SlideShare a Scribd company logo
Computer
Viruses
MALWARES
   A software designed to
    infiltrate or damage a
    computer system
    without the owner's
    informed consent.
   A fusion of two words:
    MALICIOUS and
    SOFTWARE
Examples of MALWARES

               Computer viruses
               Worms
               Trojan horses
               Spyware
               Dishonest adware
WHAT IS A COMPUTER VIRUS?
Computer Virus is a
computer program,
designed as a prank or
a sabotage, that
replicates itself by
attaching to other
programs and carrying
out unwanted and
sometimes damaging
operations.
Some NOTES on VIRUSES…
 Viruses are computer programs
 A virus can only spread from one
  computer to another when its host is
  taken to the uninfected computer, for
  instance by a user sending it over a
  network or the Internet, or by
  carrying it on a removable medium
  such as a floppy disk, CD, or USB
  drive.
Some NOTES on VIRUSES…
Viruses are sometimes
 confused with computer
 worms and Trojan horses.
The terms virus is
 sometimes used to refer to
 other types of Malwares.
WHAT IS A WORM?
   a self-replicating
    computer program.
   it uses a network to
    send copies of itself to
    other nodes (computer
    terminals on the
    network) and it may do
    so without any user
    intervention.
   Unlike a virus, it does
    not need to attach itself
    to an existing program.
WHAT IS A TROJAN HORSE?
             any program that invites
              the user to run it, but
              conceals a harmful or
              malicious payload.
             The payload may take
              effect immediately and
              can lead to many
              undesirable effects
              they are often referred to
              as “time bomb” programs
WHAT IS A SPYWARE?
   a computer software that is
    installed secretly on a personal
    computer to intercept or take
    partial control over the user's
    interaction with the computer,
    without the user's informed
    consent.
   can collect various types of personal
    information; can also interfere with
    user control of the computer in
    other ways, such as installing
    additional software, accessing
    websites blindly that will cause
    more harmful viruses,
WHAT IS A ADWARE?
              advertising-supported
               software
              any software package
               which automatically
               plays, displays, or
               downloads advertising
               material to a computer
              Some types of adware
               are also spyware and
               can be classified as
               privacy-invasive
               software.
(Just some of the) HARM
COMPUTER
VIRUSES CAN DO …
              Overwrites boot sector
              Formats all/part of the
               disk
              Corrupts programs/data
               files
              Causes harm to the
               network
WHO WOULD CREATE A
      COMPUTER VIRUS
   THE WHIZ KID
   THE KSPs
   THE TERRORIST
   THE BUSINESSMAN
   THE RESEARCHER
SYMPTOMS of VIRUS INFECTION
   The computer runs slower than usual.
   The computer stops responding, or it
    locks up frequently.
   The computer crashes, and then it
    restarts every few minutes
   The computer restarts on its own.
    Additionally, the computer does not run
    as usual.
SYMPTOMS of VIRUS INFECTION

 Applications
             on the computer do
 not work correctly.
 Disksor disk drives are
 inaccessible.
 You   cannot print items correctly.
 You   see unusual error messages.
SYMPTOMS of VIRUS INFECTION
   You see distorted menus and dialog
    boxes.
   There is a double extension on an
    attachment that you recently opened,
    such as a .jpg, .vbs, .gif, or .exe. extension
   An antivirus program is disabled for no
    reason. Additionally, the antivirus
    program cannot be restarted
   An antivirus program cannot be installed
    on the computer, or the antivirus
    program will not run.
SYMPTOMS of VIRUS INFECTION
   New icons appear on the desktop that
    you did not put there, or the icons are
    not associated with any recently
    installed programs.
   Strange sounds or music plays from the
    speakers unexpectedly.
   A program disappears from the computer
    even though you did not intentionally
    remove the program.
   Some elusive viruses won’t show any
    symptoms at all
GUIDE for a VIRUS FREE
COMPUTING
          Know your computer
          Keep original copies of
           your executable programs
           in a safe place and backup
           data files regularly
          Control system access
GUIDE for a VIRUS FREE
        COMPUTING
   Scan all foreign
    diskettes/ removable
    storage you plan to use
   Use only software from
    reliable sources
   Maintain a library of
    anti-virus tools,
    utilities, diagnostics,
    etc.
GUIDES for a VIRUS FREE
    COMPUTING
 If possible, have the file
  attributes of your important
  programs set to read-only to
  prevent accidental overwriting
 If you suspect disk virus
  infection, consult a reliable
  adviser.
Current Trends

in
Information
Technology
MICROPROCESSORS for Power
Users
MICROPROCESSORS for Home
Users
MICROPROCESSORS for
Netbook Users
MICROPROCESSORS for
Netbook Users
HARD DRIVES
MOBILE COMPUTING
PRINTERS
SOFTWARE/PROGRAMS
INTERNET COMPUTING

More Related Content

What's hot

Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
Jay Shah
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
Adeel Rasheed
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
Naveen Goyal
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
aaberra
 
Anti virus
Anti virusAnti virus
Anti virus
Marlon San Luis
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
nikkinikhita
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
Shabnam Bashir
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
Prakriti Sharma
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
khalid umer
 

What's hot (20)

Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Antivirus
AntivirusAntivirus
Antivirus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked

Novel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data StructureNovel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data Structure
iosrjce
 
Use Eco Friendly Solar Agriculture Sprayer
Use Eco Friendly Solar Agriculture Sprayer Use Eco Friendly Solar Agriculture Sprayer
Use Eco Friendly Solar Agriculture Sprayer
Kaleem
 
Apache
ApacheApache
Water conservation
Water conservationWater conservation
Water conservation
ranjeevsehrawatsingh
 
Water conservation
Water conservationWater conservation
Water conservation
Deepika Verma
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
Huawei Technologies
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Firewall
FirewallFirewall
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 

Viewers also liked (18)

Novel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data StructureNovel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data Structure
 
Use Eco Friendly Solar Agriculture Sprayer
Use Eco Friendly Solar Agriculture Sprayer Use Eco Friendly Solar Agriculture Sprayer
Use Eco Friendly Solar Agriculture Sprayer
 
Apache
ApacheApache
Apache
 
Water conservation
Water conservationWater conservation
Water conservation
 
Water conservation
Water conservationWater conservation
Water conservation
 
Firewall
FirewallFirewall
Firewall
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to Anti virus and current trends

COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
GDhanushia
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
Computer Science
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
sonajidongre
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
viruses
virusesviruses
viruses
khadija habib
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ictmakanaya
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
bhagatsigh
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
Sanguine_Eva
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
Virus
VirusVirus
Virus
dddaou
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
University of Sindh, Jamshoro
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
actanimation
 

Similar to Anti virus and current trends (20)

COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
viruses
virusesviruses
viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Virus
VirusVirus
Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

More from Athena Catindig

4.human development presentation
4.human development presentation4.human development presentation
4.human development presentationAthena Catindig
 
1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentation1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentationAthena Catindig
 
Biological basis of behavior (new)
Biological basis of behavior (new)Biological basis of behavior (new)
Biological basis of behavior (new)Athena Catindig
 
Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)Athena Catindig
 
Module 4 man s rejection of god s love
Module 4 man s rejection of god s loveModule 4 man s rejection of god s love
Module 4 man s rejection of god s loveAthena Catindig
 

More from Athena Catindig (7)

4.human development presentation
4.human development presentation4.human development presentation
4.human development presentation
 
1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentation1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentation
 
Biological basis of behavior (new)
Biological basis of behavior (new)Biological basis of behavior (new)
Biological basis of behavior (new)
 
Preventive maintenance
Preventive maintenancePreventive maintenance
Preventive maintenance
 
Computer fundamentals 1
Computer fundamentals 1Computer fundamentals 1
Computer fundamentals 1
 
Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)
 
Module 4 man s rejection of god s love
Module 4 man s rejection of god s loveModule 4 man s rejection of god s love
Module 4 man s rejection of god s love
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 

Anti virus and current trends

  • 2. MALWARES  A software designed to infiltrate or damage a computer system without the owner's informed consent.  A fusion of two words: MALICIOUS and SOFTWARE
  • 3. Examples of MALWARES  Computer viruses  Worms  Trojan horses  Spyware  Dishonest adware
  • 4. WHAT IS A COMPUTER VIRUS? Computer Virus is a computer program, designed as a prank or a sabotage, that replicates itself by attaching to other programs and carrying out unwanted and sometimes damaging operations.
  • 5. Some NOTES on VIRUSES…  Viruses are computer programs  A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 6. Some NOTES on VIRUSES… Viruses are sometimes confused with computer worms and Trojan horses. The terms virus is sometimes used to refer to other types of Malwares.
  • 7. WHAT IS A WORM?  a self-replicating computer program.  it uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention.  Unlike a virus, it does not need to attach itself to an existing program.
  • 8. WHAT IS A TROJAN HORSE?  any program that invites the user to run it, but conceals a harmful or malicious payload.  The payload may take effect immediately and can lead to many undesirable effects  they are often referred to as “time bomb” programs
  • 9. WHAT IS A SPYWARE?  a computer software that is installed secretly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.  can collect various types of personal information; can also interfere with user control of the computer in other ways, such as installing additional software, accessing websites blindly that will cause more harmful viruses,
  • 10. WHAT IS A ADWARE?  advertising-supported software  any software package which automatically plays, displays, or downloads advertising material to a computer  Some types of adware are also spyware and can be classified as privacy-invasive software.
  • 11. (Just some of the) HARM COMPUTER VIRUSES CAN DO …  Overwrites boot sector  Formats all/part of the disk  Corrupts programs/data files  Causes harm to the network
  • 12. WHO WOULD CREATE A COMPUTER VIRUS  THE WHIZ KID  THE KSPs  THE TERRORIST  THE BUSINESSMAN  THE RESEARCHER
  • 13. SYMPTOMS of VIRUS INFECTION  The computer runs slower than usual.  The computer stops responding, or it locks up frequently.  The computer crashes, and then it restarts every few minutes  The computer restarts on its own. Additionally, the computer does not run as usual.
  • 14. SYMPTOMS of VIRUS INFECTION  Applications on the computer do not work correctly.  Disksor disk drives are inaccessible.  You cannot print items correctly.  You see unusual error messages.
  • 15. SYMPTOMS of VIRUS INFECTION  You see distorted menus and dialog boxes.  There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension  An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted  An antivirus program cannot be installed on the computer, or the antivirus program will not run.
  • 16. SYMPTOMS of VIRUS INFECTION  New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.  Strange sounds or music plays from the speakers unexpectedly.  A program disappears from the computer even though you did not intentionally remove the program.  Some elusive viruses won’t show any symptoms at all
  • 17. GUIDE for a VIRUS FREE COMPUTING  Know your computer  Keep original copies of your executable programs in a safe place and backup data files regularly  Control system access
  • 18. GUIDE for a VIRUS FREE COMPUTING  Scan all foreign diskettes/ removable storage you plan to use  Use only software from reliable sources  Maintain a library of anti-virus tools, utilities, diagnostics, etc.
  • 19. GUIDES for a VIRUS FREE COMPUTING  If possible, have the file attributes of your important programs set to read-only to prevent accidental overwriting  If you suspect disk virus infection, consult a reliable adviser.