SlideShare a Scribd company logo
1 of 15
Software
Lecture #4
What is Software
Def#1
• Software is a set of instruction that use to
operates various kind of program.
Def#2
• Software is a generic term for organized
collections of computer data and instructions.
Types of software
It is divided in to two major categories:
• System software that provides the basic non-
task-specific functions of the computer.
• Application software which is used by users to
accomplish specific tasks.
System software
• Stem software is responsible for controlling,
integrating, and managing the individual
hardware components of a computer system.
• Generally, system software consists of an
operating system and some fundamental
utilities such as disk formatters, file managers,
display managers, user authentication (login)
and management tools, and networking and
device control software.
Operating System
• A program that acts as an intermediary
between a user of a computer and the
computer hardware.
Operating system goals:
– Execute user programs and make solving user
problems easier.
– Make the computer system convenient to use.
Operating system Examples:
Linux, Unix, XP ,Windows 7 ,Windows 8.
Device drivers
• Device Driver or Software Driver is a computer
program allowing an external extended mother board
components to interact with computer system.
Because of the diversity of modern update hardware
and operating systems, drivers operate in many
different environments. Drivers may interface with;
• Printer
• Scanner
• Sound card
• VGA card
• Network card. Etc….
Application software
• Application Software run under System Software , and are made to
do a specific task i.e ( Word Processing etc) , which have indirect
access to the hardware (i.e Behind System Software) .
Examples :
Web browser, word processing software, spreadsheet software,
database software, presentation graphics software.
• Opera (Web Browser)
• Microsoft Word (Word Processing)
• Microsoft Excel (Spreadsheet software)
• MySQL (Database Software)
• Microsoft Powerpoint (Presentation Software)
• iTunes (Music / Sound Software)
• VLC Media Player (Audio / Video Software )
• World of Warcraft (Game Software)
• Adobe Photoshop (Graphics Software)
Utilities
• Utility software is a kind of system software designed to help
analyze, configure, optimize and maintain the computer. A single
piece of utility software is usually called a utility or tool. Utility
software should be contrasted with application software, which
allows users to do things like creating text documents, playing
games.
Utility software :
• Antivirus(MC cafee)
• Data compression software (win RAR)
• Disk partitioning
• Backup
• Memory testers
• Network utilities .Etc…
Software can be purchased or acquired as:
• Shareware:
– Usually intended for sale after a trial period.
• Freeware:
– Free software but with copyright restrictions .
• Licenses:
A software is a legal instrument (usually by way of contract
law) governing the usage or redistribution of software. All
software is copyright protected, except material in the public
domain
• Key Generator
A license or product key generator (keygen) is a computer
program that generates a product licensing key, serial number,
or some other registration information necessary to activate for
use a software application
Virus
• A computer virus is a computer program that can replicate
itself and spread from one computer to another. The term
"virus" is also commonly but misused to refer to other
types of malware, including but not limited to adware and
spyware programs that do not have the reproductive
ability. A true virus can spread from one computer to
another (in some form of executable code) when its host is
taken to the target computer; for instance because a user
sent it over a network or the Internet, or carried it on a
removable medium such as a floppy disk, CD, DVD, or USB
drive.
Types of Virus
• Not all computer viruses behave, replicate, or infect
the same way. There are several different categories
of viruses and malware. Below I list and discuss some
of the most common types of computer viruses.
Trojan Horse
• Trojan Horse:
A Trojan horse program has the appearance of having a useful and desired
function. While it may advertise its activity after launching, this
information is not apparent to the user beforehand. Secretly the program
performs other, undesired functions. A Trojan Horse neither replicates nor
copies itself, but causes damage or compromises the security of the
computer. A Trojan Horse must be sent by someone or carried by another
program and may arrive in the form of a joke program or software of some
sort. The malicious functionality of a Trojan Horse may be anything
undesirable for a computer user, including data destruction or
compromising a system by providing a means for another computer to
gain access, thus bypassing normal access controls.
Worms
• Worms:
A worm is a program that makes and facilitates the
distribution of copies of itself; for example, from one
disk drive to another, or by copying itself using email
or another transport mechanism. The worm may do
damage and compromise the security of the
computer. It may arrive via exploitation of a system
vulnerability or by clicking on an infected e-mail.
Types of virus continued ……
• Bootsector Virus:
A virus which attaches itself to the first part of the hard disk that is
read by the computer upon bootup. These are normally spread by
floppy disks.
Macro Virus:
Macro viruses are viruses that use another application's macro
programming language to distribute themselves. They infect
documents such as MS Word or MS Excel and are typically spread to
other similar documents.
Memory Resident Viruses:
Memory Resident Viruses reside in a computers volitale memory
(RAM). They are initiated from a virus which runs on the computer and
they stay in memory after it's initiating program closes.
Types of virus continued ……
• Rootkit Virus:
A rootkit virus is an undetectable virus which attempts to allow someone
to gain control of a computer system. The term rootkit comes from the
linux administrator root user. These viruses are usually installed by trojans
and are normally disguised as operating system files.
Polymorphic Viruses:
A polymorphic virus not only replicates itself by creating multiple files of
itself, but it also changes it's digital signature every time it replicates. This
makes it difficult for less sophisticated antivirus software to detect.
Logic Bombs/Time Bombs:
These are viruses which are programmed to initiate at a specific date or
when a specific event occurs. Some examples are a virus which deletes
your photos on Halloween, or a virus which deletes a database table if a
certain employee gets fired.

More Related Content

What's hot

Kinds of Computer software
Kinds of  Computer softwareKinds of  Computer software
Kinds of Computer softwareMyra Juan
 
Utility software
Utility softwareUtility software
Utility softwareadeang47
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trendsAthena Catindig
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software Ankit Sangwan
 
Computer software (Introduction to OS)
Computer software (Introduction to OS)Computer software (Introduction to OS)
Computer software (Introduction to OS)Miz Malinz
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
System software and operating system
System software and operating systemSystem software and operating system
System software and operating systemdhruv bhandari
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system softwareSandhiya Ramesh
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application softwareSowmini Gowda
 

What's hot (20)

Kinds of Computer software
Kinds of  Computer softwareKinds of  Computer software
Kinds of Computer software
 
Utility software
Utility softwareUtility software
Utility software
 
Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and Antivirus
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
Computer software (Introduction to OS)
Computer software (Introduction to OS)Computer software (Introduction to OS)
Computer software (Introduction to OS)
 
Presentation on computer software
Presentation on computer softwarePresentation on computer software
Presentation on computer software
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
Types of software
Types of softwareTypes of software
Types of software
 
Utility programs
Utility programsUtility programs
Utility programs
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
System software and operating system
System software and operating systemSystem software and operating system
System software and operating system
 
Types of software
Types of softwareTypes of software
Types of software
 
Computer software
Computer softwareComputer software
Computer software
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system software
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application software
 

Similar to Introduction to computer lec (4)

Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentationPranjal Mishra
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their typesNeha Kurale
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer softwareElike Ikechukwu
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 

Similar to Introduction to computer lec (4) (20)

Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
B) Computer Basics
B) Computer BasicsB) Computer Basics
B) Computer Basics
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
system Security
system Security system Security
system Security
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
 
Presentation2
Presentation2Presentation2
Presentation2
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Malicious
MaliciousMalicious
Malicious
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 

Recently uploaded

Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 

Recently uploaded (20)

Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 

Introduction to computer lec (4)

  • 2. What is Software Def#1 • Software is a set of instruction that use to operates various kind of program. Def#2 • Software is a generic term for organized collections of computer data and instructions.
  • 3. Types of software It is divided in to two major categories: • System software that provides the basic non- task-specific functions of the computer. • Application software which is used by users to accomplish specific tasks.
  • 4. System software • Stem software is responsible for controlling, integrating, and managing the individual hardware components of a computer system. • Generally, system software consists of an operating system and some fundamental utilities such as disk formatters, file managers, display managers, user authentication (login) and management tools, and networking and device control software.
  • 5. Operating System • A program that acts as an intermediary between a user of a computer and the computer hardware. Operating system goals: – Execute user programs and make solving user problems easier. – Make the computer system convenient to use. Operating system Examples: Linux, Unix, XP ,Windows 7 ,Windows 8.
  • 6. Device drivers • Device Driver or Software Driver is a computer program allowing an external extended mother board components to interact with computer system. Because of the diversity of modern update hardware and operating systems, drivers operate in many different environments. Drivers may interface with; • Printer • Scanner • Sound card • VGA card • Network card. Etc….
  • 7. Application software • Application Software run under System Software , and are made to do a specific task i.e ( Word Processing etc) , which have indirect access to the hardware (i.e Behind System Software) . Examples : Web browser, word processing software, spreadsheet software, database software, presentation graphics software. • Opera (Web Browser) • Microsoft Word (Word Processing) • Microsoft Excel (Spreadsheet software) • MySQL (Database Software) • Microsoft Powerpoint (Presentation Software) • iTunes (Music / Sound Software) • VLC Media Player (Audio / Video Software ) • World of Warcraft (Game Software) • Adobe Photoshop (Graphics Software)
  • 8. Utilities • Utility software is a kind of system software designed to help analyze, configure, optimize and maintain the computer. A single piece of utility software is usually called a utility or tool. Utility software should be contrasted with application software, which allows users to do things like creating text documents, playing games. Utility software : • Antivirus(MC cafee) • Data compression software (win RAR) • Disk partitioning • Backup • Memory testers • Network utilities .Etc…
  • 9. Software can be purchased or acquired as: • Shareware: – Usually intended for sale after a trial period. • Freeware: – Free software but with copyright restrictions . • Licenses: A software is a legal instrument (usually by way of contract law) governing the usage or redistribution of software. All software is copyright protected, except material in the public domain • Key Generator A license or product key generator (keygen) is a computer program that generates a product licensing key, serial number, or some other registration information necessary to activate for use a software application
  • 10. Virus • A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but misused to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
  • 11. Types of Virus • Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Below I list and discuss some of the most common types of computer viruses.
  • 12. Trojan Horse • Trojan Horse: A Trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.
  • 13. Worms • Worms: A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.
  • 14. Types of virus continued …… • Bootsector Virus: A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks. Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.
  • 15. Types of virus continued …… • Rootkit Virus: A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files. Polymorphic Viruses: A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect. Logic Bombs/Time Bombs: These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.