SlideShare a Scribd company logo
Presented by:
Bennette Osae Addo.
ICT Teacher-GCIHS
COMPUTER VIRUS
What are Computer Viruses
Computer Viruses are small
software programs that are
designed to spread from one
computer to another and to
interfere with computer
operation.
Why people create computer
viruses
 Computer viruses do not come into existence
spontaneously. They are deliberately created
by programmers, or by people who use virus
creation software.
Virus writers can have various reasons for creating and
spreading malware. Viruses have been written as
research projects, pranks, to attack the products of
specific companies, to distribute political messages, and
financial gain from identity theft, spyware, and cryptoviral
extortion. Some virus writers consider their creations to be
works of art, and see virus writing as a creative hobby.
Ways computer viruses enter your computer
 Viruses are most easily spread by
attachments in e-mail messages or instant
messaging messages. That is why it is
essential that you never open e-mail
attachments unless you know who it's from
and you are expecting it.
 Viruses can be disguised as attachments of
funny images, greeting cards, or audio
and video files. Viruses also spread
through downloads on the Internet. They
can be hidden in illicit software or other
files or programs you might download.

How to detect virus?
Some Symptoms
q Program takes longer to load.
q The program size keeps changing.
q The drive light keeps flashing when you are
not doing anything.
q User created files have strange names.
q The computer doesn't remember CMOS
settings.
Examples of computer viruses
 Trojan Horse:
A destructive program that
masquerades as a benign
application. Unlike viruses, Trojan
horses do not replicate themselves
but they can be just as destructive.

One of the most insidious types of
Trojan horse is a program that claims
to rid your computer of viruses but
instead introduces viruses onto your
computer.

 Worm:
A worm is similar to a virus by its design,
and is considered to be a sub-class of a
virus. Worms spread from computer to
computer, but unlike a virus, it has the
capability to travel without any help from
a person. A worm takes advantage of file
or information transport features on your
system, which allows it to travel unaided.
 The biggest danger with a worm is its
capability to replicate itself on your
system, so rather than your computer
sending out a single worm, it could send
out hundreds or thousands of copies of
itself, creating a huge devastating effect.
 Boot sector Virus :
A virus which attaches itself to the first part
of the hard disk that is read by the
computer upon boot up. These are
normally spread by floppy disks.
Macro Virus:
Macro viruses are viruses that use another
application's macro programming
language to distribute themselves. They
infect documents such as MS Word or MS
Excel and are typically spread to other
similar documents.
Memory Resident Viruses:
Memory Resident Viruses reside in a
computers volatile memory (RAM). They
are initiated from a virus which runs on the
computer and they stay in memory after
it's initiating program closes.
Spy ware
 Spyware, on the other hand, is generally not
designed to damage your computer. Spyware
is broadly defined as any program that gets
into your computer without permission and
hides in the background while it makes
unwanted changes to your user experience.
 Most spyware targets only the Windows
operating system. Some of the more
notorious spyware companies include Gator,
Bonzi Buddy, 180 Solutions, DirectRevenue,
Cydoor, CoolWebSearch, Xupiter, XXXDial
and Euniverse.

How Did it Get on Your Computer?
 Spyware usually gets onto your machine
because of something you do, like clicking a
button on a pop-up window, installing a
software package or agreeing to add
functionality to your Web browser

How Did it Get on Your Computer?
 Drive-by download - This is when a Web site or
pop-up window automatically tries to download
and install spyware on your machine
 Browser add-ons - These are pieces of software
that add enhancements to your Web browser,
like a toolbar, animated pal or additional search
box.
 browser hijackers -- these embed themselves
deeply in your machine and take quite a bit of
work to get rid of.
Steps to avoid virus
 Don’t open e-mail that you are not sure.
 All thumb drive(Pendrive) need to scan by
anti-virus software.

 Always scan your PC with anti-virus software.
How to protect your computer from
computer viruses
 Only open e-mail attachments received
from sources you trust and that you are
expecting.

 Back up your hard drive files frequently and
maintain multiple backup sets.

 If you are experiencing unusually slow
performance, apparent file loss or
damage, or other abnormalities,
immediately check your hard drives and
diskettes for infection.
•Delete chain emails and junk email. Do not
forward or reply to any to them.
These types of email are considered spam, which is
unsolicited, intrusive mail that clogs up the
network.
•
•Download software only from sites you are
familiar with, and immediately check it with your
anti-virus software.
•
•Don't spread hoaxes and rumors.
TOP 10 ANTIVIRUS OF 2017
1. McAfee AntiVirus Plus
2. Symantec Norton AntiVirus Basic
3. Webroot SecureAnywhere AntiVirus
4. Bitdefender Antivirus Plus
5. Kaspersky Anti-Virus
6. Avast Pro Antivirus 2017
7. Emsisoft Anti-Malware 2017
8. ESET NOD32 Antivirus
9. F-Secure Anti-Virus (2017)
10.Trend Micro Antivirus+ Security
End
References
 http://www.webopedia.com/DidYouKnow/Internet/2004/vi
- The Difference Between a Virus, Worm, and
Trojan Horse.
 http://en.wikipedia.org/wiki/Computer_virus -
Computer Virus
 http://www.microsoft.com/protect/computer/basics/virus.m
- What is Computer Viruses
 http://www.soe.umich.edu/computingnetwork/howto/avo
- How To Avoid Computer Viruses

More Related Content

What's hot

Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
computer virus
computer viruscomputer virus
computer virus
Kunal Yadav
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100701982
 
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Aritra Das
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
Study Hub
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
jenniel143
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
Yo Maruf
 
Virus
VirusVirus
Virus
Protik Roy
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
QuratNaeem
 

What's hot (20)

Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus
computer viruscomputer virus
computer virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Virus
VirusVirus
Virus
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 

Similar to Computer virus

Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesadni_shadah
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Virus
VirusVirus
Virus
dddaou
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
Shwana M
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Virus
VirusVirus
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Computer virus
Computer virusComputer virus
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
Bashdar Rahman
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 

Similar to Computer virus (20)

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Sowmya
SowmyaSowmya
Sowmya
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus
VirusVirus
Virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
virus
virusvirus
virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 

Computer virus

  • 1. Presented by: Bennette Osae Addo. ICT Teacher-GCIHS COMPUTER VIRUS
  • 2.
  • 3. What are Computer Viruses Computer Viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
  • 4. Why people create computer viruses  Computer viruses do not come into existence spontaneously. They are deliberately created by programmers, or by people who use virus creation software. Virus writers can have various reasons for creating and spreading malware. Viruses have been written as research projects, pranks, to attack the products of specific companies, to distribute political messages, and financial gain from identity theft, spyware, and cryptoviral extortion. Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby.
  • 5. Ways computer viruses enter your computer  Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.  Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. 
  • 6. How to detect virus? Some Symptoms q Program takes longer to load. q The program size keeps changing. q The drive light keeps flashing when you are not doing anything. q User created files have strange names. q The computer doesn't remember CMOS settings.
  • 7. Examples of computer viruses  Trojan Horse: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.  One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. 
  • 8.  Worm: A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided.  The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.
  • 9.  Boot sector Virus : A virus which attaches itself to the first part of the hard disk that is read by the computer upon boot up. These are normally spread by floppy disks. Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volatile memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.
  • 10. Spy ware  Spyware, on the other hand, is generally not designed to damage your computer. Spyware is broadly defined as any program that gets into your computer without permission and hides in the background while it makes unwanted changes to your user experience.  Most spyware targets only the Windows operating system. Some of the more notorious spyware companies include Gator, Bonzi Buddy, 180 Solutions, DirectRevenue, Cydoor, CoolWebSearch, Xupiter, XXXDial and Euniverse. 
  • 11. How Did it Get on Your Computer?  Spyware usually gets onto your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser 
  • 12. How Did it Get on Your Computer?  Drive-by download - This is when a Web site or pop-up window automatically tries to download and install spyware on your machine  Browser add-ons - These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box.  browser hijackers -- these embed themselves deeply in your machine and take quite a bit of work to get rid of.
  • 13. Steps to avoid virus  Don’t open e-mail that you are not sure.  All thumb drive(Pendrive) need to scan by anti-virus software.   Always scan your PC with anti-virus software.
  • 14. How to protect your computer from computer viruses  Only open e-mail attachments received from sources you trust and that you are expecting.   Back up your hard drive files frequently and maintain multiple backup sets.   If you are experiencing unusually slow performance, apparent file loss or damage, or other abnormalities, immediately check your hard drives and diskettes for infection.
  • 15. •Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network. • •Download software only from sites you are familiar with, and immediately check it with your anti-virus software. • •Don't spread hoaxes and rumors.
  • 16. TOP 10 ANTIVIRUS OF 2017 1. McAfee AntiVirus Plus 2. Symantec Norton AntiVirus Basic 3. Webroot SecureAnywhere AntiVirus 4. Bitdefender Antivirus Plus 5. Kaspersky Anti-Virus 6. Avast Pro Antivirus 2017 7. Emsisoft Anti-Malware 2017 8. ESET NOD32 Antivirus 9. F-Secure Anti-Virus (2017) 10.Trend Micro Antivirus+ Security
  • 17.
  • 18. End
  • 19. References  http://www.webopedia.com/DidYouKnow/Internet/2004/vi - The Difference Between a Virus, Worm, and Trojan Horse.  http://en.wikipedia.org/wiki/Computer_virus - Computer Virus  http://www.microsoft.com/protect/computer/basics/virus.m - What is Computer Viruses  http://www.soe.umich.edu/computingnetwork/howto/avo - How To Avoid Computer Viruses