SlideShare a Scribd company logo
ANTI-VIRUS SOFTWARE
Prepared by:-
Harsh Gajipara
Contents
Virus and its types
History of anti virus
Meaning of antivirus
How does antivirus works
Install and upgrade antivirus software
Example of anti virus
What is computer virus ?
 Computer viruses are small software programs that are designesd to spread
from one computer to another and to interfere with computer operation.
 A virus might corrupts or delete data on your computer, use your e-mail
program to spread itself to other computers, or even erase everything on your
hard disk.
 Viruses can be disguised as attachments of funny images, greeting card or audio
and video files.
 Viruses are most easily spread by attachments in e-mail messages or instant messaging
messages. That is why it is essential that you never open e-mail attachments unless you
know who it's from and you are expecting it.
 Viruses also spread through downloads on the Internet. They can be hidden in illicit
software or other files or programs you might download.
Types of virus :-
1. Boot sector viruses
2. Program viruses
3. Macro
What should I do if I have a virus?
 Clean your computer with anti-virus software. If your computer is still not functioning
and you have data you are concerned about recovering, consider hiring a trusted expert.
Often data can be successfully extracted from an injured hard drive, but the process is
complex and will involve another computer, special software, and a technician with a lot
of experience in data recovery.
Virus
Infection of more than 75,000 vulnerable computers in 10 minutes
What is antivirus software ?
 Computer programs inteneded to Identify and Eliminate Computer viruses.
What is an antivirus ?
 Antivirus software is a class of program that searches a hard drive and floppy disk for
any known or potential viruses.
 Antivirus program runs in the Random Accesses Memory of a computer.
 Anti-virus software typically uses two different techniques to accomplish this:
Examining files to look for known viruses by means of a virus dictionary.
 Identifying suspicious behavior from any computer program which might indicate
infection. Most commercial anti-virus software uses both of these approaches, with an
emphasis on the virus dictionary approach.
What is an antivirus ?
 Once you have installed an anti-virus package, you should scan your entire computer
periodically. Always leave your Anti-virus software running so it can provide constant
protection.
 Automatic scans- Depending what software you choose, you may be able to configure
it to automatically scan specific files or directories and prompt you at set intervals to
perform complete scans.
 Manual scans- It is also a good idea to manually scan files you receive from an outside
source before opening them.
This includes: Saving and scanning email attachments or web downloads rather than
selecting the option to open them directly from the source. Scanning floppy disks, CDs, or
DVDs for viruses before opening any of the files
How does antivirus works ?
 Anti-virus applications maintain a database of known viruses and compare scanned files
that match the characteristics of known viruses. If a scanned files matches those
characteristics of known viruses. If a scanned file matches those characteristics, it is
quarantined (which means moved to a new, presumably safe location on disk and
renamed, so you can find it should you ever need it) so that it cannot affect other files on
your system.
 Signature detection is just one way of identifying viruses and is only effective if the
virus database is up-to-date and contains the signature of a virus. Anti-virus programs
also attempt to identify suspicious behavior include an application attempting to write to
an executable file, altering needed system files, making suspicious registry entrees, or
adding to the list of items that execute automatically upon system start up.
How does antivirus works ?
 Once the file is quarantined, the application can attempt to repair it, delete it, or
prompt you for a decision on what to do about the file infected.
 This approach helps protect against unidentified or encrypted viruses and can alert
you to suspicious behavior happening on your computer. This interesting is an area
where anti-spyware/anti-adware and anti-virus software often notice the same
kinds of activities, because they are typical for adware and spyware as well as
malware
How Antivirus Software Works:
Source System
Interception
Disinfection
Alert
Destination System
Source System
Interception
Disinfection
Alert
Interception
Disinfection
Why didn’t my antivirus software
works ?
 It's crucial to keep your antivirus software current with the latest updates (usually called
definition files) that help the tool identify and remove the latest threats.
 In addition, not all antivirus tools are the same; if you find that the one you use isn't
working to your satisfaction, you should do some research and try an alternative.
How do I install and update antivirus software if I
can’t use my pc ?
 It might be difficult to download tools or update your computer if your
computer has a virus. In this case, use a friend's or other computer to download
the tools to a disk
QA
Thanks

More Related Content

What's hot

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antivirusesSanguine_Eva
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 

What's hot (20)

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Virus project
Virus projectVirus project
Virus project
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
1.9 adapter card
1.9 adapter card1.9 adapter card
1.9 adapter card
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Types of malware
Types of malwareTypes of malware
Types of malware
 

Similar to Anti virus software

Similar to Anti virus software (20)

Virus
VirusVirus
Virus
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Antivirus
AntivirusAntivirus
Antivirus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Unmasking the Secret How Antivirus works.docx
Unmasking the Secret How Antivirus works.docxUnmasking the Secret How Antivirus works.docx
Unmasking the Secret How Antivirus works.docx
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 

Recently uploaded

How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
 
How To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdfHow To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdfayushiqss
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAlluxio, Inc.
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandIES VE
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfMeon Technology
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Gáspár Nagy
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessWSO2
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
 
Benefits of Employee Monitoring Software
Benefits of  Employee Monitoring SoftwareBenefits of  Employee Monitoring Software
Benefits of Employee Monitoring SoftwareMera Monitor
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationHelp Desk Migration
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabbereGrabber
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfmbmh111980
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdfkalichargn70th171
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationWave PLM
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignNeo4j
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationHelp Desk Migration
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareinfo611746
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1KnowledgeSeed
 

Recently uploaded (20)

How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
How To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdfHow To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdf
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdf
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Benefits of Employee Monitoring Software
Benefits of  Employee Monitoring SoftwareBenefits of  Employee Monitoring Software
Benefits of Employee Monitoring Software
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data Migration
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabber
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM Integration
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by Design
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting software
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
 

Anti virus software

  • 2. Contents Virus and its types History of anti virus Meaning of antivirus How does antivirus works Install and upgrade antivirus software Example of anti virus
  • 3. What is computer virus ?  Computer viruses are small software programs that are designesd to spread from one computer to another and to interfere with computer operation.  A virus might corrupts or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.  Viruses can be disguised as attachments of funny images, greeting card or audio and video files.
  • 4.  Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.  Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
  • 5. Types of virus :- 1. Boot sector viruses 2. Program viruses 3. Macro
  • 6. What should I do if I have a virus?  Clean your computer with anti-virus software. If your computer is still not functioning and you have data you are concerned about recovering, consider hiring a trusted expert. Often data can be successfully extracted from an injured hard drive, but the process is complex and will involve another computer, special software, and a technician with a lot of experience in data recovery.
  • 7. Virus Infection of more than 75,000 vulnerable computers in 10 minutes
  • 8. What is antivirus software ?  Computer programs inteneded to Identify and Eliminate Computer viruses.
  • 9. What is an antivirus ?  Antivirus software is a class of program that searches a hard drive and floppy disk for any known or potential viruses.  Antivirus program runs in the Random Accesses Memory of a computer.  Anti-virus software typically uses two different techniques to accomplish this: Examining files to look for known viruses by means of a virus dictionary.  Identifying suspicious behavior from any computer program which might indicate infection. Most commercial anti-virus software uses both of these approaches, with an emphasis on the virus dictionary approach.
  • 10. What is an antivirus ?  Once you have installed an anti-virus package, you should scan your entire computer periodically. Always leave your Anti-virus software running so it can provide constant protection.  Automatic scans- Depending what software you choose, you may be able to configure it to automatically scan specific files or directories and prompt you at set intervals to perform complete scans.  Manual scans- It is also a good idea to manually scan files you receive from an outside source before opening them. This includes: Saving and scanning email attachments or web downloads rather than selecting the option to open them directly from the source. Scanning floppy disks, CDs, or DVDs for viruses before opening any of the files
  • 11. How does antivirus works ?  Anti-virus applications maintain a database of known viruses and compare scanned files that match the characteristics of known viruses. If a scanned files matches those characteristics of known viruses. If a scanned file matches those characteristics, it is quarantined (which means moved to a new, presumably safe location on disk and renamed, so you can find it should you ever need it) so that it cannot affect other files on your system.  Signature detection is just one way of identifying viruses and is only effective if the virus database is up-to-date and contains the signature of a virus. Anti-virus programs also attempt to identify suspicious behavior include an application attempting to write to an executable file, altering needed system files, making suspicious registry entrees, or adding to the list of items that execute automatically upon system start up.
  • 12. How does antivirus works ?  Once the file is quarantined, the application can attempt to repair it, delete it, or prompt you for a decision on what to do about the file infected.  This approach helps protect against unidentified or encrypted viruses and can alert you to suspicious behavior happening on your computer. This interesting is an area where anti-spyware/anti-adware and anti-virus software often notice the same kinds of activities, because they are typical for adware and spyware as well as malware
  • 13. How Antivirus Software Works: Source System Interception Disinfection Alert Destination System Source System Interception Disinfection Alert Interception Disinfection
  • 14. Why didn’t my antivirus software works ?  It's crucial to keep your antivirus software current with the latest updates (usually called definition files) that help the tool identify and remove the latest threats.  In addition, not all antivirus tools are the same; if you find that the one you use isn't working to your satisfaction, you should do some research and try an alternative.
  • 15. How do I install and update antivirus software if I can’t use my pc ?  It might be difficult to download tools or update your computer if your computer has a virus. In this case, use a friend's or other computer to download the tools to a disk
  • 16.