SlideShare a Scribd company logo
1 of 4
Assignment
Submitted to: Ma’am Ayesha
Submitted by: Huma Tariq
Roll No: 14020204-050
Department:Computer Science
Topic:Viruses
Virus
Whatare virus?
An infective agent that typically consists of a nucleic acid molecule in a protein coat, is too
small to be seen by light microscopy, and is able to multiply only within the living cells of a
host. a piece of code which is capable of copying itself and typically has a detrimental
effect, such as corrupting the system or destroying data.
Effects of Virus?
 computer virus can slow down your computer.
 might corrupt your system files.
 might make some programs faulty or corrupt.
 might damage your boot sector creating problems when you boot into the windows.
 might steal important information from your computer and send to some other person.
 might change the power ratings of your computer and could blast the system.
Execution of Virus:
A virus can't execute itself, unless it has the cooperation of the Operating System and/or
software bugs and/or the user. If the OS allows files to be executed automatically because
of their name or location (for example an email attachment) then a virus can masquerade
as a legitimate file and be executed by the OS without user intervention. This used to be
the default behaviour in early email clients.
Also, if the OS or specific software has errors that a virus can exploit to run its code, then a
virus can start itself. Yes, in the context of the browser, since unintentionally you're
executing the page without clicking on anything. Such viruses are capable of downloading
themselves to your hard disk without your cooperation.The propagation vector here can
be JavaScript, Java, ActiveX, Flash and other plugins.
Many such attacks are carried out through cross-site scripting.One of its prorogation
methods was via open windows file shares. From memory, it copied itself as an .eml file to
open network shares. There is something called Silent Java drive by (SJDB) that can
download and install a virus when you just visit a web pages.The vast majority of viruses
target systems running Microsoft Windows. This is due to Microsoft's large market share
of desktop users.
The diversity of software systems on a network limits the destructive potentialof viruses
and malware.Open-source operating systems such as Linux allow users to choose from a
variety of desktop environments, packaging tools, etc., which means that malicious
codetargeting any of these systems will only affect a subset of all users. Many Windows
users are running the same set of applications, enabling viruses to rapidly spread among
Microsoft Windows systems by targeting the same exploits on large numbers of hosts.
Regenerationof virus:
Though most computerusers have learned to fear viruses, few really know what they are.
Viruses are programs that replicate themselves inside a computer. The malicious bug
cannot do its damage when a user simply surfs the Web or opens a plain text message
such as an e-mail. However, viruses are unleashed when they are hidden in attachments
to e-mail messages and someone opens that attachment. After viruses replicate, many
carry out damaging instructions that have been programmed intothem.Consistent with
the invention, systems and methods are provided for regenerating computerfiles on a
computer system having a computer with an operating system. The method includes
receiving an input from a user to specify monitored files, automatically detecting
modification of at least one of the monitored files, and automatically replacing the at least
one modified monitored file with a backup copy of the at least one modified monitored
file.
Assignment of virus

More Related Content

What's hot

Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Virusesmartingarcia300
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 

What's hot (20)

Presentation2
Presentation2Presentation2
Presentation2
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Virus
Virus  Virus
Virus
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer worm
Computer wormComputer worm
Computer worm
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Similar to Assignment of virus

Computer Virus
Computer Virus Computer Virus
Computer Virus bebo
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
Computer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyDipayan Sarkar
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 

Similar to Assignment of virus (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Virus
VirusVirus
Virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Types of viruses
Types of virusesTypes of viruses
Types of viruses
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus
VirusVirus
Virus
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan Chakravarthy
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 

Recently uploaded (20)

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 

Assignment of virus

  • 1. Assignment Submitted to: Ma’am Ayesha Submitted by: Huma Tariq Roll No: 14020204-050 Department:Computer Science Topic:Viruses
  • 2. Virus Whatare virus? An infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Effects of Virus?  computer virus can slow down your computer.  might corrupt your system files.  might make some programs faulty or corrupt.  might damage your boot sector creating problems when you boot into the windows.  might steal important information from your computer and send to some other person.  might change the power ratings of your computer and could blast the system. Execution of Virus: A virus can't execute itself, unless it has the cooperation of the Operating System and/or software bugs and/or the user. If the OS allows files to be executed automatically because of their name or location (for example an email attachment) then a virus can masquerade as a legitimate file and be executed by the OS without user intervention. This used to be the default behaviour in early email clients. Also, if the OS or specific software has errors that a virus can exploit to run its code, then a virus can start itself. Yes, in the context of the browser, since unintentionally you're executing the page without clicking on anything. Such viruses are capable of downloading themselves to your hard disk without your cooperation.The propagation vector here can be JavaScript, Java, ActiveX, Flash and other plugins. Many such attacks are carried out through cross-site scripting.One of its prorogation methods was via open windows file shares. From memory, it copied itself as an .eml file to open network shares. There is something called Silent Java drive by (SJDB) that can download and install a virus when you just visit a web pages.The vast majority of viruses target systems running Microsoft Windows. This is due to Microsoft's large market share of desktop users.
  • 3. The diversity of software systems on a network limits the destructive potentialof viruses and malware.Open-source operating systems such as Linux allow users to choose from a variety of desktop environments, packaging tools, etc., which means that malicious codetargeting any of these systems will only affect a subset of all users. Many Windows users are running the same set of applications, enabling viruses to rapidly spread among Microsoft Windows systems by targeting the same exploits on large numbers of hosts. Regenerationof virus: Though most computerusers have learned to fear viruses, few really know what they are. Viruses are programs that replicate themselves inside a computer. The malicious bug cannot do its damage when a user simply surfs the Web or opens a plain text message such as an e-mail. However, viruses are unleashed when they are hidden in attachments to e-mail messages and someone opens that attachment. After viruses replicate, many carry out damaging instructions that have been programmed intothem.Consistent with the invention, systems and methods are provided for regenerating computerfiles on a computer system having a computer with an operating system. The method includes receiving an input from a user to specify monitored files, automatically detecting modification of at least one of the monitored files, and automatically replacing the at least one modified monitored file with a backup copy of the at least one modified monitored file.