SlideShare a Scribd company logo
1 of 19
Computer Virus
Presented by
V.Santhi
Assistant Professor
Department of Computer Applications
Bon Secours College for Women
Thanjavur
Virus
• A virus is a program
designed by a
computer programmer
(malicious hacker) to
do a certain unwanted
function.
• Computer virus refers to
a program which
damages computer
systems and/or
destroys or erases data
files
• A Computer Virus is a program that can copy
itself and infect a computer without the
permission or knowledge of the user.
• A Computer Virus has 2 major characteristics:
the ability to replicate itself, and the ability to
attach itself to another computer file...
• Computer Viruses affect the computerin many
ways. It can destroy data, files or programs
and cause the system malfunction. The
destructive effects of viruses are different
according to their types.
Symptoms
The following are a few Symptoms that your
computer might have a virus:
• Slow response and slow program execution.
• Random hard drive crashes and restarts.
• Distorted graphics and text.
• Files that have mysteriously vanished.
• Extensive pop-up ads.
• Inability to open files with existing passwords.
Types of Computer Virus
•Time Bomb
•Logical Bomb
•Worm
•Boot Sector Virus
•Macros Virus
•Trojan Horse
•Script Virus
Time Bomb
A time bomb is a virus program
that performs an activity on a
particular date
Logical Bomb
A logical bomb is a destructive
program that performs an activity
when a certain action has occurred.
Worm Virus
A worm is also a destructive
program that fills a computer
system with self-replicating
information, clogging the system so
that its operations are slowed
down or stopped
Boot Sector Virus
A boot sector virus infects boot
sector of computers. During system
boot, boot sector virus is loaded
into main memory and destroys
data stored in hard disk
Macro Virus
A macro virus is associated with
application software like word and
excel. When opening the infected
document, macro virus is loaded
into main memory and destroys the
data stored in hard disk
Script Virus
Commonly found script viruses are
written using the Visual Basic
Scripting edition (VBS) and the
JavaScript programming languages
Trojan Horse
Trojan Horse is a destructive
program. It usually pretends as
computer games or application
software. If executed, computer
system will be damaged.
Trojan Horse
Trojan Horse usually comes with
monitoring tools and key loggers
WHAT A COMPUTER VIRUS DO?
SLOW DOWN
THE NETWORK
HIJACK YOUR
COMPUTER
STEAL
CONFIDENTIAL
DATA
DELETE DATADISPLAY
MESSAGES
DISABLE
HARDWARE
CORRUPT DATA
Kespersky Antivirus
Data fellows E-Plot
Mcafee Antivirus
Symantec Norton Antivirus
Bit Defender 2010
Quick Heal Antivirus
ESaSS ThunderBYTE
Actions to prevent virus infection
•Always update your anti-virus
software at least weekly.
•Back up your important files and
ensure that they can be restored.
•Change the computer's boot
sequence to always start the PC
from its hard drive
Actions to prevent virus infection
•Don't share Drive C: without a
password and without read-only
restrictions.
•Empty floppy drives of diskettes
before turning on computers,
especially laptops.
Actions to prevent virus infection
•Forget opening unexpected e-mail
attachments, even if they're from
friends
•Get trained on your computer's
anti-virus software and use it.
•Have multiple backups of
important files. This lowers the
chance that all are infected.
Actions to prevent virus infection
•Install security updates for your
operating system and programs as
soon as possible.
•Jump at the chance to learn more
about your computer. This will help
you spot viruses.

More Related Content

What's hot

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 

What's hot (20)

Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 

Similar to Computer virus

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
Anuj Pawar
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 

Similar to Computer virus (20)

Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virusppt
ViruspptVirusppt
Virusppt
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
computer virus, presented by Carin Maharjan
computer virus, presented by Carin Maharjancomputer virus, presented by Carin Maharjan
computer virus, presented by Carin Maharjan
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 

More from SanthiNivas

More from SanthiNivas (20)

packages.ppt
packages.pptpackages.ppt
packages.ppt
 
exception-handling-in-java.ppt
exception-handling-in-java.pptexception-handling-in-java.ppt
exception-handling-in-java.ppt
 
Introduction to PHP.ppt
Introduction to PHP.pptIntroduction to PHP.ppt
Introduction to PHP.ppt
 
static methods.pptx
static methods.pptxstatic methods.pptx
static methods.pptx
 
Topologies.ppt
Topologies.pptTopologies.ppt
Topologies.ppt
 
transmission media.ppt
transmission media.ppttransmission media.ppt
transmission media.ppt
 
Internet Basics Presentation.pptx
Internet Basics Presentation.pptxInternet Basics Presentation.pptx
Internet Basics Presentation.pptx
 
Topologies.ppt
Topologies.pptTopologies.ppt
Topologies.ppt
 
Features of Java.pptx
Features of Java.pptxFeatures of Java.pptx
Features of Java.pptx
 
Output Devices.pptx
Output Devices.pptxOutput Devices.pptx
Output Devices.pptx
 
Input Devices.pptx
Input Devices.pptxInput Devices.pptx
Input Devices.pptx
 
Operating System File Management Unit v.pptx
Operating System File Management Unit v.pptxOperating System File Management Unit v.pptx
Operating System File Management Unit v.pptx
 
Input and Output Devices
Input and Output DevicesInput and Output Devices
Input and Output Devices
 
HTML
HTMLHTML
HTML
 
DDA ALGORITHM.pdf
DDA ALGORITHM.pdfDDA ALGORITHM.pdf
DDA ALGORITHM.pdf
 
Computer Graphics Unit 2
Computer Graphics Unit 2Computer Graphics Unit 2
Computer Graphics Unit 2
 
Computer Graphics
Computer GraphicsComputer Graphics
Computer Graphics
 
Page Layout and Background
Page Layout and BackgroundPage Layout and Background
Page Layout and Background
 
3-D Transformation in Computer Graphics
3-D Transformation in Computer Graphics3-D Transformation in Computer Graphics
3-D Transformation in Computer Graphics
 
4. THREE DIMENSIONAL DISPLAY METHODS
4.	THREE DIMENSIONAL DISPLAY METHODS4.	THREE DIMENSIONAL DISPLAY METHODS
4. THREE DIMENSIONAL DISPLAY METHODS
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Computer virus

  • 1. Computer Virus Presented by V.Santhi Assistant Professor Department of Computer Applications Bon Secours College for Women Thanjavur
  • 2. Virus • A virus is a program designed by a computer programmer (malicious hacker) to do a certain unwanted function. • Computer virus refers to a program which damages computer systems and/or destroys or erases data files
  • 3. • A Computer Virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. • A Computer Virus has 2 major characteristics: the ability to replicate itself, and the ability to attach itself to another computer file... • Computer Viruses affect the computerin many ways. It can destroy data, files or programs and cause the system malfunction. The destructive effects of viruses are different according to their types.
  • 4. Symptoms The following are a few Symptoms that your computer might have a virus: • Slow response and slow program execution. • Random hard drive crashes and restarts. • Distorted graphics and text. • Files that have mysteriously vanished. • Extensive pop-up ads. • Inability to open files with existing passwords.
  • 5. Types of Computer Virus •Time Bomb •Logical Bomb •Worm •Boot Sector Virus •Macros Virus •Trojan Horse •Script Virus
  • 6. Time Bomb A time bomb is a virus program that performs an activity on a particular date
  • 7. Logical Bomb A logical bomb is a destructive program that performs an activity when a certain action has occurred.
  • 8. Worm Virus A worm is also a destructive program that fills a computer system with self-replicating information, clogging the system so that its operations are slowed down or stopped
  • 9. Boot Sector Virus A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk
  • 10. Macro Virus A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk
  • 11. Script Virus Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages
  • 12. Trojan Horse Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.
  • 13. Trojan Horse Trojan Horse usually comes with monitoring tools and key loggers
  • 14. WHAT A COMPUTER VIRUS DO? SLOW DOWN THE NETWORK HIJACK YOUR COMPUTER STEAL CONFIDENTIAL DATA DELETE DATADISPLAY MESSAGES DISABLE HARDWARE CORRUPT DATA
  • 15. Kespersky Antivirus Data fellows E-Plot Mcafee Antivirus Symantec Norton Antivirus Bit Defender 2010 Quick Heal Antivirus ESaSS ThunderBYTE
  • 16. Actions to prevent virus infection •Always update your anti-virus software at least weekly. •Back up your important files and ensure that they can be restored. •Change the computer's boot sequence to always start the PC from its hard drive
  • 17. Actions to prevent virus infection •Don't share Drive C: without a password and without read-only restrictions. •Empty floppy drives of diskettes before turning on computers, especially laptops.
  • 18. Actions to prevent virus infection •Forget opening unexpected e-mail attachments, even if they're from friends •Get trained on your computer's anti-virus software and use it. •Have multiple backups of important files. This lowers the chance that all are infected.
  • 19. Actions to prevent virus infection •Install security updates for your operating system and programs as soon as possible. •Jump at the chance to learn more about your computer. This will help you spot viruses.