SlideShare a Scribd company logo
1 of 22
Download to read offline
Computer Virus
BY:
Sarhad Baez
Out line
• WHAT IS A COMPUTER VIRUS
• TYPES OF COMPUTER VIRUS
• HOW TO KNOW YOUR PC HAS A VIRUS
• HOW DOES A COMPUTER GET INFECT WITH
A VIRUS
• WHAT IS ANTI-VIRUS
• BEST ANTI-VIRUS SOFTWARE
• SUMMARY
• REFRENCE
What is a computer virus
• It is a computer program that can copy itself and infect a
computer without permission or knowledge of the user.
• It is a piece of code that is secretly introduced into a
system in order to corrupt it or destroy data.
• A program which can be transmitted between computers
via networks (especially the internet ) or removable
storage such as CDs, USB drives, floppy disk etc.
TYPES OF COMPUTER VIRUS
• Boot viruses
• Program viruses
• Multipartite viruses
• Stealth viruses
• Polymorphic viruses
• Macro Viruses
Boot viruses
These viruses infect floppy disk boot records in hard
disks. They replace the boot record program (which is
responsible for loading the operating system in
memory) copying it elsewhere on the disk or
overwriting it. Boot viruses load into memory if the
computer tries to read the disk while it is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone
virus
Program viruses
These infect executable program files, such as those
with extensions like .BIN, .COM, .EXE, .OVL, .DRV
(driver) and .SYS (device driver). These programs are
loaded in memory during execution, taking the virus
with them. The virus becomes active in memory,
making copies of itself and infecting files on disk.
Examples: Sunday, Cascade.
Multipartite viruses
A hybrid of Boot and Program viruses. They infect
program files and when the infected program is
executed, these viruses infect the boot record. When
you boot the computer next time the virus from the
boot record loads in memory and then starts infecting
other program files on disk.
Examples: Invader, Flip, and Tequila
Stealth viruses
These viruses use certain techniques to avoid detection.
They may either redirect the disk head to read another
sector instead of the one in which they reside or they may
alter the reading of the infected file’s size shown in the
directory listing. For instance, the Whale virus adds 9216
bytes to an infected file; then the virus subtracts the same
number of bytes (9216) from the size given in the directory.
Examples: Frodo, Joshi, Whale
Polymorphic viruses
A virus that can encrypt its code in different ways so
that it appears differently in each infection. These
viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix,
Evil, Proud, Virus 101
Macro Viruses
A macro virus is a new type of computer virus that infects the
macros within a document or template. When you open a word
processing or spreadsheet document, the macro virus is activated
and it infects the Normal template (Normal.dot)-a general
purpose file that stores default document formatting settings.
Every document you open refers to the Normal template, and
hence gets infected with the macro virus. Since this virus attaches
itself to documents, the infection can spread if such documents
are opened on other computers.
Examples: DMV, Nuclear, Word Concept.
How does a computer get infected with
a virus
• Downloading any infected software
• Opening e-mail attachments
• Connecting an infected disk, disc, or drive
• Online Ads
• Visiting unknown links
Downloading any infected software
When downloading any software via the Internet, make
sure you're downloading the software from a reliable
source. Be sure to run your downloads through your
antivirus and spyware scanners upon completion.
As we stated in a previous section, during the
installation process, read all prompts about what the
program is installing on your computer.
Opening e-mail attachments
As a general rule, do not open e-mail you were not
expecting to receive. Computers can become infected when
users open e-mail attachments that contain malicious code.
Even if the message is from a co-worker, friend, or family
member, always use caution before opening a link or
downloading an attachment.
Connecting an infected disk or drive
Any disk, or thumb drive connected or inserted into your
computer can be infected with a virus. As long as something
is writable, a virus can move from a computer to that disk,
disc, or drive. A common tactic used by hackers to gain
access to a network is by leaving out a thumb drive with
malicious code on it. Then, when a user puts the thumb
drive into their computer, it becomes infected with a virus.
Online Ads
Malicious online ads, also known as Advertising, is just
another way your computer can get a virus without any
realization or traceable evidence. Criminals often place
clean ads on trusted websites and leave them in place
for a while to gain credibility. After some time passes
they put a malicious code in the ad that infects your
computer when clicked on.
Visiting unknown links
It is possible for anyone to create a website and if a
malicious person has designed the website it could give
them access to your computer, send malicious files, or
obtain sensitive information about your computer.
Always be cautious and suspicious of any link sent to
you over chat, e-mail, or SMS.
How to know your pc has a virus
• Unexpected pop-up windows
• Slow start up and slow performance
• Suspicious hard drive activity
• Lack of storage space
• Missing files
How to know your pc has a virus
• Crashes and error messages
• High network activity
• Email is hijacked
• Browser woes
• Security attacks
What is anti-virus
Anti-virus software is a program or set of programs that
are designed to prevent, search for, detect, and remove
software viruses, and other malicious software.
Best anti-virus software
• BitDefender Antivirus Plus
• ESET NOD32 Antivirus
• F-Secure Antivirus SAFE
• Kaspersky Anti-Virus
• Norton AntiVirus Basic
• Panda Antivirus Pro
• Trend Micro Antivirus+ Security
• Webroot SecureAnywhere AntiVirus
Reference
• https://www.webroot.com/in/en/home/resources/t
ips/pc-security/security-what-is-anti-virus-
software
• Kizza, Joseph M. (2009). Guide to Comaputer
Network Security. Springer.
Computer virus

More Related Content

What's hot (20)

Malware
MalwareMalware
Malware
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Malware
MalwareMalware
Malware
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 

Similar to Computer virus

Similar to Computer virus (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
information about virus
information about virusinformation about virus
information about virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harm
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Computer virus

  • 2. Out line • WHAT IS A COMPUTER VIRUS • TYPES OF COMPUTER VIRUS • HOW TO KNOW YOUR PC HAS A VIRUS • HOW DOES A COMPUTER GET INFECT WITH A VIRUS • WHAT IS ANTI-VIRUS • BEST ANTI-VIRUS SOFTWARE • SUMMARY • REFRENCE
  • 3. What is a computer virus • It is a computer program that can copy itself and infect a computer without permission or knowledge of the user. • It is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. • A program which can be transmitted between computers via networks (especially the internet ) or removable storage such as CDs, USB drives, floppy disk etc.
  • 4. TYPES OF COMPUTER VIRUS • Boot viruses • Program viruses • Multipartite viruses • Stealth viruses • Polymorphic viruses • Macro Viruses
  • 5. Boot viruses These viruses infect floppy disk boot records in hard disks. They replace the boot record program (which is responsible for loading the operating system in memory) copying it elsewhere on the disk or overwriting it. Boot viruses load into memory if the computer tries to read the disk while it is booting. Examples: Form, Disk Killer, Michelangelo, and Stone virus
  • 6. Program viruses These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk. Examples: Sunday, Cascade.
  • 7. Multipartite viruses A hybrid of Boot and Program viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then starts infecting other program files on disk. Examples: Invader, Flip, and Tequila
  • 8. Stealth viruses These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For instance, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory. Examples: Frodo, Joshi, Whale
  • 9. Polymorphic viruses A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect. Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
  • 10. Macro Viruses A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spreadsheet document, the macro virus is activated and it infects the Normal template (Normal.dot)-a general purpose file that stores default document formatting settings. Every document you open refers to the Normal template, and hence gets infected with the macro virus. Since this virus attaches itself to documents, the infection can spread if such documents are opened on other computers. Examples: DMV, Nuclear, Word Concept.
  • 11. How does a computer get infected with a virus • Downloading any infected software • Opening e-mail attachments • Connecting an infected disk, disc, or drive • Online Ads • Visiting unknown links
  • 12. Downloading any infected software When downloading any software via the Internet, make sure you're downloading the software from a reliable source. Be sure to run your downloads through your antivirus and spyware scanners upon completion. As we stated in a previous section, during the installation process, read all prompts about what the program is installing on your computer.
  • 13. Opening e-mail attachments As a general rule, do not open e-mail you were not expecting to receive. Computers can become infected when users open e-mail attachments that contain malicious code. Even if the message is from a co-worker, friend, or family member, always use caution before opening a link or downloading an attachment.
  • 14. Connecting an infected disk or drive Any disk, or thumb drive connected or inserted into your computer can be infected with a virus. As long as something is writable, a virus can move from a computer to that disk, disc, or drive. A common tactic used by hackers to gain access to a network is by leaving out a thumb drive with malicious code on it. Then, when a user puts the thumb drive into their computer, it becomes infected with a virus.
  • 15. Online Ads Malicious online ads, also known as Advertising, is just another way your computer can get a virus without any realization or traceable evidence. Criminals often place clean ads on trusted websites and leave them in place for a while to gain credibility. After some time passes they put a malicious code in the ad that infects your computer when clicked on.
  • 16. Visiting unknown links It is possible for anyone to create a website and if a malicious person has designed the website it could give them access to your computer, send malicious files, or obtain sensitive information about your computer. Always be cautious and suspicious of any link sent to you over chat, e-mail, or SMS.
  • 17. How to know your pc has a virus • Unexpected pop-up windows • Slow start up and slow performance • Suspicious hard drive activity • Lack of storage space • Missing files
  • 18. How to know your pc has a virus • Crashes and error messages • High network activity • Email is hijacked • Browser woes • Security attacks
  • 19. What is anti-virus Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software.
  • 20. Best anti-virus software • BitDefender Antivirus Plus • ESET NOD32 Antivirus • F-Secure Antivirus SAFE • Kaspersky Anti-Virus • Norton AntiVirus Basic • Panda Antivirus Pro • Trend Micro Antivirus+ Security • Webroot SecureAnywhere AntiVirus