Malicious software (malware) is any software that gives partial to full control of your computer to do whatever the malware creator wants.
Malware can be a virus, worm,trojan,spyware,etc……)
ANTIVIRUS
Antivirus software typically uses two different
techniques to find virus:
1.Signature based detection
2.Behavior based detection
Antivirus works using dictionary Approach.
The antivirus software examines each and
every file in a computer and examines its
content
with the virus definitions stored in its
virus dictionary.
 This type of antivirus identifies suspicious
behavior of programs (like modification of
critical files/programs) and alerts the user
about the suspicious program or stop the
program from running.
 If any program tries to write data on an
executable file, the antivirus software will flag
the program having a suspicious behavior,
means the suspected program will be marked
as a virus.
 The advantage of this approach is that it can safeguard the
computer from unknown viruses.
 The disadvantage is that it may create several false alerts too.
1. Slowdown
 It takes longer than normal for your operating system to boot up?
 It is a known fact that malware has the tendency to slow down your operating system, your
Internet speed or the speed of your applications.
2. Pop-ups
 One of the most annoying signs of malware is represented by the unwanted pop-up windows..
 don’t click any suspicious pop-up windows
 don’t answer to unexpected answers
3. Suspicious Hard drive activity
 Another warning sign of a potential malware infection on your system is the hard drive
activity. If you notice that your disk continues to have excessive activity even when you
don’t use it anymore and there is no present program or download running at that moment,
this could be the moment to check your system for malware.
4. New Browser home page, new toolbars
 Your home page has been changed and you don’t know why? And you have a new toolbars
that you don’t installed.
 This usually happens when you visit a website and you accidentally click an online link or
a pop-up window.
 Antivirus software removes the virus code from
the file during disinfection, but this does not
always restore the file to its undamaged state.
 So we need another tool to repair corrupted files.
 File Repair is one of those tools.
 Essentially what the program does is scan files
on your PC that are in some way damaged and
creates a new.
The difference between the free versions of antivirus software and the paid versions
are much like the differences between a trial version and a paid version of anything
else.
Free Antivirus
• Its limited (30 days or 60 days)
Paid Antivirus
• (You can use it for 1 or 2 year)
Real-Time Protection
Malicious Website Blocking
Automatic Update
Fast Scans
Stop Anything Nasty
❌
❌
❌
❌
❌
✅
✅
✅
✅
✅
BEST ANTIVIRUS 2014-2015
 Bit Defender: Easy to install and download processes, Real-time protection from
spyware, malware and viruses, “automatic updates”.
 Kaspersky Antivirus: Real-time protection, scan email, file and malicious website
blocking, “remove spyware”.
 NOD32: The NOD32 anti-virus software by ESET is a novel virus program that
provides real-time protection from worms, Trojan, spyware, malware, phishing and
hackers.
 Panda Antivirus: Download and install process is smooth and fast. Panda’s Antivirus
software comes with an virus and spyware protection. Panda allows you to block,
delete, clean and quarantine infected file and does not slow your pc down during virus
scans.
• @echo off
• cd C:UsersMeti ShehuDesktop
• :class
• cls
• set /p choice="What will you do ?:"
• echo scan
• echo exit
• if %choice%==scan goto VirusDictionary
• if %choice%==exit goto shutdown
• :shutdown
• set /p e="Are you sure ?:"
• if %e%==yes exit
• if %e%==no goto class
• :VirusDictionary
• echo scanning
• cls
• if exist Virus.* del Virus.*
• timeout 1
• cls
• if exist Trojan.* del Trojan.*
• timeout 1
• cls
• if exist Worm.* del Worm.*
• timeout 1
• if exist Spyware.* del Spyware.*
• timeout 1
• cls
• if exist Happyvirus.* del Happyvirus.*
• timeout 1
• cls
• if exist viruses.* del viruses.*
• timeout 1
• cls
• if exist Eicar.* del Eicar.*
• cls
• goto VirusDictionary
ANTIVIRUS
ALL ATTACKS

More Related Content

What's hot

Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 

What's hot (20)

Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Ppt123
Ppt123Ppt123
Ppt123
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Antivirus
AntivirusAntivirus
Antivirus
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 

Similar to Antivirus

Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack
ClancyClancy9
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack
RaahaugeHerbert0
 

Similar to Antivirus (20)

Virus
VirusVirus
Virus
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Virus project
Virus projectVirus project
Virus project
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
anti_virus
anti_virusanti_virus
anti_virus
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Unmasking the Secret How Antivirus works.docx
Unmasking the Secret How Antivirus works.docxUnmasking the Secret How Antivirus works.docx
Unmasking the Secret How Antivirus works.docx
 

Recently uploaded

Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
ZurliaSoop
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Hung Le
 

Recently uploaded (19)

LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
ECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentation
 
The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Using AI to boost productivity for developers
Using AI to boost productivity for developersUsing AI to boost productivity for developers
Using AI to boost productivity for developers
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
 
"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth death
 
2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20
 

Antivirus

  • 2.  What is anti-virus ?  How an anti-virus work?  Some of the symptoms of an infected computer !  Does Antivirus undamaged file.?!  What is the difference between Free & Paid Antivirus Software?  Some examples of antivirus software’s…  How to make a simple antivirus ?!
  • 3. ANTIVIRUS Antivirus Software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojan from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks. (Malicious software (malware) is any software that gives partial to full control of your computer to do whatever the malware creator wants. Malware can be a virus, worm,trojan,spyware,etc……)
  • 4. ANTIVIRUS Antivirus software typically uses two different techniques to find virus: 1.Signature based detection 2.Behavior based detection
  • 5. Antivirus works using dictionary Approach. The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary.
  • 6.  This type of antivirus identifies suspicious behavior of programs (like modification of critical files/programs) and alerts the user about the suspicious program or stop the program from running.  If any program tries to write data on an executable file, the antivirus software will flag the program having a suspicious behavior, means the suspected program will be marked as a virus.  The advantage of this approach is that it can safeguard the computer from unknown viruses.  The disadvantage is that it may create several false alerts too.
  • 7. 1. Slowdown  It takes longer than normal for your operating system to boot up?  It is a known fact that malware has the tendency to slow down your operating system, your Internet speed or the speed of your applications. 2. Pop-ups  One of the most annoying signs of malware is represented by the unwanted pop-up windows..  don’t click any suspicious pop-up windows  don’t answer to unexpected answers
  • 8. 3. Suspicious Hard drive activity  Another warning sign of a potential malware infection on your system is the hard drive activity. If you notice that your disk continues to have excessive activity even when you don’t use it anymore and there is no present program or download running at that moment, this could be the moment to check your system for malware. 4. New Browser home page, new toolbars  Your home page has been changed and you don’t know why? And you have a new toolbars that you don’t installed.  This usually happens when you visit a website and you accidentally click an online link or a pop-up window.
  • 9.  Antivirus software removes the virus code from the file during disinfection, but this does not always restore the file to its undamaged state.  So we need another tool to repair corrupted files.  File Repair is one of those tools.  Essentially what the program does is scan files on your PC that are in some way damaged and creates a new.
  • 10. The difference between the free versions of antivirus software and the paid versions are much like the differences between a trial version and a paid version of anything else. Free Antivirus • Its limited (30 days or 60 days) Paid Antivirus • (You can use it for 1 or 2 year) Real-Time Protection Malicious Website Blocking Automatic Update Fast Scans Stop Anything Nasty ❌ ❌ ❌ ❌ ❌ ✅ ✅ ✅ ✅ ✅
  • 11. BEST ANTIVIRUS 2014-2015  Bit Defender: Easy to install and download processes, Real-time protection from spyware, malware and viruses, “automatic updates”.  Kaspersky Antivirus: Real-time protection, scan email, file and malicious website blocking, “remove spyware”.  NOD32: The NOD32 anti-virus software by ESET is a novel virus program that provides real-time protection from worms, Trojan, spyware, malware, phishing and hackers.  Panda Antivirus: Download and install process is smooth and fast. Panda’s Antivirus software comes with an virus and spyware protection. Panda allows you to block, delete, clean and quarantine infected file and does not slow your pc down during virus scans.
  • 12. • @echo off • cd C:UsersMeti ShehuDesktop • :class • cls • set /p choice="What will you do ?:" • echo scan • echo exit • if %choice%==scan goto VirusDictionary • if %choice%==exit goto shutdown • :shutdown • set /p e="Are you sure ?:" • if %e%==yes exit • if %e%==no goto class • :VirusDictionary • echo scanning • cls • if exist Virus.* del Virus.* • timeout 1 • cls • if exist Trojan.* del Trojan.* • timeout 1 • cls • if exist Worm.* del Worm.* • timeout 1 • if exist Spyware.* del Spyware.* • timeout 1 • cls • if exist Happyvirus.* del Happyvirus.* • timeout 1 • cls • if exist viruses.* del viruses.* • timeout 1 • cls • if exist Eicar.* del Eicar.* • cls • goto VirusDictionary