SlideShare a Scribd company logo
1 of 13
BY: Prabesh Shrestha
 It is the program which infects and
potentially damage the files in the computer
that receives it.
 It replicates and spreads by attaching itself
to other programs.
 A simple virus can make a copy of itself over
and over again.
 To take control of a computer and use it for
specific tasks
 To steal sensitive information (credit card
numbers, passwords, personal details, data
etc.)
 To prove that it can be done, to prove ones
skill
 For revenge purposes
 To cripple a computer or network
 For fun
 To earn fast money using malware
 From infected email attachments
 Downloading infected program from the
internet
 Using infected pen drives, CD, DVD etc.
 Transferring infected program over the
network and running it.
 Using pirated and illegal programs and
installing it into the computer
 Not having any updated antivirus programs to
control the virus infection
 Applications take longer time to load or may not
work at all
 Getting unusual error messages like Write Protect
Error
 Computer gets slow, freezes and crash some times.
 Important files or folders get changed or deleted
for no reason
 File size changes
 An increase in the number of files on the system
when nothing has been added
 Reformatting the hard disk
 Strange movements or patterns are seen on the
computer screen
 Use software from original CD or DVD.
 Do not use any pirated software as they may
contain virus.
 Use updated antivirus program.
 Always scan the downloaded files before
using them.
 Scan e-mail attachments before executing
them
 Do not use the removable disk such as pen
drives, floppy before scanning for virus
 Do not open any unknown and suspicious
websites or links.
1) Boot Sector Virus
 It infects the first sector i.e. boot sector of the
hard disk or floppy disk.
 It can also infect MBR (Master Boot Record)
 It changes the instructions stored in the boot
sector
 It prevents the computer to turn on
 It works when we turn on or restart the
computer
 Eg: Disk Killer, Michelangelo, Stoned, Bouncing
Ball
2) File Infecting Virus
 It infects the executable files having .exe,
.com, .drv, .sys, .ovl, .dll as extension name.
 It changes the contents of executable files.
 It replicates itself and infects files on the disk.
 It is spread by removable disks, through
network etc.
 It is easy to be detected because it changes the
size of the file.
 Eg: Friday the 13th, Enigma, Nemesis, Cascade
etc.
 It is a program designed to detect and
remove viruses from the computer system.
 It scans hard disk, removable disks, CD, DVD
etc.
 It needs to be updated regularly or from time
to time to ensure the smooth running of the
computer system.
 Eg: Norton antivirus, AVG, Kaspersky, Avast,
Avira, NOD32, Panda etc.
 It is a program that hides its purpose — it
claims to do one thing but really does
another
 It contains malicious or harmful codes which
can control and cause damage such as ruining
File Allocation Table(FAT) on hard disk.
 It is a malicious program which gets
transmitted by computer networks.
 Once it is installed it generates additional
email messages containing copies of the
worm.

More Related Content

What's hot

MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)ainizbahari97
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus tayyaba rashid
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Chapter 1
Chapter 1Chapter 1
Chapter 1lopjuan
 

What's hot (20)

MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
 
Virus
VirusVirus
Virus
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 
Computer virus
Computer virusComputer virus
Computer virus
 
541networking
541networking541networking
541networking
 
541networking
541networking541networking
541networking
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 

Similar to Computer viruses

Similar to Computer viruses (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Viruses
VirusesViruses
Viruses
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Binisha.pptx
Binisha.pptxBinisha.pptx
Binisha.pptx
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computervirus
Computervirus Computervirus
Computervirus
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Computer virus
Computer virusComputer virus
Computer virus
 
viruses
virusesviruses
viruses
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Virus project
Virus projectVirus project
Virus project
 

More from Prabesh Shrestha

More from Prabesh Shrestha (8)

Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Types of computers
Types of computersTypes of computers
Types of computers
 
Business law
Business lawBusiness law
Business law
 
nature and importance of law of contract
nature and importance of law of contractnature and importance of law of contract
nature and importance of law of contract
 
The shapes of computer today
The shapes of computer todayThe shapes of computer today
The shapes of computer today
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Email
EmailEmail
Email
 
Generation of computers
Generation of computersGeneration of computers
Generation of computers
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Computer viruses

  • 2.
  • 3.  It is the program which infects and potentially damage the files in the computer that receives it.  It replicates and spreads by attaching itself to other programs.  A simple virus can make a copy of itself over and over again.
  • 4.  To take control of a computer and use it for specific tasks  To steal sensitive information (credit card numbers, passwords, personal details, data etc.)  To prove that it can be done, to prove ones skill  For revenge purposes  To cripple a computer or network  For fun  To earn fast money using malware
  • 5.  From infected email attachments  Downloading infected program from the internet  Using infected pen drives, CD, DVD etc.  Transferring infected program over the network and running it.  Using pirated and illegal programs and installing it into the computer  Not having any updated antivirus programs to control the virus infection
  • 6.  Applications take longer time to load or may not work at all  Getting unusual error messages like Write Protect Error  Computer gets slow, freezes and crash some times.  Important files or folders get changed or deleted for no reason  File size changes  An increase in the number of files on the system when nothing has been added  Reformatting the hard disk  Strange movements or patterns are seen on the computer screen
  • 7.  Use software from original CD or DVD.  Do not use any pirated software as they may contain virus.  Use updated antivirus program.  Always scan the downloaded files before using them.  Scan e-mail attachments before executing them  Do not use the removable disk such as pen drives, floppy before scanning for virus  Do not open any unknown and suspicious websites or links.
  • 8. 1) Boot Sector Virus  It infects the first sector i.e. boot sector of the hard disk or floppy disk.  It can also infect MBR (Master Boot Record)  It changes the instructions stored in the boot sector  It prevents the computer to turn on  It works when we turn on or restart the computer  Eg: Disk Killer, Michelangelo, Stoned, Bouncing Ball
  • 9. 2) File Infecting Virus  It infects the executable files having .exe, .com, .drv, .sys, .ovl, .dll as extension name.  It changes the contents of executable files.  It replicates itself and infects files on the disk.  It is spread by removable disks, through network etc.  It is easy to be detected because it changes the size of the file.  Eg: Friday the 13th, Enigma, Nemesis, Cascade etc.
  • 10.  It is a program designed to detect and remove viruses from the computer system.  It scans hard disk, removable disks, CD, DVD etc.  It needs to be updated regularly or from time to time to ensure the smooth running of the computer system.  Eg: Norton antivirus, AVG, Kaspersky, Avast, Avira, NOD32, Panda etc.
  • 11.  It is a program that hides its purpose — it claims to do one thing but really does another  It contains malicious or harmful codes which can control and cause damage such as ruining File Allocation Table(FAT) on hard disk.
  • 12.
  • 13.  It is a malicious program which gets transmitted by computer networks.  Once it is installed it generates additional email messages containing copies of the worm.