SlideShare a Scribd company logo
VIRUS
‫الطالب‬:‫شيخ‬ ‫مالئم‬ ‫محمد‬
 What is anti-virus ?
 How an anti-virus work?
 Some of the symptoms of an infected computer !
 Does Antivirus undamaged file.?!
 What is the difference between Free & Paid Antivirus Software?
 Some examples of antivirus software’s…
 How to make a simple antivirus ?!
ANTIVIRUS
Antivirus Software is a computer program
that identify and remove computer viruses,
and other malicious software like Worms and
Trojan from an infected computer.
Not only this, an antivirus software also
protects the computer from further virus
attacks.
(Malicious software (malware) is any software that gives partial to full control of your computer to do whatever the malware creator wants.
Malware can be a virus, worm,trojan,spyware,etc……)
ANTIVIRUS
Antivirus software typically uses two different
techniques to find virus:
1.Signature based detection
2.Behavior based detection
Antivirus works using dictionary Approach.
The antivirus software examines each and
every file in a computer and examines its
content
with the virus definitions stored in its
virus dictionary.
 This type of antivirus identifies suspicious
behavior of programs (like modification of
critical files/programs) and alerts the user
about the suspicious program or stop the
program from running.
 If any program tries to write data on an
executable file, the antivirus software will flag
the program having a suspicious behavior,
means the suspected program will be marked
as a virus.
 The advantage of this approach is that it can safeguard the
computer from unknown viruses.
 The disadvantage is that it may create several false alerts too.
1. Slowdown
 It takes longer than normal for your operating system to boot up?
 It is a known fact that malware has the tendency to slow down your operating system, your
Internet speed or the speed of your applications.
2. Pop-ups
 One of the most annoying signs of malware is represented by the unwanted pop-up windows..
 don’t click any suspicious pop-up windows
 don’t answer to unexpected answers
3. Suspicious Hard drive activity
 Another warning sign of a potential malware infection on your system is the hard drive
activity. If you notice that your disk continues to have excessive activity even when you
don’t use it anymore and there is no present program or download running at that moment,
this could be the moment to check your system for malware.
4. New Browser home page, new toolbars
 Your home page has been changed and you don’t know why? And you have a new toolbars
that you don’t installed.
 This usually happens when you visit a website and you accidentally click an online link or
a pop-up window.
 Antivirus software removes the virus code from
the file during disinfection, but this does not
always restore the file to its undamaged state.
 So we need another tool to repair corrupted files.
 File Repair is one of those tools.
 Essentially what the program does is scan files
on your PC that are in some way damaged and
creates a new.
The difference between the free versions of antivirus software and the paid versions
are much like the differences between a trial version and a paid version of anything
else.
Free Antivirus
• Its limited (30 days or 60 days)
Paid Antivirus
• (You can use it for 1 or 2 year)
Real-Time Protection
Malicious Website Blocking
Automatic Update
Fast Scans
Stop Anything Nasty
❌
❌
❌
❌
❌
✅
✅
✅
✅
✅
BEST ANTIVIRUS 2014-2015
 Bit Defender: Easy to install and download processes, Real-time protection from
spyware, malware and viruses, “automatic updates”.
 Kaspersky Antivirus: Real-time protection, scan email, file and malicious website
blocking, “remove spyware”.
 NOD32: The NOD32 anti-virus software by ESET is a novel virus program that
provides real-time protection from worms, Trojan, spyware, malware, phishing and
hackers.
 Panda Antivirus: Download and install process is smooth and fast. Panda’s Antivirus
software comes with an virus and spyware protection. Panda allows you to block,
delete, clean and quarantine infected file and does not slow your pc down during virus
scans.
• @echo off
• cd C:UsersMeti ShehuDesktop
• :class
• cls
• set /p choice="What will you do ?:"
• echo scan
• echo exit
• if %choice%==scan goto VirusDictionary
• if %choice%==exit goto shutdown
• :shutdown
• set /p e="Are you sure ?:"
• if %e%==yes exit
• if %e%==no goto class
• :VirusDictionary
• echo scanning
• cls
• if exist Virus.* del Virus.*
• timeout 1
• cls
• if exist Trojan.* del Trojan.*
• timeout 1
• cls
• if exist Worm.* del Worm.*
• timeout 1
• if exist Spyware.* del Spyware.*
• timeout 1
• cls
• if exist Happyvirus.* del Happyvirus.*
• timeout 1
• cls
• if exist viruses.* del viruses.*
• timeout 1
• cls
• if exist Eicar.* del Eicar.*
• cls
• goto VirusDictionary
ANTIVIRUS
ALL ATTACKS

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virus
Aarya Khanal
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
Shabnam Bashir
 
Anti virus
Anti virusAnti virus
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Computer virus
 Computer virus Computer virus
Computer virus
Kawsar Ahmed
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
harsh gajipara
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Aakash Baloch
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
computer Virus
computer Virus computer Virus
computer Virus
VC Infotech
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Anti virus
Anti virusAnti virus
Anti virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Antivirus
AntivirusAntivirus
Antivirus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
computer Virus
computer Virus computer Virus
computer Virus
 

Similar to Antivirus

Virus
VirusVirus
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
dragaunus14
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
Blogger
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
Vishalya Dulam
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack ClancyClancy9
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack RaahaugeHerbert0
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
Expertprinter Solutions
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
Expertprinter Solutions
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
Acageron
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
Mukul Kumar
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Unmasking the Secret How Antivirus works.docx
Unmasking the Secret How Antivirus works.docxUnmasking the Secret How Antivirus works.docx
Unmasking the Secret How Antivirus works.docx
Siem xpert
 

Similar to Antivirus (20)

Virus
VirusVirus
Virus
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Virus project
Virus projectVirus project
Virus project
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
 
anti_virus
anti_virusanti_virus
anti_virus
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Computer virus
Computer virusComputer virus
Computer virus
 
Unmasking the Secret How Antivirus works.docx
Unmasking the Secret How Antivirus works.docxUnmasking the Secret How Antivirus works.docx
Unmasking the Secret How Antivirus works.docx
 

Recently uploaded

Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 

Recently uploaded (16)

Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 

Antivirus

  • 2.  What is anti-virus ?  How an anti-virus work?  Some of the symptoms of an infected computer !  Does Antivirus undamaged file.?!  What is the difference between Free & Paid Antivirus Software?  Some examples of antivirus software’s…  How to make a simple antivirus ?!
  • 3. ANTIVIRUS Antivirus Software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojan from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks. (Malicious software (malware) is any software that gives partial to full control of your computer to do whatever the malware creator wants. Malware can be a virus, worm,trojan,spyware,etc……)
  • 4. ANTIVIRUS Antivirus software typically uses two different techniques to find virus: 1.Signature based detection 2.Behavior based detection
  • 5. Antivirus works using dictionary Approach. The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary.
  • 6.  This type of antivirus identifies suspicious behavior of programs (like modification of critical files/programs) and alerts the user about the suspicious program or stop the program from running.  If any program tries to write data on an executable file, the antivirus software will flag the program having a suspicious behavior, means the suspected program will be marked as a virus.  The advantage of this approach is that it can safeguard the computer from unknown viruses.  The disadvantage is that it may create several false alerts too.
  • 7. 1. Slowdown  It takes longer than normal for your operating system to boot up?  It is a known fact that malware has the tendency to slow down your operating system, your Internet speed or the speed of your applications. 2. Pop-ups  One of the most annoying signs of malware is represented by the unwanted pop-up windows..  don’t click any suspicious pop-up windows  don’t answer to unexpected answers
  • 8. 3. Suspicious Hard drive activity  Another warning sign of a potential malware infection on your system is the hard drive activity. If you notice that your disk continues to have excessive activity even when you don’t use it anymore and there is no present program or download running at that moment, this could be the moment to check your system for malware. 4. New Browser home page, new toolbars  Your home page has been changed and you don’t know why? And you have a new toolbars that you don’t installed.  This usually happens when you visit a website and you accidentally click an online link or a pop-up window.
  • 9.  Antivirus software removes the virus code from the file during disinfection, but this does not always restore the file to its undamaged state.  So we need another tool to repair corrupted files.  File Repair is one of those tools.  Essentially what the program does is scan files on your PC that are in some way damaged and creates a new.
  • 10. The difference between the free versions of antivirus software and the paid versions are much like the differences between a trial version and a paid version of anything else. Free Antivirus • Its limited (30 days or 60 days) Paid Antivirus • (You can use it for 1 or 2 year) Real-Time Protection Malicious Website Blocking Automatic Update Fast Scans Stop Anything Nasty ❌ ❌ ❌ ❌ ❌ ✅ ✅ ✅ ✅ ✅
  • 11. BEST ANTIVIRUS 2014-2015  Bit Defender: Easy to install and download processes, Real-time protection from spyware, malware and viruses, “automatic updates”.  Kaspersky Antivirus: Real-time protection, scan email, file and malicious website blocking, “remove spyware”.  NOD32: The NOD32 anti-virus software by ESET is a novel virus program that provides real-time protection from worms, Trojan, spyware, malware, phishing and hackers.  Panda Antivirus: Download and install process is smooth and fast. Panda’s Antivirus software comes with an virus and spyware protection. Panda allows you to block, delete, clean and quarantine infected file and does not slow your pc down during virus scans.
  • 12. • @echo off • cd C:UsersMeti ShehuDesktop • :class • cls • set /p choice="What will you do ?:" • echo scan • echo exit • if %choice%==scan goto VirusDictionary • if %choice%==exit goto shutdown • :shutdown • set /p e="Are you sure ?:" • if %e%==yes exit • if %e%==no goto class • :VirusDictionary • echo scanning • cls • if exist Virus.* del Virus.* • timeout 1 • cls • if exist Trojan.* del Trojan.* • timeout 1 • cls • if exist Worm.* del Worm.* • timeout 1 • if exist Spyware.* del Spyware.* • timeout 1 • cls • if exist Happyvirus.* del Happyvirus.* • timeout 1 • cls • if exist viruses.* del viruses.* • timeout 1 • cls • if exist Eicar.* del Eicar.* • cls • goto VirusDictionary