SlideShare a Scribd company logo
COMPUTER 
SOFTWARE 
VIRUSES 
HARDWARE
What is Computer Virus..?? 
 A computer virus is a small software program that spreads from one 
computer to another computer and that interferes with computer operation. A 
computer virus may corrupt or delete data on a computer, use an e-mail program 
to spread the virus to other computers, or even delete everything on the hard 
disk. 
 Computer viruses are most easily spread by attachments in e-mail 
messages or by instant messaging messages. Therefore, you must never open an 
e-mail attachment unless you know who sent the message or unless you are 
expecting the e-mail attachment. Computer viruses can be disguised as 
attachments of funny images, greeting cards, or audio and video files. Computer 
viruses also spread by using downloads on the Internet. Computer viruses can be 
hidden in pirated software or in other files or programs that you may download.
VIRUSES – TYPES AND EXAMPLES 
• BOOT VIRUSES :- 
These viruses infect disc boot records or master boot records in hard disks. They 
replace the boot record program (which is responsible for loading the operating system in 
memory) copying it elsewhere on the disk or overwriting it. Boot viruses load into memory 
if the computer tries to read the disk while it is booting. 
Examples: Form, Disk Killer, Michelangelo, and Stone virus 
• PROGRAM VIRUSES:- 
These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, 
.OVL, .DRV (driver) and .SYS (device driver). These programs are loaded in memory during 
execution, taking the virus with them. The virus becomes active in memory, making copies 
of itself and infecting files on disk. 
Examples: Sunday, Cascade
•Multipartite viruses: 
A hybrid of Boot and Program viruses. They infect program files and when 
the infected program is executed, these viruses infect the boot record. When you 
boot the computer next time the virus from the boot record loads in memory and 
then starts infecting other program files on disk. 
Examples: Invader, Flip, and Tequila 
• Stealth viruses: 
These viruses use certain techniques to avoid detection. They may either redirect the 
disk head to read another sector instead of the one in which they reside or they may alter 
the reading of the infected file’s size shown in the directory listing. For instance, the Whale 
virus adds 9216 bytes to an infected file; then the virus subtracts the same number of 
bytes (9216) from the size given in the directory. 
Examples: Frodo, Joshi, Whale 
• Polymorphic viruses: 
A virus that can encrypt its code in different ways so that it appears differently in 
each infection. These viruses are more difficult to detect. 
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
•Macro Viruses:- 
A macro virus is a new type of computer virus that infects the macros within a document or 
template. When you open a word processing or spreadsheet document, the macro virus is activated 
and it infects the Normal template (Normal.dot)-a general purpose file that stores default document 
formatting settings. Every document you open refers to the Normal template, and hence gets infected 
with the macro virus. Since this virus attaches itself to documents, the infection can spread if such 
documents are opened on other computers. 
Examples: DMV, Nuclear, Word Concept. 
• Active X: - 
ActiveX and Java controls will soon be the scourge of computing. Most people do not 
know how to control there web browser to enable or disable the various functions like 
playing sound or video and so, by default, leave a nice big hole in the security by allowing 
applets free run into there machine. There has been a lot of commotion behind this and 
with the amount of power that JAVA imparts, things from the security angle seem a bit 
gloom
COMPUTER TROJANS 
COMPUTER TROJANS ARE SIMPLY MALICIOUS COMPUTER 
PROGRAMS DISGUISED AS SOMETHING USEFUL. 
THE MAJOR DIFFERENCE BETWEEN VIRUSES AND TROJANS IS THAT 
VIRUSES REPRODUCE, WHILE A TROJAN IS JUST A ONE TIME 
PROGRAM WHICH EXECUTES ITS PAYLOAD AS SOON AS THE TROJAN 
IS EXECUTED 
TROJANS ARE THE MOST COMMON WAY OF BRINGING A VIRUS 
INTO A SYSTEM. 
A CURRENT EXAMPLE OF A TROJAN IS A PROGRAM CALLED 
PKZ300B.EXE WHICH DISGUISES ITSELF AS AN ARCHIVING UTILITY, 
BUT WHEN RUN IT WILL DELETE YOUR ENTIRE HARD DRIVE.
COMPUTER WORMS 
 Computer Worms are reproducing programs that run independantly and 
travel across network connections. The main difference between viruses 
and worms is the method in which they reproduce and spread. A virus is 
dependant upon a host file or boot sector, and the transfer of files between 
machines to spread, while a worm can run completely independently and 
spread of its own will through network connections. 
 An example of a worm is the famous internet worm of 1988: Overnight the 
worm copied itself across the internet, infecting every Sun-3 and VAX 
system with so many copies of itself that the systems were unusable. 
Eventually several sites disconnected themselves from the internet to avoid 
reinfection.
HOW DO COMPUTER VIRUSES SPREAD 
Computer viruses usually spread in one of three 
ways:- 
• From Removable media. 
• From Downloads off the Internet. 
• From e-mail attachments.
Removable Disc 
E-mail 
Virus..
COMPUTER VIRUS SYMPTOMS 
 Computer is infected with a malicious computer virus, it may begin to show a 
series of Computer Virus symptoms that indicate that a virus is present. 
 Computer viruses can be very harmful and damaging to your computer system, 
root files, and various program files. A computer virus can also increase the risk of 
hacker threats and attacks, and open the door to even more unauthorized 
downloads and software installations. 
 When a virus begins to spread, many program files can become unstable and 
display warnings. 
 The operating system may not launch properly, and the computer user may need 
to reboot and restart the computer frequently to ensure all programs are starting 
and working fine. 
 Critical files may get deleted automatically, and this can happen periodically or all 
at once. Error messages will become prevalent; it may become difficult to save 
documents, and the computer may be running slower than usual.
SYMPTOMS OF WORMS AND TROJAN HORSE 
 When a computer virus infects e-mail messages or infects other files on a 
computer, you may notice the following symptoms: 
 The infected file may make copies of itself. This behavior may use up all the free 
space on the hard disk. 
 A copy of the infected file may be sent to all the addresses in an e-mail address 
list. 
 The computer virus may reformat the hard disk. This behavior will delete files 
and programs. 
VIRUSES IN E-MAIL MESSAGES
A COMPUTER VIRUS CAN DAMAGE YOUR 
SYSTEM 
 A computer virus can do a lot of damage to your system before you even realize 
that it happened. Leaving your computer unprotected is a primary reason why 
most of the computer viruses get into your system. 
 Different types of computer viruses that invade your system. Scum ware, Adware, 
Spyware, Trojan Horses, computer viruses and Worms. Each one attacks your 
system in a similar way. 
 Computer Viruses: Quickly spreads from one computer to another computer. It 
starts by attaching and loading itself onto the computer without your knowledge. 
 A computer virus can be duplicated.
HOW TO REMOVE A COMPUTER VIRUS 
Install and Update the antivirus software on the 
computer. Then, perform a thorough scan of the 
computer by using the antivirus software. 
Install the latest updates from Microsoft Update on 
the computer. 
Download, install, and then run the Malicious 
Software Removal Tool to remove existing viruses 
on the computer. To download the Malicious 
Software Removal Too
HOW TO PROTECT YOUR COMPUTER AGAINST 
VIRUSES 
On the computer, turn on the firewall. 
Keep the computer operating system up-to-date. 
Use updated antivirus software on the computer.
CONCLUSION..!!

More Related Content

What's hot

Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
computer virus
computer viruscomputer virus
computer virus
Kunal Yadav
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
Ammy Vijay
 
As computer virus
As computer virusAs computer virus
As computer virus
achal bisht
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
San Diego Continuing Education
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
casyrichard
 
Computer virus
Computer virusComputer virus
Computer virus
Sammer Khizer
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
Naveen Goyal
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarnnimmi_abes
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
martingarcia300
 
Virus
VirusVirus
Virus
Protik Roy
 

What's hot (20)

Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
computer virus
computer viruscomputer virus
computer virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computervirus
Computervirus Computervirus
Computervirus
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Virus
VirusVirus
Virus
 

Similar to Computer Viruses

Virus
VirusVirus
Virus
dddaou
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 
Computer virus
Computer virusComputer virus
Computer virus
kiran_a_c
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Computervirus
ComputervirusComputervirus
Computervirus
kishan alagiya
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 

Similar to Computer Viruses (20)

Virus
VirusVirus
Virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
ComputervirusComputervirus
Computervirus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 

Computer Viruses

  • 2.
  • 3. What is Computer Virus..??  A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.  Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.
  • 4. VIRUSES – TYPES AND EXAMPLES • BOOT VIRUSES :- These viruses infect disc boot records or master boot records in hard disks. They replace the boot record program (which is responsible for loading the operating system in memory) copying it elsewhere on the disk or overwriting it. Boot viruses load into memory if the computer tries to read the disk while it is booting. Examples: Form, Disk Killer, Michelangelo, and Stone virus • PROGRAM VIRUSES:- These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk. Examples: Sunday, Cascade
  • 5. •Multipartite viruses: A hybrid of Boot and Program viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then starts infecting other program files on disk. Examples: Invader, Flip, and Tequila • Stealth viruses: These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For instance, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory. Examples: Frodo, Joshi, Whale • Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect. Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
  • 6. •Macro Viruses:- A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spreadsheet document, the macro virus is activated and it infects the Normal template (Normal.dot)-a general purpose file that stores default document formatting settings. Every document you open refers to the Normal template, and hence gets infected with the macro virus. Since this virus attaches itself to documents, the infection can spread if such documents are opened on other computers. Examples: DMV, Nuclear, Word Concept. • Active X: - ActiveX and Java controls will soon be the scourge of computing. Most people do not know how to control there web browser to enable or disable the various functions like playing sound or video and so, by default, leave a nice big hole in the security by allowing applets free run into there machine. There has been a lot of commotion behind this and with the amount of power that JAVA imparts, things from the security angle seem a bit gloom
  • 7. COMPUTER TROJANS COMPUTER TROJANS ARE SIMPLY MALICIOUS COMPUTER PROGRAMS DISGUISED AS SOMETHING USEFUL. THE MAJOR DIFFERENCE BETWEEN VIRUSES AND TROJANS IS THAT VIRUSES REPRODUCE, WHILE A TROJAN IS JUST A ONE TIME PROGRAM WHICH EXECUTES ITS PAYLOAD AS SOON AS THE TROJAN IS EXECUTED TROJANS ARE THE MOST COMMON WAY OF BRINGING A VIRUS INTO A SYSTEM. A CURRENT EXAMPLE OF A TROJAN IS A PROGRAM CALLED PKZ300B.EXE WHICH DISGUISES ITSELF AS AN ARCHIVING UTILITY, BUT WHEN RUN IT WILL DELETE YOUR ENTIRE HARD DRIVE.
  • 8. COMPUTER WORMS  Computer Worms are reproducing programs that run independantly and travel across network connections. The main difference between viruses and worms is the method in which they reproduce and spread. A virus is dependant upon a host file or boot sector, and the transfer of files between machines to spread, while a worm can run completely independently and spread of its own will through network connections.  An example of a worm is the famous internet worm of 1988: Overnight the worm copied itself across the internet, infecting every Sun-3 and VAX system with so many copies of itself that the systems were unusable. Eventually several sites disconnected themselves from the internet to avoid reinfection.
  • 9.
  • 10. HOW DO COMPUTER VIRUSES SPREAD Computer viruses usually spread in one of three ways:- • From Removable media. • From Downloads off the Internet. • From e-mail attachments.
  • 12. COMPUTER VIRUS SYMPTOMS  Computer is infected with a malicious computer virus, it may begin to show a series of Computer Virus symptoms that indicate that a virus is present.  Computer viruses can be very harmful and damaging to your computer system, root files, and various program files. A computer virus can also increase the risk of hacker threats and attacks, and open the door to even more unauthorized downloads and software installations.  When a virus begins to spread, many program files can become unstable and display warnings.  The operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine.  Critical files may get deleted automatically, and this can happen periodically or all at once. Error messages will become prevalent; it may become difficult to save documents, and the computer may be running slower than usual.
  • 13. SYMPTOMS OF WORMS AND TROJAN HORSE  When a computer virus infects e-mail messages or infects other files on a computer, you may notice the following symptoms:  The infected file may make copies of itself. This behavior may use up all the free space on the hard disk.  A copy of the infected file may be sent to all the addresses in an e-mail address list.  The computer virus may reformat the hard disk. This behavior will delete files and programs. VIRUSES IN E-MAIL MESSAGES
  • 14. A COMPUTER VIRUS CAN DAMAGE YOUR SYSTEM  A computer virus can do a lot of damage to your system before you even realize that it happened. Leaving your computer unprotected is a primary reason why most of the computer viruses get into your system.  Different types of computer viruses that invade your system. Scum ware, Adware, Spyware, Trojan Horses, computer viruses and Worms. Each one attacks your system in a similar way.  Computer Viruses: Quickly spreads from one computer to another computer. It starts by attaching and loading itself onto the computer without your knowledge.  A computer virus can be duplicated.
  • 15. HOW TO REMOVE A COMPUTER VIRUS Install and Update the antivirus software on the computer. Then, perform a thorough scan of the computer by using the antivirus software. Install the latest updates from Microsoft Update on the computer. Download, install, and then run the Malicious Software Removal Tool to remove existing viruses on the computer. To download the Malicious Software Removal Too
  • 16. HOW TO PROTECT YOUR COMPUTER AGAINST VIRUSES On the computer, turn on the firewall. Keep the computer operating system up-to-date. Use updated antivirus software on the computer.