SlideShare a Scribd company logo
PRESENTATION
INTRODUCTION TO
COMPUTER VIRUS
 What is computer virus ?
 Types of computer virus?
 What a computer virus do?
 Sources of Computer Virus Attack.
 Prevention from computer virus
 Best antivirus software.
Virus
*A computer virus is a software program with a
ability to make copies of itself ,which attacks
itself to other applications or files.
Types of computer Virus.
 There are three types of computer virus
Boot virus
Program virus
Micro virus
BOOT VIRUS:
 Boot viruses infects the boot records of hard disk and
floppy disks. Generally these are considered more
dangerous than program viruses.
Program Virus
 These viruses infect program files, which have
extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or .SCR.
program files are attractive targets for computer virus
because they are widely used and have relativity, simple
formats to which viruses can attach themselves.
Macro Viruses
 These viruses infects data files. For example, Microsoft
word document and template files are susceptible to
macro virus attacks they spread rapidly as infected
documents are shared on networks or downloaded from
internet sites.
What a computer virus do?
 A virus tries to take control of computer system it has infected
at the first opportunity availible.it makes copies of itself and
also try to carry harmful task written in its program. This
process can happen so quickly that the user is not even
aware of the presence of a virus in his/her computer.
Top 5 Sources of Computer
Virus Attack
The most potent and vulnerable threat of computer users is
virus attacks. Virus attacks hampers important work involved
with data and documents. It is imperative for every computer
user to be aware about the software and programs that can help
to protect the personal computers from attacks. One must take
every possible measure in order to keep the computer systems
free from virus attacks. The top sources of virus attacks are
highlighted below:
Downloadable Programs
Cracked Software
Email Attachments
Internet
Booting From CD
Best antivirus software.
 Norton antivirus.
 MacAfee virus scan
 Kaspersky antivirus
Norton antivirus
 Norton antivirus is a product of Symantec corporation.
Founded in 1982.
 Notion check the following program
• Boot record s
• Programs(at the time you used them)
• All local hard drives,
• Files download from internet,
• Usb(when in use)
MacAfee virus scan
MacAfee, Inc. is an antivirus software and computer security
company headquartered in Santa Clara, California. It markets
McAfee Virus Scan and related security products and
services, including the Intercept, and Found stone brands. ...
Kaspersky ANTIVIRUS
 Kaspersky is product of Kaspersky lab,
 A Russian computer security company,
• Co-founded by Natalya Kaspersky antivirus, do the
following things
• Invites virus scan by opening the Kaspersky antivirus
window.
Computer Virus powerpoint presentation

More Related Content

What's hot

Computer Network
Computer NetworkComputer Network
Computer Network
AkShay Dhola
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Windows operating system presentation
Windows operating system presentationWindows operating system presentation
Windows operating system presentation
MD. ZAWAD FATTAH RAHAT
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Malware ppt
Malware pptMalware ppt
Malware ppt
Faiz Khan
 
Types of network
Types of networkTypes of network
Types of networkishjari
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
FCA - Future Chartered Accountants
 
Functions Of Operating System
Functions Of Operating SystemFunctions Of Operating System
Functions Of Operating System
Dr.Suresh Isave
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
The Internet
The InternetThe Internet
The Internet
Priya Soni
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.
satyamjipatel
 
Presentation on computer
Presentation on computerPresentation on computer
Presentation on computer
Nausad Ahamed
 

What's hot (20)

Computer Network
Computer NetworkComputer Network
Computer Network
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Windows operating system presentation
Windows operating system presentationWindows operating system presentation
Windows operating system presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Operating system
Operating system Operating system
Operating system
 
Types of network
Types of networkTypes of network
Types of network
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Functions Of Operating System
Functions Of Operating SystemFunctions Of Operating System
Functions Of Operating System
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The Internet
The InternetThe Internet
The Internet
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Computer security
Computer securityComputer security
Computer security
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.
 
Presentation on computer
Presentation on computerPresentation on computer
Presentation on computer
 

Viewers also liked

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
eg-353-paper687856
eg-353-paper687856eg-353-paper687856
eg-353-paper687856JOYAL JACOB
 
STEAM NOZZLES
STEAM NOZZLESSTEAM NOZZLES
STEAM NOZZLES
Vanita Thakkar
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarpMohd Arif
 
KNIME tutorial
KNIME tutorialKNIME tutorial
KNIME tutorial
George Papadatos
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcpMohd Arif
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
Mahamudul Hassan Niaz
 
Computer virus
Computer virusComputer virus
Computer virus
Ra Bia
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Gopal Sakarkar
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
garima931
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
ahmad abdelhafeez
 
Network management
Network managementNetwork management
Network managementMohd Arif
 

Viewers also liked (20)

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
eg-353-paper687856
eg-353-paper687856eg-353-paper687856
eg-353-paper687856
 
STEAM NOZZLES
STEAM NOZZLESSTEAM NOZZLES
STEAM NOZZLES
 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
KNIME tutorial
KNIME tutorialKNIME tutorial
KNIME tutorial
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
Network management
Network managementNetwork management
Network management
 

Similar to Computer Virus powerpoint presentation

Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
wargames12
 
COMPUTER VIRUS.pptx
COMPUTER  VIRUS.pptxCOMPUTER  VIRUS.pptx
COMPUTER VIRUS.pptx
DiveshRajpoot
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Neeraj Bhandari
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
Bashdar Rahman
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
Rakibul islam
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
QuratNaeem
 
Virus
Virus  Virus
Virus
safi Ullah
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
BESOR ACADEMY
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 

Similar to Computer Virus powerpoint presentation (20)

Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
COMPUTER VIRUS.pptx
COMPUTER  VIRUS.pptxCOMPUTER  VIRUS.pptx
COMPUTER VIRUS.pptx
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Virus
Virus  Virus
Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 

Recently uploaded

JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 

Recently uploaded (20)

JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 

Computer Virus powerpoint presentation

  • 2.
  • 3.
  • 4. INTRODUCTION TO COMPUTER VIRUS  What is computer virus ?  Types of computer virus?  What a computer virus do?  Sources of Computer Virus Attack.  Prevention from computer virus  Best antivirus software.
  • 5. Virus *A computer virus is a software program with a ability to make copies of itself ,which attacks itself to other applications or files.
  • 6. Types of computer Virus.  There are three types of computer virus Boot virus Program virus Micro virus
  • 7. BOOT VIRUS:  Boot viruses infects the boot records of hard disk and floppy disks. Generally these are considered more dangerous than program viruses.
  • 8. Program Virus  These viruses infect program files, which have extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or .SCR. program files are attractive targets for computer virus because they are widely used and have relativity, simple formats to which viruses can attach themselves.
  • 9. Macro Viruses  These viruses infects data files. For example, Microsoft word document and template files are susceptible to macro virus attacks they spread rapidly as infected documents are shared on networks or downloaded from internet sites.
  • 10. What a computer virus do?  A virus tries to take control of computer system it has infected at the first opportunity availible.it makes copies of itself and also try to carry harmful task written in its program. This process can happen so quickly that the user is not even aware of the presence of a virus in his/her computer.
  • 11. Top 5 Sources of Computer Virus Attack The most potent and vulnerable threat of computer users is virus attacks. Virus attacks hampers important work involved with data and documents. It is imperative for every computer user to be aware about the software and programs that can help to protect the personal computers from attacks. One must take every possible measure in order to keep the computer systems free from virus attacks. The top sources of virus attacks are highlighted below: Downloadable Programs Cracked Software Email Attachments Internet Booting From CD
  • 12. Best antivirus software.  Norton antivirus.  MacAfee virus scan  Kaspersky antivirus
  • 13. Norton antivirus  Norton antivirus is a product of Symantec corporation. Founded in 1982.  Notion check the following program • Boot record s • Programs(at the time you used them) • All local hard drives, • Files download from internet, • Usb(when in use)
  • 14. MacAfee virus scan MacAfee, Inc. is an antivirus software and computer security company headquartered in Santa Clara, California. It markets McAfee Virus Scan and related security products and services, including the Intercept, and Found stone brands. ...
  • 15. Kaspersky ANTIVIRUS  Kaspersky is product of Kaspersky lab,  A Russian computer security company, • Co-founded by Natalya Kaspersky antivirus, do the following things • Invites virus scan by opening the Kaspersky antivirus window.