SlideShare a Scribd company logo
Computer
Viruses
MALWARES
   A software designed to
    infiltrate or damage a
    computer system
    without the owner's
    informed consent.
   A fusion of two words:
    MALICIOUS and
    SOFTWARE
Examples of MALWARES

               Computer viruses
               Worms
               Trojan horses
               Spyware
               Dishonest adware
WHAT IS A COMPUTER VIRUS?
Computer Virus is a
computer program,
designed as a prank or
a sabotage, that
replicates itself by
attaching to other
programs and carrying
out unwanted and
sometimes damaging
operations.
Some NOTES on VIRUSES…
 Viruses are computer programs
 A virus can only spread from one
  computer to another when its host is
  taken to the uninfected computer, for
  instance by a user sending it over a
  network or the Internet, or by
  carrying it on a removable medium
  such as a floppy disk, CD, or USB
  drive.
Some NOTES on VIRUSES…
Viruses are sometimes
 confused with computer
 worms and Trojan horses.
The terms virus is
 sometimes used to refer to
 other types of Malwares.
WHAT IS A WORM?
   a self-replicating
    computer program.
   it uses a network to
    send copies of itself to
    other nodes (computer
    terminals on the
    network) and it may do
    so without any user
    intervention.
   Unlike a virus, it does
    not need to attach itself
    to an existing program.
WHAT IS A TROJAN HORSE?
             any program that invites
              the user to run it, but
              conceals a harmful or
              malicious payload.
             The payload may take
              effect immediately and
              can lead to many
              undesirable effects
              they are often referred to
              as “time bomb” programs
WHAT IS A SPYWARE?
   a computer software that is
    installed secretly on a personal
    computer to intercept or take
    partial control over the user's
    interaction with the computer,
    without the user's informed
    consent.
   can collect various types of personal
    information; can also interfere with
    user control of the computer in
    other ways, such as installing
    additional software, accessing
    websites blindly that will cause
    more harmful viruses,
WHAT IS A ADWARE?
              advertising-supported
               software
              any software package
               which automatically
               plays, displays, or
               downloads advertising
               material to a computer
              Some types of adware
               are also spyware and
               can be classified as
               privacy-invasive
               software.
(Just some of the) HARM
COMPUTER
VIRUSES CAN DO …
              Overwrites boot sector
              Formats all/part of the
               disk
              Corrupts programs/data
               files
              Causes harm to the
               network
WHO WOULD CREATE A
      COMPUTER VIRUS
   THE WHIZ KID
   THE KSPs
   THE TERRORIST
   THE BUSINESSMAN
   THE RESEARCHER
SYMPTOMS of VIRUS INFECTION
   The computer runs slower than usual.
   The computer stops responding, or it
    locks up frequently.
   The computer crashes, and then it
    restarts every few minutes
   The computer restarts on its own.
    Additionally, the computer does not run
    as usual.
SYMPTOMS of VIRUS INFECTION

 Applications
             on the computer do
 not work correctly.
 Disksor disk drives are
 inaccessible.
 You   cannot print items correctly.
 You   see unusual error messages.
SYMPTOMS of VIRUS INFECTION
   You see distorted menus and dialog
    boxes.
   There is a double extension on an
    attachment that you recently opened,
    such as a .jpg, .vbs, .gif, or .exe. extension
   An antivirus program is disabled for no
    reason. Additionally, the antivirus
    program cannot be restarted
   An antivirus program cannot be installed
    on the computer, or the antivirus
    program will not run.
SYMPTOMS of VIRUS INFECTION
   New icons appear on the desktop that
    you did not put there, or the icons are
    not associated with any recently
    installed programs.
   Strange sounds or music plays from the
    speakers unexpectedly.
   A program disappears from the computer
    even though you did not intentionally
    remove the program.
   Some elusive viruses won’t show any
    symptoms at all
GUIDE for a VIRUS FREE
COMPUTING
          Know your computer
          Keep original copies of
           your executable programs
           in a safe place and backup
           data files regularly
          Control system access
GUIDE for a VIRUS FREE
        COMPUTING
   Scan all foreign
    diskettes/ removable
    storage you plan to use
   Use only software from
    reliable sources
   Maintain a library of
    anti-virus tools,
    utilities, diagnostics,
    etc.
GUIDES for a VIRUS FREE
    COMPUTING
 If possible, have the file
  attributes of your important
  programs set to read-only to
  prevent accidental overwriting
 If you suspect disk virus
  infection, consult a reliable
  adviser.
Current Trends

in
Information
Technology
MICROPROCESSORS for Power
Users
MICROPROCESSORS for Home
Users
MICROPROCESSORS for
Netbook Users
MICROPROCESSORS for
Netbook Users
HARD DRIVES
MOBILE COMPUTING
PRINTERS
SOFTWARE/PROGRAMS
INTERNET COMPUTING

More Related Content

What's hot

Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
Jay Shah
 
Antivirus
AntivirusAntivirus
Antivirus
ava & araf co.
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
Adeel Rasheed
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
Naveen Goyal
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
aaberra
 
Anti virus
Anti virusAnti virus
Anti virus
Marlon San Luis
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
nikkinikhita
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
Shabnam Bashir
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
Prakriti Sharma
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
Amrit Kaur
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
Arnab Singha
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
khalid umer
 
Computer virus
Computer virusComputer virus
Computer virus
Maxie Santos
 

What's hot (20)

Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Antivirus
AntivirusAntivirus
Antivirus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked

Novel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data StructureNovel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data Structure
iosrjce
 
Use Eco Friendly Solar Agriculture Sprayer
Use Eco Friendly Solar Agriculture Sprayer Use Eco Friendly Solar Agriculture Sprayer
Use Eco Friendly Solar Agriculture Sprayer
Kaleem
 
Apache
ApacheApache
Water conservation
Water conservationWater conservation
Water conservation
ranjeevsehrawatsingh
 
Water conservation
Water conservationWater conservation
Water conservation
Deepika Verma
 
Firewall
FirewallFirewall
Firewall
lmbriscoe
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
Huawei Technologies
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
yogendrasinghchahar
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee12
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Firewall
FirewallFirewall
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 

Viewers also liked (18)

Novel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data StructureNovel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data Structure
 
Use Eco Friendly Solar Agriculture Sprayer
Use Eco Friendly Solar Agriculture Sprayer Use Eco Friendly Solar Agriculture Sprayer
Use Eco Friendly Solar Agriculture Sprayer
 
Apache
ApacheApache
Apache
 
Water conservation
Water conservationWater conservation
Water conservation
 
Water conservation
Water conservationWater conservation
Water conservation
 
Firewall
FirewallFirewall
Firewall
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to Anti virus and current trends

COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
GDhanushia
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
Computer Science
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
sonajidongre
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Aman Chaudhary
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Computer virus
Computer virusComputer virus
viruses
virusesviruses
viruses
khadija habib
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
makanaya
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
bhagatsigh
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
Sanguine_Eva
 
Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
Virus
VirusVirus
Virus
dddaou
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
University of Sindh, Jamshoro
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
actanimation
 

Similar to Anti virus and current trends (20)

COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
viruses
virusesviruses
viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Virus
VirusVirus
Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

More from Athena Catindig

4.human development presentation
4.human development presentation4.human development presentation
4.human development presentation
Athena Catindig
 
1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentation1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentation
Athena Catindig
 
Biological basis of behavior (new)
Biological basis of behavior (new)Biological basis of behavior (new)
Biological basis of behavior (new)
Athena Catindig
 
Preventive maintenance
Preventive maintenancePreventive maintenance
Preventive maintenance
Athena Catindig
 
Computer fundamentals 1
Computer fundamentals 1Computer fundamentals 1
Computer fundamentals 1
Athena Catindig
 
Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)
Athena Catindig
 
Module 4 man s rejection of god s love
Module 4 man s rejection of god s loveModule 4 man s rejection of god s love
Module 4 man s rejection of god s love
Athena Catindig
 

More from Athena Catindig (7)

4.human development presentation
4.human development presentation4.human development presentation
4.human development presentation
 
1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentation1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentation
 
Biological basis of behavior (new)
Biological basis of behavior (new)Biological basis of behavior (new)
Biological basis of behavior (new)
 
Preventive maintenance
Preventive maintenancePreventive maintenance
Preventive maintenance
 
Computer fundamentals 1
Computer fundamentals 1Computer fundamentals 1
Computer fundamentals 1
 
Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)
 
Module 4 man s rejection of god s love
Module 4 man s rejection of god s loveModule 4 man s rejection of god s love
Module 4 man s rejection of god s love
 

Recently uploaded

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

Anti virus and current trends

  • 2. MALWARES  A software designed to infiltrate or damage a computer system without the owner's informed consent.  A fusion of two words: MALICIOUS and SOFTWARE
  • 3. Examples of MALWARES  Computer viruses  Worms  Trojan horses  Spyware  Dishonest adware
  • 4. WHAT IS A COMPUTER VIRUS? Computer Virus is a computer program, designed as a prank or a sabotage, that replicates itself by attaching to other programs and carrying out unwanted and sometimes damaging operations.
  • 5. Some NOTES on VIRUSES…  Viruses are computer programs  A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 6. Some NOTES on VIRUSES… Viruses are sometimes confused with computer worms and Trojan horses. The terms virus is sometimes used to refer to other types of Malwares.
  • 7. WHAT IS A WORM?  a self-replicating computer program.  it uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention.  Unlike a virus, it does not need to attach itself to an existing program.
  • 8. WHAT IS A TROJAN HORSE?  any program that invites the user to run it, but conceals a harmful or malicious payload.  The payload may take effect immediately and can lead to many undesirable effects  they are often referred to as “time bomb” programs
  • 9. WHAT IS A SPYWARE?  a computer software that is installed secretly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.  can collect various types of personal information; can also interfere with user control of the computer in other ways, such as installing additional software, accessing websites blindly that will cause more harmful viruses,
  • 10. WHAT IS A ADWARE?  advertising-supported software  any software package which automatically plays, displays, or downloads advertising material to a computer  Some types of adware are also spyware and can be classified as privacy-invasive software.
  • 11. (Just some of the) HARM COMPUTER VIRUSES CAN DO …  Overwrites boot sector  Formats all/part of the disk  Corrupts programs/data files  Causes harm to the network
  • 12. WHO WOULD CREATE A COMPUTER VIRUS  THE WHIZ KID  THE KSPs  THE TERRORIST  THE BUSINESSMAN  THE RESEARCHER
  • 13. SYMPTOMS of VIRUS INFECTION  The computer runs slower than usual.  The computer stops responding, or it locks up frequently.  The computer crashes, and then it restarts every few minutes  The computer restarts on its own. Additionally, the computer does not run as usual.
  • 14. SYMPTOMS of VIRUS INFECTION  Applications on the computer do not work correctly.  Disksor disk drives are inaccessible.  You cannot print items correctly.  You see unusual error messages.
  • 15. SYMPTOMS of VIRUS INFECTION  You see distorted menus and dialog boxes.  There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension  An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted  An antivirus program cannot be installed on the computer, or the antivirus program will not run.
  • 16. SYMPTOMS of VIRUS INFECTION  New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.  Strange sounds or music plays from the speakers unexpectedly.  A program disappears from the computer even though you did not intentionally remove the program.  Some elusive viruses won’t show any symptoms at all
  • 17. GUIDE for a VIRUS FREE COMPUTING  Know your computer  Keep original copies of your executable programs in a safe place and backup data files regularly  Control system access
  • 18. GUIDE for a VIRUS FREE COMPUTING  Scan all foreign diskettes/ removable storage you plan to use  Use only software from reliable sources  Maintain a library of anti-virus tools, utilities, diagnostics, etc.
  • 19. GUIDES for a VIRUS FREE COMPUTING  If possible, have the file attributes of your important programs set to read-only to prevent accidental overwriting  If you suspect disk virus infection, consult a reliable adviser.