SlideShare a Scribd company logo
1 of 29
Contents:
 History of virus
 Computer Virus
 Action of Virus
 Types of Virus
 History of Anti-virus
 Anti-virus Software
 What to do on suspecting virus attack
 Types of Antivirus
 Action of Antivirus
 Working of Anti-Virus
 General precautions
History of Virus
 The term ``computer virus'' was formally defined by Fred Cohen in
1983, while he performed academic experiments on a Digital
Equipment Corporation VAX(virtual address extension) system.
 The first computer viruses were developed in the early 1980s.
 The first viruses found in the wild were Apple II viruses, such as Elk
Cloner, which was reported in 1981.
Virus
 Virus (Vital information Resource Under Seize )
 It is a software use to infect a computer. After virus is written it is
integrated with in an essential programmed.
 Once the programmed is executed the virus code is activated and
attacks copies of itself to other programs.
 A common type virus is a boot virus which is stored in the boot
sector of disk if the disk is left in the drive when the machine is
infected with FLOPPY , CD, hard disk expecting to the find the
operating there once the machine is effected the boot virus may
replicate it self on to all the floppies.
What is computer virus?
 Computer virus is nothing but a computer program that can infect
a computer without the knowledge of the person using the system.
 Virus can spread from one system to another when a infected file is
copied or transfer from host to target system.
Action of virus on computer
 Any unwanted activity on the computer is treated as virus/worm
.In actual there are programs and codes written by some computer.
 Virus can cause on computer such as:
1. It may take space on Hard Disk.
2. Opening some programs.
3. Generating some messages.
4. Slow down the computer.
5. Delete your valuable data.
6. Unwanted activity over screen .
7. Crash the hard disk.
8. Unable to boot.
Types of viruses
1. Direct Action Virus:
The main purpose
of this virus is to
replicate and take
action when it is
executed.
2. Resident viruses:
This type of virus
Is a permanent which
dwells in the RAM memory.
3. Overwrite virus:
 virus of this kind is characterized by the fact that it deletes the
information contained in the files that it infects , rendering them
partially or totally.
 The only way to clean a file infected by an overwrite virus is to
delete the file completely , thus losing the original content.
4. Directory virus:
1. Computer virus:
A computer virus attached itself to a program or file enabling it to
spread from one computer to another , leaving infections as it travels
like a human virus.
1.It effects while others can damage your HARDWARE ,
SOFTWARE , or files. Almost all viruses are attached to an
executable file ,which means the viruses may exist on your computer
unless you run.
2.It is important to note that a virus cannot be spread without a human
action to keep it going.
3. People continue the spread of a computer virus , mostly
unknowingly , by sharing infected files e-mail with viruses as
attachment in the e-mail.
2. Worm:
 A worm is similar to a virus and considered to b a sub –class of a
virus . Worms spread from computer to computer , but unlike a
virus , it has the capability to travel without any human action.
 The biggest danger with a worm is its capability to replicate itself
on your system , so rather than your computer sending out a single
worm , it could send out hundred or thousand of copies of itself ,
creating a huge devastating effect.
 Due to the copying nature of a worm and its capability to travel
across networks the end result in most cases is that the worm
consume too much system memory causing web servers , and
individual computers to stop responding.
3. Trojan Horse:
 When a Trojan is activated on your computer , the result can vary.
 Some Trojans are designed to be more annoying than malicious or
they can cause serious damage by deleting files and destroying
information on your system.
 Unlike viruses and worms , Trojans do not reproduce by infecting
other files nor do they self-replicate.
 Latest virus:
Name Type Risk Data Discovers
1. RDN/Generic.bfr!6CCE1B5B719E TROJEN 2/10/2014
2. RDN/Generic.bfr!D5770181F03E TROJEN 2/10/2014
 Fred Cohen, who published one of the first academic papers on
computer viruses in 1984,began to develop strategies for antivirus
software in 1988 that were picked up and continued by later
antivirus software developers. In 1987, he published a
demonstration that there is no algorithm that can perfectly detect all
possible viruses.
 In 1987 the first two Heuristic antivirus utilities were released:
Flushot Plus by Ross Greenberg and Anti4us by Erwin Lanting.
History of Antivirus
Antivirus software
 An antivirus is a computer program that identify and remove
computer viruses and other malicious like worms and Trojans form
an infected computer. Not only this , antivirus software also
protects the computer from further virus attacks.
What to do on suspecting virus attack
 Disconnect the suspected computer system from the internet as
well as from the local network.
 Start the system in safe mode or from the windows boot disk , if it
display any problem in starting .
 Take backup of all data to an external drive.
 Install antivirus software if you do not have it installed .
 Now , download the latest virus definition update from the internet
(do it on a separate system).
 Perform a full system scan.
 Shield Deluxe – Anti-virus & Antispyware
 Spyware Doctor & Antivirus
 F pront Antivirus
 Bit Defender Antivirus Plus
 Ashampo Antivirus
1. Shield Deluxe – Antivirus &
Antispyware
 The shield Deluxe 2009 , powered by Bit Defender award winning
Antivirus engine . It provides advanced proactive protection against
viruses , Spyware attack and identity theft.
 Stay one step ahead of the latest e – Threats while maintaining superior
performance that keeps your PC running smoothly.
 The shield Deluxe is simple to install and set up , while offering
advanced users a range of versatile settings for fine – tuning the
program.
 $29.99 to register
2. Spyware Doctor & Antivirus
 Award – Winning spyware and virus protection to secure your PC.
 Spyware Doctor with Antivirus is a top-rated malware , spyware &
virus removal utility that detects , removes and protects your PC
from thousand of potential spyware , adware , Trojans , viruses ,
key loggers , spybots and tracking threats.
3. F Pront Antivirus
 Tired of clunky AV program the slow down your computer and
constantly interfere with your work or when you send email ?
 F –PROT Antivirus for windows is legendary for their high
security , streamlined efficiency and very low resource
consumption F – PROT for windows runs as good on win XP pro
as it does on Win -98 .
 Many millions have chosen F-PROT world wide.
 F-PROT will keep your computer secure and keep out of your way.
 New Bit Defender Antivirus Plus v 10 intergrates
ANTIVIRUS , ANTISPYWARE , FIREWALL , and
ANTISPAM modules into one comprehensive security
package that protect your personal computer.
5. Ashampo Antivirus:
 Ashampoo Antivirus gives you comprehensive protection against
viruses , worms , Trojans and dialers , but it s so efficient you won
even notice its there
 And its so easy to use that it wont waste any of your valuable time.
Just set it and forget it and get on with more important things.
Anti-virus Action:
1. Attempts to repair the file by removing the virus itself from the
file.
1. Quarantine the file (such that the file remains inaccessible to other
program & it s virus can no longer spread )
2. The antivirus software examine each & every file in a computer &
examines the contain with the virus definition if threat is found
then delete the infected file.
Working of Anti-Virus
General precautions:
 When inserted removable media (floppy drive etc.)
scan the whole device with the antivirus software before opening it.
 If you have internet access , make sure you use internet security
Software.
 Get windows updates.
 Form time to time , update your installed software to their latest
version . (MS office , java , flash player etc. )
 You should have an update antivirus guarding your PC all time.
Virus and antivirus

More Related Content

What's hot

presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
cdebraj16101991
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus
Computer virusComputer virus
Computer virus
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 

Viewers also liked

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
kmtschida
 
Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 

Viewers also liked (18)

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Step by-step how to set up a WordPress.com site
Step by-step how to set up a WordPress.com siteStep by-step how to set up a WordPress.com site
Step by-step how to set up a WordPress.com site
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
The history of virus {c}
The history of virus {c}The history of virus {c}
The history of virus {c}
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Similar to Virus and antivirus

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 

Similar to Virus and antivirus (20)

Virus project
Virus projectVirus project
Virus project
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Virus
VirusVirus
Virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
viruses
virusesviruses
viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 

Recently uploaded

Paint shop management system project report.pdf
Paint shop management system project report.pdfPaint shop management system project report.pdf
Paint shop management system project report.pdf
Kamal Acharya
 
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
MohammadAliNayeem
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
Kamal Acharya
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

internship exam ppt.pptx on embedded system and IOT
internship exam ppt.pptx on embedded system and IOTinternship exam ppt.pptx on embedded system and IOT
internship exam ppt.pptx on embedded system and IOT
 
Paint shop management system project report.pdf
Paint shop management system project report.pdfPaint shop management system project report.pdf
Paint shop management system project report.pdf
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
 
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineLow rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
 
Roushan Kumar Java oracle certificate
Roushan Kumar Java oracle certificate Roushan Kumar Java oracle certificate
Roushan Kumar Java oracle certificate
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
 
Lect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptxLect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptx
 
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdfONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
 
Attraction and Repulsion type Moving Iron Instruments.pptx
Attraction and Repulsion type Moving Iron Instruments.pptxAttraction and Repulsion type Moving Iron Instruments.pptx
Attraction and Repulsion type Moving Iron Instruments.pptx
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
Planetary Gears of automatic transmission of vehicle
Planetary Gears of automatic transmission of vehiclePlanetary Gears of automatic transmission of vehicle
Planetary Gears of automatic transmission of vehicle
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 

Virus and antivirus

  • 1.
  • 2. Contents:  History of virus  Computer Virus  Action of Virus  Types of Virus  History of Anti-virus  Anti-virus Software  What to do on suspecting virus attack  Types of Antivirus  Action of Antivirus  Working of Anti-Virus  General precautions
  • 3. History of Virus  The term ``computer virus'' was formally defined by Fred Cohen in 1983, while he performed academic experiments on a Digital Equipment Corporation VAX(virtual address extension) system.  The first computer viruses were developed in the early 1980s.  The first viruses found in the wild were Apple II viruses, such as Elk Cloner, which was reported in 1981.
  • 4. Virus  Virus (Vital information Resource Under Seize )  It is a software use to infect a computer. After virus is written it is integrated with in an essential programmed.  Once the programmed is executed the virus code is activated and attacks copies of itself to other programs.  A common type virus is a boot virus which is stored in the boot sector of disk if the disk is left in the drive when the machine is infected with FLOPPY , CD, hard disk expecting to the find the operating there once the machine is effected the boot virus may replicate it self on to all the floppies.
  • 5.
  • 6. What is computer virus?  Computer virus is nothing but a computer program that can infect a computer without the knowledge of the person using the system.  Virus can spread from one system to another when a infected file is copied or transfer from host to target system.
  • 7. Action of virus on computer  Any unwanted activity on the computer is treated as virus/worm .In actual there are programs and codes written by some computer.  Virus can cause on computer such as: 1. It may take space on Hard Disk. 2. Opening some programs. 3. Generating some messages. 4. Slow down the computer. 5. Delete your valuable data. 6. Unwanted activity over screen . 7. Crash the hard disk. 8. Unable to boot.
  • 8. Types of viruses 1. Direct Action Virus: The main purpose of this virus is to replicate and take action when it is executed. 2. Resident viruses: This type of virus Is a permanent which dwells in the RAM memory.
  • 9. 3. Overwrite virus:  virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects , rendering them partially or totally.  The only way to clean a file infected by an overwrite virus is to delete the file completely , thus losing the original content.
  • 10. 4. Directory virus: 1. Computer virus: A computer virus attached itself to a program or file enabling it to spread from one computer to another , leaving infections as it travels like a human virus. 1.It effects while others can damage your HARDWARE , SOFTWARE , or files. Almost all viruses are attached to an executable file ,which means the viruses may exist on your computer unless you run. 2.It is important to note that a virus cannot be spread without a human action to keep it going. 3. People continue the spread of a computer virus , mostly unknowingly , by sharing infected files e-mail with viruses as attachment in the e-mail.
  • 11.
  • 12. 2. Worm:  A worm is similar to a virus and considered to b a sub –class of a virus . Worms spread from computer to computer , but unlike a virus , it has the capability to travel without any human action.  The biggest danger with a worm is its capability to replicate itself on your system , so rather than your computer sending out a single worm , it could send out hundred or thousand of copies of itself , creating a huge devastating effect.  Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consume too much system memory causing web servers , and individual computers to stop responding.
  • 13.
  • 14. 3. Trojan Horse:  When a Trojan is activated on your computer , the result can vary.  Some Trojans are designed to be more annoying than malicious or they can cause serious damage by deleting files and destroying information on your system.  Unlike viruses and worms , Trojans do not reproduce by infecting other files nor do they self-replicate.  Latest virus: Name Type Risk Data Discovers 1. RDN/Generic.bfr!6CCE1B5B719E TROJEN 2/10/2014 2. RDN/Generic.bfr!D5770181F03E TROJEN 2/10/2014
  • 15.
  • 16.  Fred Cohen, who published one of the first academic papers on computer viruses in 1984,began to develop strategies for antivirus software in 1988 that were picked up and continued by later antivirus software developers. In 1987, he published a demonstration that there is no algorithm that can perfectly detect all possible viruses.  In 1987 the first two Heuristic antivirus utilities were released: Flushot Plus by Ross Greenberg and Anti4us by Erwin Lanting. History of Antivirus
  • 17. Antivirus software  An antivirus is a computer program that identify and remove computer viruses and other malicious like worms and Trojans form an infected computer. Not only this , antivirus software also protects the computer from further virus attacks.
  • 18.
  • 19. What to do on suspecting virus attack  Disconnect the suspected computer system from the internet as well as from the local network.  Start the system in safe mode or from the windows boot disk , if it display any problem in starting .  Take backup of all data to an external drive.  Install antivirus software if you do not have it installed .  Now , download the latest virus definition update from the internet (do it on a separate system).  Perform a full system scan.
  • 20.  Shield Deluxe – Anti-virus & Antispyware  Spyware Doctor & Antivirus  F pront Antivirus  Bit Defender Antivirus Plus  Ashampo Antivirus
  • 21. 1. Shield Deluxe – Antivirus & Antispyware  The shield Deluxe 2009 , powered by Bit Defender award winning Antivirus engine . It provides advanced proactive protection against viruses , Spyware attack and identity theft.  Stay one step ahead of the latest e – Threats while maintaining superior performance that keeps your PC running smoothly.  The shield Deluxe is simple to install and set up , while offering advanced users a range of versatile settings for fine – tuning the program.  $29.99 to register
  • 22. 2. Spyware Doctor & Antivirus  Award – Winning spyware and virus protection to secure your PC.  Spyware Doctor with Antivirus is a top-rated malware , spyware & virus removal utility that detects , removes and protects your PC from thousand of potential spyware , adware , Trojans , viruses , key loggers , spybots and tracking threats.
  • 23. 3. F Pront Antivirus  Tired of clunky AV program the slow down your computer and constantly interfere with your work or when you send email ?  F –PROT Antivirus for windows is legendary for their high security , streamlined efficiency and very low resource consumption F – PROT for windows runs as good on win XP pro as it does on Win -98 .  Many millions have chosen F-PROT world wide.  F-PROT will keep your computer secure and keep out of your way.
  • 24.  New Bit Defender Antivirus Plus v 10 intergrates ANTIVIRUS , ANTISPYWARE , FIREWALL , and ANTISPAM modules into one comprehensive security package that protect your personal computer.
  • 25. 5. Ashampo Antivirus:  Ashampoo Antivirus gives you comprehensive protection against viruses , worms , Trojans and dialers , but it s so efficient you won even notice its there  And its so easy to use that it wont waste any of your valuable time. Just set it and forget it and get on with more important things.
  • 26. Anti-virus Action: 1. Attempts to repair the file by removing the virus itself from the file. 1. Quarantine the file (such that the file remains inaccessible to other program & it s virus can no longer spread ) 2. The antivirus software examine each & every file in a computer & examines the contain with the virus definition if threat is found then delete the infected file.
  • 28. General precautions:  When inserted removable media (floppy drive etc.) scan the whole device with the antivirus software before opening it.  If you have internet access , make sure you use internet security Software.  Get windows updates.  Form time to time , update your installed software to their latest version . (MS office , java , flash player etc. )  You should have an update antivirus guarding your PC all time.