SlideShare a Scribd company logo
1 of 26
SUBMITTED TO –
VINEET KATHURIA
SUBMITTED BY –
SHUBHAM VERMA
97 ITT BATCH
REG. NO. –
CRO0564909
WHAT IS COMPUTER VIRUS?
• Computer viruses are a type of software program that, like a
biological virus, reproduces and spreads itself
• Some virus may display only a message on the screen, others may
slow down the Pc
• They can also erase files or even format your floppy or hard disk
and crash the system.
WHO CREATES/WRITES VIRUSES ?
INFO ATTACKERS PROFIT EARNER
 VIRUS / ANTIVIRUS
MARKET
 PSYCHO CASES
 FOR FUN
 TO TAKE REVENG
 RELEASE ANGER
TYPE OF VIRUSES
• There are about millions of viruses present & daily 6 to 7 new viruses
are found
• The following are some types of viruses:
Boot sector Virus Program/ File Infector
Trojan Horses Worms, Macro Virus
Polymorphic Virus Companion Virus
FAT Virus Logic Bombs
Spyware Adware
Multipartite virus Stealth virus etc.
MAJOR TYPES OF VIRUSES
VIRUS
Worms
Program/
File
Infector
Macro
Viruses
Trojan
Horses
Boot
Sector
Virus
BOOT SECTOR VIRUS
•The boot Sector virus affects the
booting process of the infected
computer system, thus causing slow
start up and shut down process
PROGRAM / FILE INFECTOR VIRUS
• Becomes active when the
program file carrying the virus is
opened.
• A file-infecting virus overwrites
code or inserts infected code into
a executable file
• usually with below extensions
.BIN .COM
.EXE .OVL
.DRV
WORMS
• A computer worm is a self-replicating computer program.
• It uses a network to send copies of itself to other nodes
(computer terminals on the network) and it may do so without
any user intervention.
• Unlike a virus, it does not need to attach itself to an existing
program. Worms always harm the network (if only by
consuming bandwidth), whereas viruses always infect or
corrupt files on a targeted computer.
Worm Propagation
Leverage: Network Connectivity
MACRO VIRUS
• These type of virus
infects word , excel,
PowerPoint, access
and other data files.
Once infected
repairing of these files
is very much difficult.
TROJAN HORSES
•A Trojan horse is a program that unlike a
virus contains or installs a malicious program
(sometimes called the payload or 'trojan').
• The term is derived from the classical myth
of the Trojan Horse.
• Trojan horses may appear to be useful or
interesting programs to an unsuspecting user,
but are actually harmful when executed.
• The famous usage in hacking.
TROJAN
SOME EXAMPLES OF VIRUSES
Boot Sector Virus
Form
Disk Killer
Michelangelo
Stone virus
 Program / File Infector Virus
 Cascade
 Sunday
 Worms
 ILOVEYOU
 Code Red
 Melissa
 Storm Worm
 Macro Virus
 DMV
 Nuclear
 Word Concept
 Melissa Worm.
 Trojan Horses
 Vundo
 Zeus Trojan
THE FUNCTIONAL LOGIC OF A VIRUS
 Search for a file to infect.
 Open the file to see if it is infected.
 If infected, search for another file.
 Else, infect the file.
 Return control to the host program.
VIRUS
V
Virus – Needs a host
Virus Propagation
Leverage : User Connectivity
CAUSES AND EFFECTS OF COMPUTER
VIRUSES
• Computer viruses spread by attaching themselves to the other
computer program files(usually .exe, .com, .bat, .dll, )
• A computer virus may be hidden or protected from the users
eye
• These viruses spread through infected files in Floppy, Cd, Usb
pen drive & internet
• Computer viruses can infect the program and it may lead to loss of
important data
• These viruses are transfers to our data through any floppy or cd
• If any infected file is copy in your system then it will infect the other
files and function too
CURE OF COMPUTER VIRUSES
PREVENTION & CURE OF
COMPUTER VIRUSES
• Since virus can cause extensive effect to your important
files,possible steps must be take to prevent attack on your pc
• If you use floppy disk to boot your pc then write protect it
• Make backups of your impotent files in floppy or cd and keep
it in a safe place you will need it later
• Install an Antivirus software
• Regularly update the program
• Open email attachment files only if you are expecting the
attached files, or the sender is known and has confirmed
sending the file
• Try to avoid downloading and installing software from the
Internet
• Install only registered copies of software on the system
ANTI-VIRUS
WHAT IS AN ANTI-VIRUS?
• Anti-virus is a software (computer program)
that scans files or your computer's memory
for certain patterns that may indicate an
infection.
• The patterns it looks for are based on the
signatures, or fingerprints, of known viruses.
computer programs intended to Identify
and Eliminate Computer Viruses.
SOME ANTI-VIRUSES SOFTWARE
CONCLUSION
• I think we should not use the pc without any antivirus security
as it may cause damage to our important data
• Do not copy or transfer any data or file without scanning the
disk.
ANY QUESTIONS ?
Computer virus & its cure

More Related Content

What's hot (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus
virusvirus
virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Malicious
MaliciousMalicious
Malicious
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
The Giant Black Book Of Computer Viruses
The Giant Black Book Of Computer VirusesThe Giant Black Book Of Computer Viruses
The Giant Black Book Of Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 

Similar to Computer virus & its cure

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | ExplainationBipulok
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prezStudio Sheen
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their typesNeha Kurale
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 

Similar to Computer virus & its cure (20)

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
Computer virus
Computer virusComputer virus
Computer virus
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prez
 
information about virus
information about virusinformation about virus
information about virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 

Recently uploaded

Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 

Recently uploaded (20)

Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 

Computer virus & its cure

  • 1. SUBMITTED TO – VINEET KATHURIA SUBMITTED BY – SHUBHAM VERMA 97 ITT BATCH REG. NO. – CRO0564909
  • 2. WHAT IS COMPUTER VIRUS? • Computer viruses are a type of software program that, like a biological virus, reproduces and spreads itself • Some virus may display only a message on the screen, others may slow down the Pc • They can also erase files or even format your floppy or hard disk and crash the system.
  • 3. WHO CREATES/WRITES VIRUSES ? INFO ATTACKERS PROFIT EARNER  VIRUS / ANTIVIRUS MARKET  PSYCHO CASES  FOR FUN  TO TAKE REVENG  RELEASE ANGER
  • 4. TYPE OF VIRUSES • There are about millions of viruses present & daily 6 to 7 new viruses are found • The following are some types of viruses: Boot sector Virus Program/ File Infector Trojan Horses Worms, Macro Virus Polymorphic Virus Companion Virus FAT Virus Logic Bombs Spyware Adware Multipartite virus Stealth virus etc.
  • 5. MAJOR TYPES OF VIRUSES VIRUS Worms Program/ File Infector Macro Viruses Trojan Horses Boot Sector Virus
  • 6. BOOT SECTOR VIRUS •The boot Sector virus affects the booting process of the infected computer system, thus causing slow start up and shut down process
  • 7. PROGRAM / FILE INFECTOR VIRUS • Becomes active when the program file carrying the virus is opened. • A file-infecting virus overwrites code or inserts infected code into a executable file • usually with below extensions .BIN .COM .EXE .OVL .DRV
  • 8. WORMS • A computer worm is a self-replicating computer program. • It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. • Unlike a virus, it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.
  • 10. MACRO VIRUS • These type of virus infects word , excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.
  • 11. TROJAN HORSES •A Trojan horse is a program that unlike a virus contains or installs a malicious program (sometimes called the payload or 'trojan'). • The term is derived from the classical myth of the Trojan Horse. • Trojan horses may appear to be useful or interesting programs to an unsuspecting user, but are actually harmful when executed. • The famous usage in hacking.
  • 13. SOME EXAMPLES OF VIRUSES Boot Sector Virus Form Disk Killer Michelangelo Stone virus  Program / File Infector Virus  Cascade  Sunday  Worms  ILOVEYOU  Code Red  Melissa  Storm Worm  Macro Virus  DMV  Nuclear  Word Concept  Melissa Worm.  Trojan Horses  Vundo  Zeus Trojan
  • 14. THE FUNCTIONAL LOGIC OF A VIRUS  Search for a file to infect.  Open the file to see if it is infected.  If infected, search for another file.  Else, infect the file.  Return control to the host program.
  • 16. Virus Propagation Leverage : User Connectivity
  • 17. CAUSES AND EFFECTS OF COMPUTER VIRUSES • Computer viruses spread by attaching themselves to the other computer program files(usually .exe, .com, .bat, .dll, ) • A computer virus may be hidden or protected from the users eye • These viruses spread through infected files in Floppy, Cd, Usb pen drive & internet • Computer viruses can infect the program and it may lead to loss of important data • These viruses are transfers to our data through any floppy or cd • If any infected file is copy in your system then it will infect the other files and function too
  • 18. CURE OF COMPUTER VIRUSES
  • 19. PREVENTION & CURE OF COMPUTER VIRUSES • Since virus can cause extensive effect to your important files,possible steps must be take to prevent attack on your pc • If you use floppy disk to boot your pc then write protect it • Make backups of your impotent files in floppy or cd and keep it in a safe place you will need it later • Install an Antivirus software • Regularly update the program • Open email attachment files only if you are expecting the attached files, or the sender is known and has confirmed sending the file • Try to avoid downloading and installing software from the Internet • Install only registered copies of software on the system
  • 21. WHAT IS AN ANTI-VIRUS? • Anti-virus is a software (computer program) that scans files or your computer's memory for certain patterns that may indicate an infection. • The patterns it looks for are based on the signatures, or fingerprints, of known viruses. computer programs intended to Identify and Eliminate Computer Viruses.
  • 23. CONCLUSION • I think we should not use the pc without any antivirus security as it may cause damage to our important data • Do not copy or transfer any data or file without scanning the disk.
  • 24.