SlideShare a Scribd company logo
Presented by- Joydip
What is computer virus?
 A Computer virus is a malicious software program
loaded onto a user’s knowledge and performs
malicious actions . it can self replicate, inserting itself
onto other programs or files ,infecting them in the
process .not all computer viruses are destructive tough.
Type of computer virus :
 Direct Action Virus. ...
 Browser Hijacker. ...
 Overwrite Virus. ...
 Web Scripting Virus. ...
 Boot Sector Virus. ...
 Macro Virus.
 Directory Virus
 Polymorphic Virus
 File Infector Virus
 Encrypted Virus
Direct Action Virus. ...
 Direct action viruses attack certain types of files,
typically .exe and .com files. The main purpose of this
virus is to replicate and infect files in folders. On the
lighter note, they do not typically delete files or affect
PC performance and speed. It can be easily removed by
antivirus programs
Browser Hijacker. ...
 This type of virus infects your web browser in which it
will bring you to different websites. Typically, if you
key in a domain name in the internet address bar, the
browser hijacker will open multiple fake websites that
may harm your computer. On the other hand, most
trusted browsers have built-in features to block them
ahead.
Overwrite Virus. ...
 From the name itself, this virus overwrites the content
of a file, losing the original content. It infects folders,
files, and even programs. To delete this virus, you also
need to get rid of your file. Thus, it is important to
back up your data.
Web Scripting Virus.
 This virus lives in certain links, ads, image placement,
videos, and layout of a website. These may carry
malicious codes in which when you click, the viruses
will be automatically downloaded or will direct you to
malicious websites.
Boot Sector Virus.
 Boot sector viruses affect floppy disks. They came to
existence when floppy disks are important in booting a
computer. Although they are not very common today,
it is still causing other computer units, especially the
outdated ones. Some examples include Poly boot . B
and Anti EXE.
Macro Virus
 Macro viruses target applications and software that
contain macros. These viruses can carry out series of
operations affecting the performance of the program
or software. Some examples of macro viruses are
O97M/Y2K, Bablas, Melissa.A, and Relax.
Directory Virus
 Directory viruses change file paths. When you run
programs and software that are infected with directory
viruses, the virus program also runs in the
background. Further, it may be difficult for you to
locate the original app or software once infected with
directory viruses
Polymorphic Virus
 Polymorphic viruses use a special method of encoding
or encryption every time they infect a system. With
this, antivirus software finds it hard to locate then
using signature searches. They are also capable of
replicating easily. Polymorphic viruses include Satan
Bug, Elkern, Tuareg, and Marburg
File Infector Virus
 This virus also infects executable files or programs.
When you run these programs, the file infector virus is
activated as well which can slow down the program
and produce other damaging effects. A large block of
existing viruses belongs to this category.
Encrypted Virus
 This type of virus uses encrypted malicious codes
which make antivirus software hard to detect them.
They can only be detected when they decrypt
themselves during replication. Although they don’t
delete files or folders, they can badly affect PC
performance.
causes of computer virus
 Some Common Sources of Computer Virus
Infection
Virus sources
 Downloading Programs. Programs that contains the
downloadable files are the commonest source of
malware such as freeware, worms, and other
executable files. ...
 Pirated or Cracked Software. ...
 Email Attachments. ...
 Internet. ...
 Booting Data from Unknown CDs. ...
 Bluetooth. ...
 Un patched Software.
What are the main causes of
computer virus Infections ?
 Computer virus infections are the nightmare of a business
owner. That’s hardly a surprise, though. After all, what business
owner wants to deal with computer infections that can cause
severe damage to their data and important documents?
 It’s no secret that computer viruses can cause companies to lose:
 Client data
 Customers
 Money
 Brand credibility
 And much more… However, these are the main concerns that take the
spotlight. That’s because they’re the ones that can cost you your
business. So it’s not surprising why many business owners worry about
their data and important documents being exploited. Well, the best
way to deal with these concerns is to learn where they come from.
how to protect computer from
viruses
 Keep software up to date. ...
 Don't click on links within emails. ...
 Use free antivirus software. ...
 Back up computer. ...
 Use a strong password. ...
 Use a firewall. ...
 Minimize downloads. ...
 Use a pop-up blocker.
Computer virus

More Related Content

What's hot

computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
Rohit Kashyap
 
Computer virus
Computer virusComputer virus
Computer virus
Walden University
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
Kriti kohli
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Annies Minu
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
INFONAUTICS GmbH
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
wargames12
 
Computer virus
Computer virusComputer virus
Computer virus
Ra Bia
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
jangezkhan
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Computer virus
Computer virusComputer virus
Computer virus
Utchi
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
casyrichard
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
pratikpandya18
 

What's hot (20)

computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Computer security and
Computer security andComputer security and
Computer security and
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 

Similar to Computer virus

What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
BESOR ACADEMY
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
Abdullah-Al- Mahmud
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
 

Similar to Computer virus (20)

What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computervirus
Computervirus Computervirus
Computervirus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 

Recently uploaded

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

Computer virus

  • 2. What is computer virus?  A Computer virus is a malicious software program loaded onto a user’s knowledge and performs malicious actions . it can self replicate, inserting itself onto other programs or files ,infecting them in the process .not all computer viruses are destructive tough.
  • 3. Type of computer virus :  Direct Action Virus. ...  Browser Hijacker. ...  Overwrite Virus. ...  Web Scripting Virus. ...  Boot Sector Virus. ...  Macro Virus.  Directory Virus  Polymorphic Virus  File Infector Virus  Encrypted Virus
  • 4. Direct Action Virus. ...  Direct action viruses attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate and infect files in folders. On the lighter note, they do not typically delete files or affect PC performance and speed. It can be easily removed by antivirus programs
  • 5. Browser Hijacker. ...  This type of virus infects your web browser in which it will bring you to different websites. Typically, if you key in a domain name in the internet address bar, the browser hijacker will open multiple fake websites that may harm your computer. On the other hand, most trusted browsers have built-in features to block them ahead.
  • 6. Overwrite Virus. ...  From the name itself, this virus overwrites the content of a file, losing the original content. It infects folders, files, and even programs. To delete this virus, you also need to get rid of your file. Thus, it is important to back up your data.
  • 7. Web Scripting Virus.  This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry malicious codes in which when you click, the viruses will be automatically downloaded or will direct you to malicious websites.
  • 8. Boot Sector Virus.  Boot sector viruses affect floppy disks. They came to existence when floppy disks are important in booting a computer. Although they are not very common today, it is still causing other computer units, especially the outdated ones. Some examples include Poly boot . B and Anti EXE.
  • 9. Macro Virus  Macro viruses target applications and software that contain macros. These viruses can carry out series of operations affecting the performance of the program or software. Some examples of macro viruses are O97M/Y2K, Bablas, Melissa.A, and Relax.
  • 10. Directory Virus  Directory viruses change file paths. When you run programs and software that are infected with directory viruses, the virus program also runs in the background. Further, it may be difficult for you to locate the original app or software once infected with directory viruses
  • 11. Polymorphic Virus  Polymorphic viruses use a special method of encoding or encryption every time they infect a system. With this, antivirus software finds it hard to locate then using signature searches. They are also capable of replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and Marburg
  • 12. File Infector Virus  This virus also infects executable files or programs. When you run these programs, the file infector virus is activated as well which can slow down the program and produce other damaging effects. A large block of existing viruses belongs to this category.
  • 13. Encrypted Virus  This type of virus uses encrypted malicious codes which make antivirus software hard to detect them. They can only be detected when they decrypt themselves during replication. Although they don’t delete files or folders, they can badly affect PC performance.
  • 14. causes of computer virus  Some Common Sources of Computer Virus Infection
  • 15. Virus sources  Downloading Programs. Programs that contains the downloadable files are the commonest source of malware such as freeware, worms, and other executable files. ...  Pirated or Cracked Software. ...  Email Attachments. ...  Internet. ...  Booting Data from Unknown CDs. ...  Bluetooth. ...  Un patched Software.
  • 16. What are the main causes of computer virus Infections ?  Computer virus infections are the nightmare of a business owner. That’s hardly a surprise, though. After all, what business owner wants to deal with computer infections that can cause severe damage to their data and important documents?  It’s no secret that computer viruses can cause companies to lose:  Client data  Customers  Money  Brand credibility  And much more… However, these are the main concerns that take the spotlight. That’s because they’re the ones that can cost you your business. So it’s not surprising why many business owners worry about their data and important documents being exploited. Well, the best way to deal with these concerns is to learn where they come from.
  • 17. how to protect computer from viruses  Keep software up to date. ...  Don't click on links within emails. ...  Use free antivirus software. ...  Back up computer. ...  Use a strong password. ...  Use a firewall. ...  Minimize downloads. ...  Use a pop-up blocker.