SlideShare a Scribd company logo
1 of 7
MACRO VIRUS
How Macro Viruses Spread
• Macro viruses are most commonly found embedded in
documents or inserted as malicious code into word-
processing programs.
• They may come from documents attached to emails, or the
code may be downloaded after clicking on "phishing" links
in banner ads or URLs.
• They are difficult to detect, as they do not operate until an
infected macro is run, at which time they perform a series
of commands.
• A macro virus is similar to a Trojan virus, since it may
appear benign and users may not immediately notice any ill
effects. Unlike Trojans, however, macro viruses can
replicate themselves and infect other computers.
• The main risk of macro viruses is their ability to
spread quickly.
• Once an infected macro is run, all other
documents on a user's computer become
infected.
• Some of these viruses cause abnormalities in text
documents, such as missing or inserted words,
while others access email accounts and send out
copies of infected files to all of a user's contacts,
who in turn open and access these files because
they come from a trusted source.
• These viruses can also be designed to erase or
compromise stored data. In addition, it's
important to note that macro viruses are
cross-platform; they can infect both Windows
and Mac computers using the same code. Any
program that uses macros can operate as a
host, and any copy of an infected program —
sent via email, stored on disk or on a USB
drive — will contain the virus.
• To remove these viruses, users should rely on
security software that provides specific macro
virus detection and removal tools. Regular
scans will clean any infected documents and
ensure no new computer viruses are
downloaded.
• A Trojan Horse Virus is a type of malware that
downloads onto a computer disguised as a
legitimate program. The delivery method
typically sees an attacker use social
engineering to hide malicious code within
legitimate software to try and gain users'
system access with their software.

More Related Content

Similar to class 8 presentation on computer virus-macro.pptx

Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
KRT395
 

Similar to class 8 presentation on computer virus-macro.pptx (20)

Malicious
MaliciousMalicious
Malicious
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Malicious Software.pptx
Malicious Software.pptxMalicious Software.pptx
Malicious Software.pptx
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Types of viruses
Types of virusesTypes of viruses
Types of viruses
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 

More from Epsiba1

App development for class 8 creating apps open source mit .pptx
App development for class 8 creating apps open source mit .pptxApp development for class 8 creating apps open source mit .pptx
App development for class 8 creating apps open source mit .pptx
Epsiba1
 

More from Epsiba1 (11)

App development for class 8 creating apps open source mit .pptx
App development for class 8 creating apps open source mit .pptxApp development for class 8 creating apps open source mit .pptx
App development for class 8 creating apps open source mit .pptx
 
Cloud computing.pptxcloud, technology, apps, protocols, google drive, drop bo...
Cloud computing.pptxcloud, technology, apps, protocols, google drive, drop bo...Cloud computing.pptxcloud, technology, apps, protocols, google drive, drop bo...
Cloud computing.pptxcloud, technology, apps, protocols, google drive, drop bo...
 
Surface area and volume.pptx
Surface area and volume.pptxSurface area and volume.pptx
Surface area and volume.pptx
 
constructors.pptx
constructors.pptxconstructors.pptx
constructors.pptx
 
Assertive Nationalists.pptx
Assertive Nationalists.pptxAssertive Nationalists.pptx
Assertive Nationalists.pptx
 
class as the basis.pptx
class as the basis.pptxclass as the basis.pptx
class as the basis.pptx
 
Linear Equations and Inequations in one variable.pptx
Linear Equations and Inequations in one variable.pptxLinear Equations and Inequations in one variable.pptx
Linear Equations and Inequations in one variable.pptx
 
Cube and Cube root.pptx
Cube and Cube root.pptxCube and Cube root.pptx
Cube and Cube root.pptx
 
Circle.pptx
Circle.pptxCircle.pptx
Circle.pptx
 
Arrays.pptx
Arrays.pptxArrays.pptx
Arrays.pptx
 
Gideon Story.pptx
Gideon Story.pptxGideon Story.pptx
Gideon Story.pptx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

class 8 presentation on computer virus-macro.pptx

  • 2. How Macro Viruses Spread • Macro viruses are most commonly found embedded in documents or inserted as malicious code into word- processing programs. • They may come from documents attached to emails, or the code may be downloaded after clicking on "phishing" links in banner ads or URLs. • They are difficult to detect, as they do not operate until an infected macro is run, at which time they perform a series of commands. • A macro virus is similar to a Trojan virus, since it may appear benign and users may not immediately notice any ill effects. Unlike Trojans, however, macro viruses can replicate themselves and infect other computers.
  • 3. • The main risk of macro viruses is their ability to spread quickly. • Once an infected macro is run, all other documents on a user's computer become infected. • Some of these viruses cause abnormalities in text documents, such as missing or inserted words, while others access email accounts and send out copies of infected files to all of a user's contacts, who in turn open and access these files because they come from a trusted source.
  • 4. • These viruses can also be designed to erase or compromise stored data. In addition, it's important to note that macro viruses are cross-platform; they can infect both Windows and Mac computers using the same code. Any program that uses macros can operate as a host, and any copy of an infected program — sent via email, stored on disk or on a USB drive — will contain the virus.
  • 5. • To remove these viruses, users should rely on security software that provides specific macro virus detection and removal tools. Regular scans will clean any infected documents and ensure no new computer viruses are downloaded.
  • 6.
  • 7. • A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.