SlideShare a Scribd company logo
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 1
Antivirus software
Presented BY:
M. Mohsin Zahid
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 2
Definition
Antivirus software is a computer program that
detects, prevents, and takes action to disarm or
remove malicious software programs, such as viruses
and worms.
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 3
History
In the early 1980s, Internet security was practically
nonexistent. No large-scale attacks had ever been
attempted, and network-based vulnerabilities were
rarely, if ever, exploited.
This changed in the late 1980s with the Morris
Worm, the first known large-scale attack
propagated via the Internet.
Today, spyware, viruses, trojan attacks, worms, and
malware are all common occurrences affecting
nearly every computer user at least once.
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 4
Types of antivirus
1) Firewall software
Analyzes incoming and outgoing data packets
on a network; that is, all the information sent
and received through the computer's network
connection.
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 5
Network layer firewalls
This software are called packet filters. These
firewalls are the simplest of firewalls, and only allow
information packets to pass through the firewall if
the packet matches a specific set of rules.
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 6
Application layer firewalls
These firewalls inspect all packets for specific
protocols, such as FTP and browser traffic.
Proxy servers
It act as a firewall in that they inspect incoming packets
for specific applications and block all other requests.
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 7
Top ten antivirus software
There are 10 ranked anti-viruses
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 8
Avast Antivirus
FEATURES
• Anti-malware Protection
• Safe Zone
• Anti-spam
• Data Shredder
• Windows Compatible
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 9
Panda Antivirus
• Protection against all kinds of
known and unknown threats.
• Protect your communications
against online fraud.
• Protect your networks against
hackers and intruders.
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 10
McAfee Anti-Virus
FEATURES
• Security Widget
• Active Virus Control
• Rescue Mode
• Virtualized Browser
• Vulnerability Scanner
• Remote Management
• Scan Dispatcher
• Personal Data Filter
• Chat Encryption
• Personal Data Filter
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 11
List of all Anti-Viruses
• Avira Antivirus
• Avast Antivirus
• AVG Antivirus
• Immunet Protect
• Digital Patrol
• K7 Antivirus
• eScan Antivirus
• Comodo Antivirus
• Dr.Web Antivirus
• Digital Defender Antivirus
• Norman Antivirus
• Clam Antivirus
• F-Prot Antivirus
• Kaspersky Antivirus
• Trend Micro Antivirus
• Sophos Antivirus
• Panda Cloud Antivirus
• FortiClient Antivirus
• Solo Antivirus
• Twister Antivirus
• Ad-Aware Internet Security
• VBA32 Antivirus
• Quick Heal Antivirus
• Rising Antivirus
• Kingsoft Antivirus
• Vexira Antivirus
• Arcavir Antivirus
• nProtect Antivirus
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 12
Advantages of Anti-Virus
 Protecting Personal Data
If you have an anti virus then you
don’t need to worry
about the virus that it will:
 Format hard disk
 Copy, rename and delete files
 Modify files dates and extensions
 Display false message every few times
 Damage data
 Damage software
Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template
For more templates : Powerpoint Backgrounds
Others ressources :
Abstract and Textures Powerpoint Model Templates
Nature Models for Powerpoint Template
Flower Free Powerpoint Templates
Blankboard Powerpoint Template Presentations
Blue Curve PPT Template Presentations
Page 13
Protecting Personal Information
• Hackers and viruses go hand in hand. A good anti-
virus program will protect you while you surf the
Internet, preventing hackers from gaining access to
personal things such as credit card information and
bank account access. The firewall feature included
with most anti-virus software will block any
unauthorized incoming connections
to your network or computer,
preventing hackers from
digging their hooks into your
life and your computer.

More Related Content

What's hot

Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
culltdueet65
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
Sid1256
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
Shabnam Bashir
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
Network security ppt
Network security pptNetwork security ppt
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
Pratimesh Pathak
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
Mohammed Adam
 

What's hot (20)

Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Presentation2
Presentation2Presentation2
Presentation2
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Antivirus
AntivirusAntivirus
Antivirus
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 

Viewers also liked

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
Fatima Reema Sarael
 
Microsoft excel
Microsoft excelMicrosoft excel
Microsoft excel
khalid umer
 
u2 Gerey IFRS reporting systems CS 2013 experience
u2 Gerey IFRS reporting systems CS 2013 experienceu2 Gerey IFRS reporting systems CS 2013 experience
u2 Gerey IFRS reporting systems CS 2013 experienceYuriy Yurchenko
 
Deductor Credit Scorecard Modeler
Deductor Credit Scorecard ModelerDeductor Credit Scorecard Modeler
Deductor Credit Scorecard Modeler
Loginom
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
Naveen Goyal
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
Somanath Kavalase
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
Anirudh Kannan
 
Viernes 25
Viernes 25Viernes 25
Security and Investigations Certificates
Security and Investigations CertificatesSecurity and Investigations Certificates
Security and Investigations CertificatesCindy Krumholtz
 
Trabalho de campo análise segundo o moh
Trabalho de campo  análise segundo o mohTrabalho de campo  análise segundo o moh
Trabalho de campo análise segundo o moh
toot6
 
Wurzel_HomeInsurance_Lite
Wurzel_HomeInsurance_LiteWurzel_HomeInsurance_Lite
Wurzel_HomeInsurance_LiteRobert Wurzel
 
Quién es tu familia
Quién es tu familiaQuién es tu familia
Quién es tu familia
isabel padilla
 
EDU208SurveyResearch
EDU208SurveyResearchEDU208SurveyResearch
EDU208SurveyResearchZane Willard
 
Tarea n°1
Tarea n°1Tarea n°1
Tarea n°1
biancaleon24
 
1 k hipervinculo
1 k  hipervinculo1 k  hipervinculo
1 k hipervinculo
dana pan
 
NYS Park Police and Welfare Fraud
NYS Park Police and Welfare FraudNYS Park Police and Welfare Fraud
NYS Park Police and Welfare FraudCindy Krumholtz
 
Transfer Talk Jochen Wolf
Transfer Talk Jochen WolfTransfer Talk Jochen Wolf
Transfer Talk Jochen WolfJochen Wolf
 
bigdatappt-130621045034-phpapp01
bigdatappt-130621045034-phpapp01bigdatappt-130621045034-phpapp01
bigdatappt-130621045034-phpapp01Arun Sai
 

Viewers also liked (20)

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
RISK MANAGEMENT U2
RISK MANAGEMENT U2RISK MANAGEMENT U2
RISK MANAGEMENT U2
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Microsoft excel
Microsoft excelMicrosoft excel
Microsoft excel
 
u2 Gerey IFRS reporting systems CS 2013 experience
u2 Gerey IFRS reporting systems CS 2013 experienceu2 Gerey IFRS reporting systems CS 2013 experience
u2 Gerey IFRS reporting systems CS 2013 experience
 
Deductor Credit Scorecard Modeler
Deductor Credit Scorecard ModelerDeductor Credit Scorecard Modeler
Deductor Credit Scorecard Modeler
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Viernes 25
Viernes 25Viernes 25
Viernes 25
 
Security and Investigations Certificates
Security and Investigations CertificatesSecurity and Investigations Certificates
Security and Investigations Certificates
 
Trabalho de campo análise segundo o moh
Trabalho de campo  análise segundo o mohTrabalho de campo  análise segundo o moh
Trabalho de campo análise segundo o moh
 
Wurzel_HomeInsurance_Lite
Wurzel_HomeInsurance_LiteWurzel_HomeInsurance_Lite
Wurzel_HomeInsurance_Lite
 
Quién es tu familia
Quién es tu familiaQuién es tu familia
Quién es tu familia
 
EDU208SurveyResearch
EDU208SurveyResearchEDU208SurveyResearch
EDU208SurveyResearch
 
Tarea n°1
Tarea n°1Tarea n°1
Tarea n°1
 
1 k hipervinculo
1 k  hipervinculo1 k  hipervinculo
1 k hipervinculo
 
NYS Park Police and Welfare Fraud
NYS Park Police and Welfare FraudNYS Park Police and Welfare Fraud
NYS Park Police and Welfare Fraud
 
Transfer Talk Jochen Wolf
Transfer Talk Jochen WolfTransfer Talk Jochen Wolf
Transfer Talk Jochen Wolf
 
bigdatappt-130621045034-phpapp01
bigdatappt-130621045034-phpapp01bigdatappt-130621045034-phpapp01
bigdatappt-130621045034-phpapp01
 

Similar to Antivirus software

internet of things
internet of thingsinternet of things
internet of things
Ashwanpreet Singh
 
Working Together Online Oct 2008
Working Together Online Oct 2008Working Together Online Oct 2008
Working Together Online Oct 2008
Michigan Nonprofit Association
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentationtswong
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Dinis Cruz
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
centralohioissa
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
Khawar Nehal khawar.nehal@atrc.net.pk
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
David Lombrozo
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
GuardEra Access Solutions, Inc.
 
File Maker Webinar
File Maker WebinarFile Maker Webinar
File Maker Webinar
TechSoup
 
Issues in Cloud Technology and Cybersecurity
Issues in Cloud Technology and CybersecurityIssues in Cloud Technology and Cybersecurity
Issues in Cloud Technology and CybersecurityDaniel Cervera
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
rtrautz
 
WEBQUEST ALSOANKA
WEBQUEST ALSOANKAWEBQUEST ALSOANKA
WEBQUEST ALSOANKA
ALSOANKA
 
Web quest ALSOANKA GROUP
Web quest ALSOANKA GROUPWeb quest ALSOANKA GROUP
Web quest ALSOANKA GROUPALSOANKA
 
The Evil Friend in Your Browser
The Evil Friend in Your BrowserThe Evil Friend in Your Browser
The Evil Friend in Your Browser
Achim D. Brucker
 
carbon footprint
carbon footprintcarbon footprint
carbon footprint
Anaswara Here
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Storage Switzerland
 
Aging Services Expo Presentation
Aging Services Expo PresentationAging Services Expo Presentation
Aging Services Expo Presentation
Mary Derrick Cook
 

Similar to Antivirus software (20)

nonprof2007.ppt
nonprof2007.pptnonprof2007.ppt
nonprof2007.ppt
 
internet of things
internet of thingsinternet of things
internet of things
 
Working Together Online Oct 2008
Working Together Online Oct 2008Working Together Online Oct 2008
Working Together Online Oct 2008
 
My pres
My presMy pres
My pres
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
File Maker Webinar
File Maker WebinarFile Maker Webinar
File Maker Webinar
 
Issues in Cloud Technology and Cybersecurity
Issues in Cloud Technology and CybersecurityIssues in Cloud Technology and Cybersecurity
Issues in Cloud Technology and Cybersecurity
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
WEBQUEST ALSOANKA
WEBQUEST ALSOANKAWEBQUEST ALSOANKA
WEBQUEST ALSOANKA
 
Web quest ALSOANKA GROUP
Web quest ALSOANKA GROUPWeb quest ALSOANKA GROUP
Web quest ALSOANKA GROUP
 
The Evil Friend in Your Browser
The Evil Friend in Your BrowserThe Evil Friend in Your Browser
The Evil Friend in Your Browser
 
carbon footprint
carbon footprintcarbon footprint
carbon footprint
 
Tools You Can Use Oct 2008
Tools You Can Use Oct 2008Tools You Can Use Oct 2008
Tools You Can Use Oct 2008
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Aging Services Expo Presentation
Aging Services Expo PresentationAging Services Expo Presentation
Aging Services Expo Presentation
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Antivirus software

  • 1. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 1 Antivirus software Presented BY: M. Mohsin Zahid
  • 2. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 2 Definition Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms.
  • 3. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 3 History In the early 1980s, Internet security was practically nonexistent. No large-scale attacks had ever been attempted, and network-based vulnerabilities were rarely, if ever, exploited. This changed in the late 1980s with the Morris Worm, the first known large-scale attack propagated via the Internet. Today, spyware, viruses, trojan attacks, worms, and malware are all common occurrences affecting nearly every computer user at least once.
  • 4. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 4 Types of antivirus 1) Firewall software Analyzes incoming and outgoing data packets on a network; that is, all the information sent and received through the computer's network connection.
  • 5. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 5 Network layer firewalls This software are called packet filters. These firewalls are the simplest of firewalls, and only allow information packets to pass through the firewall if the packet matches a specific set of rules.
  • 6. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 6 Application layer firewalls These firewalls inspect all packets for specific protocols, such as FTP and browser traffic. Proxy servers It act as a firewall in that they inspect incoming packets for specific applications and block all other requests.
  • 7. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 7 Top ten antivirus software There are 10 ranked anti-viruses
  • 8. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 8 Avast Antivirus FEATURES • Anti-malware Protection • Safe Zone • Anti-spam • Data Shredder • Windows Compatible
  • 9. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 9 Panda Antivirus • Protection against all kinds of known and unknown threats. • Protect your communications against online fraud. • Protect your networks against hackers and intruders.
  • 10. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 10 McAfee Anti-Virus FEATURES • Security Widget • Active Virus Control • Rescue Mode • Virtualized Browser • Vulnerability Scanner • Remote Management • Scan Dispatcher • Personal Data Filter • Chat Encryption • Personal Data Filter
  • 11. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 11 List of all Anti-Viruses • Avira Antivirus • Avast Antivirus • AVG Antivirus • Immunet Protect • Digital Patrol • K7 Antivirus • eScan Antivirus • Comodo Antivirus • Dr.Web Antivirus • Digital Defender Antivirus • Norman Antivirus • Clam Antivirus • F-Prot Antivirus • Kaspersky Antivirus • Trend Micro Antivirus • Sophos Antivirus • Panda Cloud Antivirus • FortiClient Antivirus • Solo Antivirus • Twister Antivirus • Ad-Aware Internet Security • VBA32 Antivirus • Quick Heal Antivirus • Rising Antivirus • Kingsoft Antivirus • Vexira Antivirus • Arcavir Antivirus • nProtect Antivirus
  • 12. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 12 Advantages of Anti-Virus  Protecting Personal Data If you have an anti virus then you don’t need to worry about the virus that it will:  Format hard disk  Copy, rename and delete files  Modify files dates and extensions  Display false message every few times  Damage data  Damage software
  • 13. Click here to download this powerpoint template : Blue Blooming Flowers Powerpoint Template For more templates : Powerpoint Backgrounds Others ressources : Abstract and Textures Powerpoint Model Templates Nature Models for Powerpoint Template Flower Free Powerpoint Templates Blankboard Powerpoint Template Presentations Blue Curve PPT Template Presentations Page 13 Protecting Personal Information • Hackers and viruses go hand in hand. A good anti- virus program will protect you while you surf the Internet, preventing hackers from gaining access to personal things such as credit card information and bank account access. The firewall feature included with most anti-virus software will block any unauthorized incoming connections to your network or computer, preventing hackers from digging their hooks into your life and your computer.