SlideShare a Scribd company logo
Computer Viruses & Anti Virus
Malware
● Malware is a software designed to harm or secretly access
a computer system without the owner's informed consent.
● Malware, short for malicious software,also known as
pestware.
● In general term used by computer professionals to mean a
variety of forms of hostile, intrusive, or annoying software
or program code
Types of Malware
● Trojan Horse
● Worms
● Spyware
● Adware
● Backdoor
● Virus
Malware Categories
Trojan horses
● A Trojan horse is simply a computer program. The
program claims to do one thing (it may claim to be a
game) but instead does damage when you run it (it may
erase your hard disk). Trojan horses have no way to
replicate automatically.
Worms
• A worm is a small piece of software that uses
computer networks and security holes to replicate
itself. A copy of the worm scans the network for
another machine that has a specific security hole. It
copies itself to the new machine using the security
hole, and then starts replicating from there, as well.
Spyware
● Spyware is malicious computer program that does exactly
what its name implies Eg:, spies on you.
● After downloading itself onto your computer either through
an email you opened, website you visited or a program you
downloaded, spyware scans your hard drive for personal
information and your internet browsing habits.
● Some spyware programs contain keyloggers that will record
personal data you enter in to websites, such as your login
usernames and passwords, email addresses, browsing history
as well as sensitive banking and credit information.
Adware
● Adware is any software that, once installed on your
computer, tracks your internet browsing habits and
sends you popup containing advertisements related to
the sites and topics you've visited.
● While this type of software may sound innocent, and
even helpful, it consumes and slows down your
computer's processor and internet connection speed.
● Additionally, some adware has keyloggers and spyware
built into the program, leading to greater damage to
your computer and possible invasion of your private
data.
Backdoor
● A backdoor is a method of bypassing normal
authentication procedures.
● Once a system has been compromised one or more
backdoors maybe installed in order to allow easier access
in the future.
● Backdoors may also be installed prior to malicious
software, to allow attackers entry.
● Crackers typically use backdoors to secure remote access
to a computer, while attempting to remain hidden from
casual inspection.
● A computer virus is a type of malware that, when executed,
replicates by inserting copies of itself (possibly modified) into
other computer programs, data files, or the boot sector of the
hard drive; when this replication succeeds, the affected areas
are then said to be "infected".
● Viruses often perform some type of harmful activity on
infected hosts, such as stealing hard disk space or CPU time,
accessing private information, corrupting data, displaying
political or humorous messages on the user's screen,
spamming their contacts, or logging their keystrokes.
Virus
World’s 1st Computer Virus
● The first ever computer virus was developed in 1986 by
two Pakistani brothers in Lahore Pakistan.
● It was named “Brain” and was designed by Amjad
Farooq Alvi and Basit Farooq Alvi with the intention of
discouraging the piracy of a software written by them.
Types Of Computer Virus
• Boot sector virus
• Master Boot Record (MBR) virus
• File infector virus
• Macro virus
BOOT SECTOR VIRUS: Boot sector viruses generally hide
in the boot sector, either in the bootable disk or the hard drive.
It attaches itself to the primary active partition of the hard disk
that is read by the computer upon boot up.
MASTER BOOT RECORD VIRUS: MBR viruses are
memory-resident viruses that infect disks in the same manner
as boot sector viruses. However it, infects the MBR of the
system, gets activated when the BIOS activates the Master
boot code. MBR infectors normally save a legitimate copy of
the master boot record in an different location.
Types Of Computer Virus
File Infector Virus: File Infector viruses infect program
files. Normally infect executable code, such as .COM, .SYS,
.BAT and .EXE files. They can infect other files when an
infected program is run from floppy, hard drive, or from the
network. Many of these viruses are memory resident. After
memory becomes infected, any uninfected executable file that
runs becomes infected.
Types Of Computer Virus
Types Of Computer Virus
Macro Virus: Macro are mini-programs which make it
possible to automate series of operations so that they are
performed as a single action, thereby saving the user from
having to carry them out one by one.
Macro viruses infect files that are created using
certain applications or programs that contain macros.
They are platform-independent since the virus itself are
written in language of the application and not the operating
system.
They infect documents created from Microsoft
Office Word, Excel, PowerPoint and Access files.
Solution to Computer Viruses
An antivirus software is a computer program that identify and
remove computer viruses, and other malicious software like
Worms and Trojans from an infected computer. Not only this,
an antivirus software also protects the computer from further
virus attacks.
We should regularly run an antivirus program to scan
and remove any possible virus attacks from a computer.
AntiVirus
They can provide real time protection against the installation
of spywares on the computer. This type of spyware protection
works the same way as that of anti-virus protection. It scans
and blocks all incoming network threats as it comes across.
It can be used solely for detection and removal of
Spyware that has already been installed into the computer.
Anti spyware scans the contents of the windows registry,
operating system files, and installed programs on computer
and will provide a list of any threats found.
Anti-Spyware
Using dictionary Approach:
•The antivirus software examines each and every file in a
computer and examines its content with the virus definitions
stored in its virus dictionary.
•A virus dictionary is an inbuilt file belonging to an antivirus
software that contains code identified as a virus by the
antivirus authors.
How an AntiVirus Works…
How an AntiVirus Works…
Using Suspicious Behavior Approach:
•Antivirus software will constantly monitors the activity of all
the programs.
•If any program tries to write data on an executable file, the
antivirus software will flag the program having a suspicious
behavior, means the suspected program will be marked as a
virus.
•The advantage of this approach is that it can safeguard the
computer against unknown viruses also.
•The disadvantage is that it may create several false alerts too.
Popular Anti-Virus And Anti-Spyware Softwares
Anti-Virus & Anti-Spyware Is The Bodyguard Of Your System
It Is Us Who Rules, Not Malwares
• http://www.tech-faq.com/history-of-computer-viruses.html
• http://spamlaws.com/history.html
• http://en.wikipedia.org/wiki/Computer_virus#History
• http://www.infoplease.com/ipa/A0872842.html
References
Thank You

More Related Content

What's hot

Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 
Logic bomb virus
Logic bomb virusLogic bomb virus
Logic bomb virus
ssuser1eca7d
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
Wiliam Ferraciolli
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
Hamza Muhammad
 
Anti virus
Anti virusAnti virus
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
Shabnam Bashir
 
Malicious software
Malicious softwareMalicious software
Malicious software
CAS
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
rajakhurram
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
Mirza Adnan Baig
 
Virusppt
ViruspptVirusppt
Virusppt
Suman Bose
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
Tasif Tanzim
 
Computer virus
Computer virusComputer virus
Computer virus
Flora Runyenje
 
Mitppt
MitpptMitppt
Computer viruses
Computer virusesComputer viruses
Computer viruses
Yousef Bahaa
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
Reddhi Basu
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Yousef Bahaa
 

What's hot (20)

Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Logic bomb virus
Logic bomb virusLogic bomb virus
Logic bomb virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Anti virus
Anti virusAnti virus
Anti virus
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Virusppt
ViruspptVirusppt
Virusppt
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Mitppt
MitpptMitppt
Mitppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Similar to Compter virus and its solution

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
Anuj Pawar
 
Computer virus
Computer virusComputer virus
Computer virus
Rahul Baghla
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
Dara Corporates
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
Muhammad Ramzan
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
SridharChowdary10
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.pdf
Module 5.pdfModule 5.pdf
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
Sanguine_Eva
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
Yastee Shah
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
Dasun Hegoda
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
 

Similar to Compter virus and its solution (20)

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus project
Virus projectVirus project
Virus project
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus
Computer virusComputer virus
Computer virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 

Recently uploaded (20)

Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 

Compter virus and its solution

  • 1. Computer Viruses & Anti Virus
  • 2. Malware ● Malware is a software designed to harm or secretly access a computer system without the owner's informed consent. ● Malware, short for malicious software,also known as pestware. ● In general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code
  • 3. Types of Malware ● Trojan Horse ● Worms ● Spyware ● Adware ● Backdoor ● Virus
  • 5. Trojan horses ● A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
  • 6. Worms • A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
  • 7. Spyware ● Spyware is malicious computer program that does exactly what its name implies Eg:, spies on you. ● After downloading itself onto your computer either through an email you opened, website you visited or a program you downloaded, spyware scans your hard drive for personal information and your internet browsing habits. ● Some spyware programs contain keyloggers that will record personal data you enter in to websites, such as your login usernames and passwords, email addresses, browsing history as well as sensitive banking and credit information.
  • 8. Adware ● Adware is any software that, once installed on your computer, tracks your internet browsing habits and sends you popup containing advertisements related to the sites and topics you've visited. ● While this type of software may sound innocent, and even helpful, it consumes and slows down your computer's processor and internet connection speed. ● Additionally, some adware has keyloggers and spyware built into the program, leading to greater damage to your computer and possible invasion of your private data.
  • 9. Backdoor ● A backdoor is a method of bypassing normal authentication procedures. ● Once a system has been compromised one or more backdoors maybe installed in order to allow easier access in the future. ● Backdoors may also be installed prior to malicious software, to allow attackers entry. ● Crackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection.
  • 10. ● A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". ● Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes. Virus
  • 11. World’s 1st Computer Virus ● The first ever computer virus was developed in 1986 by two Pakistani brothers in Lahore Pakistan. ● It was named “Brain” and was designed by Amjad Farooq Alvi and Basit Farooq Alvi with the intention of discouraging the piracy of a software written by them.
  • 12. Types Of Computer Virus • Boot sector virus • Master Boot Record (MBR) virus • File infector virus • Macro virus
  • 13. BOOT SECTOR VIRUS: Boot sector viruses generally hide in the boot sector, either in the bootable disk or the hard drive. It attaches itself to the primary active partition of the hard disk that is read by the computer upon boot up. MASTER BOOT RECORD VIRUS: MBR viruses are memory-resident viruses that infect disks in the same manner as boot sector viruses. However it, infects the MBR of the system, gets activated when the BIOS activates the Master boot code. MBR infectors normally save a legitimate copy of the master boot record in an different location. Types Of Computer Virus
  • 14. File Infector Virus: File Infector viruses infect program files. Normally infect executable code, such as .COM, .SYS, .BAT and .EXE files. They can infect other files when an infected program is run from floppy, hard drive, or from the network. Many of these viruses are memory resident. After memory becomes infected, any uninfected executable file that runs becomes infected. Types Of Computer Virus
  • 15. Types Of Computer Virus Macro Virus: Macro are mini-programs which make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one. Macro viruses infect files that are created using certain applications or programs that contain macros. They are platform-independent since the virus itself are written in language of the application and not the operating system. They infect documents created from Microsoft Office Word, Excel, PowerPoint and Access files.
  • 17. An antivirus software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks. We should regularly run an antivirus program to scan and remove any possible virus attacks from a computer. AntiVirus
  • 18. They can provide real time protection against the installation of spywares on the computer. This type of spyware protection works the same way as that of anti-virus protection. It scans and blocks all incoming network threats as it comes across. It can be used solely for detection and removal of Spyware that has already been installed into the computer. Anti spyware scans the contents of the windows registry, operating system files, and installed programs on computer and will provide a list of any threats found. Anti-Spyware
  • 19. Using dictionary Approach: •The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary. •A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors. How an AntiVirus Works…
  • 20. How an AntiVirus Works… Using Suspicious Behavior Approach: •Antivirus software will constantly monitors the activity of all the programs. •If any program tries to write data on an executable file, the antivirus software will flag the program having a suspicious behavior, means the suspected program will be marked as a virus. •The advantage of this approach is that it can safeguard the computer against unknown viruses also. •The disadvantage is that it may create several false alerts too.
  • 21. Popular Anti-Virus And Anti-Spyware Softwares
  • 22. Anti-Virus & Anti-Spyware Is The Bodyguard Of Your System It Is Us Who Rules, Not Malwares
  • 23. • http://www.tech-faq.com/history-of-computer-viruses.html • http://spamlaws.com/history.html • http://en.wikipedia.org/wiki/Computer_virus#History • http://www.infoplease.com/ipa/A0872842.html References