Computer viruses are small programs that spread from one computer to another and interfere with operations. They are deliberately created by programmers or virus creation software. Viruses enter computers through email attachments, downloads, or infected files on removable drives. Symptoms of viruses include programs taking longer to load, changing file sizes or drive lights flashing unexpectedly. Common types are Trojan horses, worms, and boot sector viruses. Users can avoid viruses by only opening trusted email attachments, backing up files, and using updated antivirus software.
1. What is a computer security risk?
2. Virus
3. Trojan Horse
4. Worms
5. Stand-Alone Utility Programs
6. How can a virus spread through an e-mail message?
7. How does an antivirus program inoculate a program file
?
8. What is a firewall?
.
1.What is computer virus?
2.About Virus.
3.Technology
the computer virus is the major thing that is slowdown our pc or laptops thats why we try to remve virus with the help of antivirus...
1. What is a computer security risk?
2. Virus
3. Trojan Horse
4. Worms
5. Stand-Alone Utility Programs
6. How can a virus spread through an e-mail message?
7. How does an antivirus program inoculate a program file
?
8. What is a firewall?
.
1.What is computer virus?
2.About Virus.
3.Technology
the computer virus is the major thing that is slowdown our pc or laptops thats why we try to remve virus with the help of antivirus...
The virus then spreads through the software or document that it is connected to via drives, networks, file-sharing applications, or virus-infected attachments to emails.
Read how to turn off malwarebytes notifications
Computer Virus, Types of Viruses, Working of Virus, Methods to Prevent From Virus, How Virus Spreads, How a computer gets a virus, How are viruses removed, What is antivirus, How anti virus works,
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
3. What are Computer Viruses
Computer Viruses are small
software programs that are
designed to spread from one
computer to another and to
interfere with computer
operation.
4. Why people create computer
viruses
Computer viruses do not come into existence
spontaneously. They are deliberately created
by programmers, or by people who use virus
creation software.
Virus writers can have various reasons for creating and
spreading malware. Viruses have been written as
research projects, pranks, to attack the products of
specific companies, to distribute political messages, and
financial gain from identity theft, spyware, and cryptoviral
extortion. Some virus writers consider their creations to be
works of art, and see virus writing as a creative hobby.
5. Ways computer viruses enter your computer
Viruses are most easily spread by
attachments in e-mail messages or instant
messaging messages. That is why it is
essential that you never open e-mail
attachments unless you know who it's from
and you are expecting it.
Viruses can be disguised as attachments of
funny images, greeting cards, or audio
and video files. Viruses also spread
through downloads on the Internet. They
can be hidden in illicit software or other
files or programs you might download.
6. How to detect virus?
Some Symptoms
q Program takes longer to load.
q The program size keeps changing.
q The drive light keeps flashing when you are
not doing anything.
q User created files have strange names.
q The computer doesn't remember CMOS
settings.
7. Examples of computer viruses
Trojan Horse:
A destructive program that
masquerades as a benign
application. Unlike viruses, Trojan
horses do not replicate themselves
but they can be just as destructive.
One of the most insidious types of
Trojan horse is a program that claims
to rid your computer of viruses but
instead introduces viruses onto your
computer.
8. Worm:
A worm is similar to a virus by its design,
and is considered to be a sub-class of a
virus. Worms spread from computer to
computer, but unlike a virus, it has the
capability to travel without any help from
a person. A worm takes advantage of file
or information transport features on your
system, which allows it to travel unaided.
The biggest danger with a worm is its
capability to replicate itself on your
system, so rather than your computer
sending out a single worm, it could send
out hundreds or thousands of copies of
itself, creating a huge devastating effect.
9. Boot sector Virus :
A virus which attaches itself to the first part
of the hard disk that is read by the
computer upon boot up. These are
normally spread by floppy disks.
Macro Virus:
Macro viruses are viruses that use another
application's macro programming
language to distribute themselves. They
infect documents such as MS Word or MS
Excel and are typically spread to other
similar documents.
Memory Resident Viruses:
Memory Resident Viruses reside in a
computers volatile memory (RAM). They
are initiated from a virus which runs on the
computer and they stay in memory after
it's initiating program closes.
10. Spy ware
Spyware, on the other hand, is generally not
designed to damage your computer. Spyware
is broadly defined as any program that gets
into your computer without permission and
hides in the background while it makes
unwanted changes to your user experience.
Most spyware targets only the Windows
operating system. Some of the more
notorious spyware companies include Gator,
Bonzi Buddy, 180 Solutions, DirectRevenue,
Cydoor, CoolWebSearch, Xupiter, XXXDial
and Euniverse.
11. How Did it Get on Your Computer?
Spyware usually gets onto your machine
because of something you do, like clicking a
button on a pop-up window, installing a
software package or agreeing to add
functionality to your Web browser
12. How Did it Get on Your Computer?
Drive-by download - This is when a Web site or
pop-up window automatically tries to download
and install spyware on your machine
Browser add-ons - These are pieces of software
that add enhancements to your Web browser,
like a toolbar, animated pal or additional search
box.
browser hijackers -- these embed themselves
deeply in your machine and take quite a bit of
work to get rid of.
13. Steps to avoid virus
Don’t open e-mail that you are not sure.
All thumb drive(Pendrive) need to scan by
anti-virus software.
Always scan your PC with anti-virus software.
14. How to protect your computer from
computer viruses
Only open e-mail attachments received
from sources you trust and that you are
expecting.
Back up your hard drive files frequently and
maintain multiple backup sets.
If you are experiencing unusually slow
performance, apparent file loss or
damage, or other abnormalities,
immediately check your hard drives and
diskettes for infection.
15. •Delete chain emails and junk email. Do not
forward or reply to any to them.
These types of email are considered spam, which is
unsolicited, intrusive mail that clogs up the
network.
•
•Download software only from sites you are
familiar with, and immediately check it with your
anti-virus software.
•
•Don't spread hoaxes and rumors.
16. TOP 10 ANTIVIRUS OF 2017
1. McAfee AntiVirus Plus
2. Symantec Norton AntiVirus Basic
3. Webroot SecureAnywhere AntiVirus
4. Bitdefender Antivirus Plus
5. Kaspersky Anti-Virus
6. Avast Pro Antivirus 2017
7. Emsisoft Anti-Malware 2017
8. ESET NOD32 Antivirus
9. F-Secure Anti-Virus (2017)
10.Trend Micro Antivirus+ Security
19. References
http://www.webopedia.com/DidYouKnow/Internet/2004/vi
- The Difference Between a Virus, Worm, and
Trojan Horse.
http://en.wikipedia.org/wiki/Computer_virus -
Computer Virus
http://www.microsoft.com/protect/computer/basics/virus.m
- What is Computer Viruses
http://www.soe.umich.edu/computingnetwork/howto/avo
- How To Avoid Computer Viruses