SlideShare a Scribd company logo
Presentation by
       Bisma khan class VIB
White house grammer school,karachi.
What  is computer virus ?
Types of computer virus?
What a computer virus do?
•Prevention from computer virus
Best antivirus software.
A computer virus is a software
program with a ability to make copies
of itself ,which attacks itself to other
applications or files.
There are three types of computer virus
Bootvirus
Program virus
Micro virus
Boot viruses infects the boot records of
hard disk and floppy disks.generally
These are considered more dangerous
than program viruses.
these viruses infects program files,whic
-h have extensions such as
.COM,.EXE.,SYS.,DLL,.OVL, or
.SCR.program files are attractive
targets for computer virus because
they are widely used and have
relativity,simple formates to which
viruses can attach themselves.
These viruses infects data files.for
example,microsoft,word document and
template files are suspectible to macro
virus attacks they spread rapidly as
infected documents are shared on
networks or downloaded from internet
sites.
a virus tries to take control of computer
system it has infected at the first
oppurtunity availible.it makes copies
of itself and also try to carry harmful
task written in its program.this process
can happen so quicly that the user is
not even aware of the presense of a
virus in his/her computer.
Nortion antivirus.
Mcaffee virus scan

Kaspersky antivirus
Norton antivirus is a product of symantec
corporation.founded in 1982.
Notion check the following program
•Boot record s

•Programs(at the time you used them)

•All local hard drives,

•Files download from internet,

•Usbs(when in use)
McAfee, Inc. is an antivirus software and
       computer security company
headquartered in Santa Clara, California.
It markets McAfee VirusScan and related
security products and services, including
     the IntruShield, Entercept, and
          Foundstone brands. ...
Kespersky is product of kaspersky lab,
A russian computer security company,
•Co-founded by natalya kaspersky
antivirus,do the following things
•Invites virus scan by opening the
kaspersky antivirus window.

More Related Content

What's hot

Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
Kriti kohli
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Malware
MalwareMalware
Computer Virus
Computer VirusComputer Virus
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
Tamim Ahmed
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Annies Minu
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 

What's hot (20)

Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Malware
MalwareMalware
Malware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Spyware
SpywareSpyware
Spyware
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked

Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint Presentation
N V Amruth Varma
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
Mahamudul Hassan Niaz
 
Computer virus
Computer virusComputer virus
Computer virus
Ra Bia
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 

Viewers also liked (6)

Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint Presentation
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Similar to Computer virus 1

Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................
vndoon
 
virus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdfvirus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdf
SamiAAli44
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
computer Virus
computer Virus computer Virus
computer Virus
VC Infotech
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Neeraj Bhandari
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
Rakibul islam
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
COMPUTER VIRUS.pptx
COMPUTER  VIRUS.pptxCOMPUTER  VIRUS.pptx
COMPUTER VIRUS.pptx
DiveshRajpoot
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
QuratNaeem
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
Pratimesh Pathak
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
Yastee Shah
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 

Similar to Computer virus 1 (20)

Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................
 
virus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdfvirus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdf
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
computer Virus
computer Virus computer Virus
computer Virus
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
COMPUTER VIRUS.pptx
COMPUTER  VIRUS.pptxCOMPUTER  VIRUS.pptx
COMPUTER VIRUS.pptx
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Computer virus 1

  • 1. Presentation by Bisma khan class VIB White house grammer school,karachi.
  • 2. What is computer virus ? Types of computer virus? What a computer virus do? •Prevention from computer virus Best antivirus software.
  • 3. A computer virus is a software program with a ability to make copies of itself ,which attacks itself to other applications or files.
  • 4. There are three types of computer virus Bootvirus Program virus Micro virus
  • 5. Boot viruses infects the boot records of hard disk and floppy disks.generally These are considered more dangerous than program viruses.
  • 6. these viruses infects program files,whic -h have extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or .SCR.program files are attractive targets for computer virus because they are widely used and have relativity,simple formates to which viruses can attach themselves.
  • 7. These viruses infects data files.for example,microsoft,word document and template files are suspectible to macro virus attacks they spread rapidly as infected documents are shared on networks or downloaded from internet sites.
  • 8. a virus tries to take control of computer system it has infected at the first oppurtunity availible.it makes copies of itself and also try to carry harmful task written in its program.this process can happen so quicly that the user is not even aware of the presense of a virus in his/her computer.
  • 9. Nortion antivirus. Mcaffee virus scan Kaspersky antivirus
  • 10. Norton antivirus is a product of symantec corporation.founded in 1982. Notion check the following program •Boot record s •Programs(at the time you used them) •All local hard drives, •Files download from internet, •Usbs(when in use)
  • 11. McAfee, Inc. is an antivirus software and computer security company headquartered in Santa Clara, California. It markets McAfee VirusScan and related security products and services, including the IntruShield, Entercept, and Foundstone brands. ...
  • 12. Kespersky is product of kaspersky lab, A russian computer security company, •Co-founded by natalya kaspersky antivirus,do the following things •Invites virus scan by opening the kaspersky antivirus window.