SlideShare a Scribd company logo
Created by Mark Anthony P. Maranga
 To learn deeper of what computer virus is
 To be immune of any computer virus attack
 To be able defend against computer virus
 What is computer virus?
 Why do people create computer virus?
 Brief History of computer virus?
 How will you know you have a computer
virus?
 Different types of computer viruses
 Ways to prevent computer virus
 List of trusted free antivirus
A computer virus
is a program
designed to harm
or cause harm on
an infected
computer.
To gain control
of or hack a
computer and
use it for
specific tasks.
 To generate money
by using such
malware as a cash
machine.
 To steal sensitive
information (credit
card number,
password, personal
details, date, etc.)
 To prove that they
are capable of
writing virus.
 Revenge against
company, cripple a
computer or
network.
 John von
Neumann
 came up with
the theory about
self-replicating
programs in 1949.
 Fred Cohen
 comes up with the
term “computer
virus”
 Core Wars
 An application not
release until 1984.
 It replicates itself
every single time
it was run in
computer
 Reaper
 Antivirus
application
specifically
designed to
destroy core wars
of an infected
computers.
 MS-DOS
 Most popular OS
when viruses
becoming thick
and fast.
 The most targeted
OS by “the brain”
virus which release
in Pakistan in
1986.
 1988 Morris Worm
for MSDOS
 Created by Robert
Morris, 23, a small
virus that infected
almost 6,000
computers
 Melissa Virus
 It managed to
infect thousands of
computers at an
alarming speed,
causing over $80
million in damages
 I Love You Virus
 It managed to
infect millions of
computers in just
under a day
 The virus sent
usernames and
passwords it found
on the infected
computer back to
the author
 Code Red virus
 It infected over
700,000 of
computers,
causing damages
in excess of $2
billion
 no more notable
viruses appeared
due to
sophisticated
antivirus and
firewall systems
 Your computer
runs unusually
slow or freezes
 People are
receiving emails
from you which
you did not send
 You get pop-up
messages or
advertisements
 Slower than usual
network or
Internet speed
 Files mysteriously
appear or
disappear from
your computer
 Your homepage
changes and you
can not change it
back
 Your hard drive
free space keeps
shrinking
 Macro Viruses
 These viruses infect the files created using some
applications or programs that contain macros
such as doc, pps, xls and mdb.
 They automatically infect the files with macros
and also templates and documents that are
contained in the file. They hide in documents
shared through e-mail and networks.
 Macro viruses include:
 Relax
 bablas
 Melissa.A
 097M/Y2K
 Memory Resident Viruses
 They usually fix themselves inside the
computer memory. They get activated every
time the OS runs and end up infecting other
opened files. They hide in RAM.
 Memory Resident Viruses Include:
 CMJ
 meve
 randex
 mrklunky
 Overwrite Viruses
 These types of viruses delete any information
in a file they infect, leaving them partially or
completely useless once they are infected.
Once in the computer, they replaces all the
file content but the file size doesn’t change.
 Overwrite Viruses Include:
 Trj.Reboot
 way
 trivial.88.D
 Direct Action Viruses
 These viruses mainly replicate or take action
once they are executed.
 When a certain condition is met, the viruses
will act by infecting the files in the directory
or the folder specified in the AUTOEXEC.BAT.
 The viruses are generally found in the hard
disk’s root directory, but they keep on
changing location.
 Direct Action Viruses Include:
 Vienna virus
 Directory Virus
 Also known as cluster virus or file system
virus.
 They infect the computer’s directory by
changing the path indicating file location.
 They are usually located in the disk but
affect the entire directory.
 Directory Viruses Include:
 dir-2 virus
 Web Scripting Virus
 Most web pages include some complex codes
in order to create an interactive and
interesting content.
 Such a code is often exploited to cause
certain undesirable actions.
 They mostly originate from the infected web
pages or browsers.
 Web Scripting Viruses Include:
 JS.Fortnight – a virus that spreads
via malicious emails.
 Multipartite Virus
 These type of viruses spread in many
different ways.
 Their actions vary depending on the OS
installed and presence of certain files.
 They tend to hide in the computer’s memory
but do not infect the hard disk.
 FAT Viruses
 These lardy viruses attack the file allocation
table (FAT) which is the disc part used to
store every information about the available
space, location of files, unusable space etc.
 FAT Viruses Include:
 the link virus
 Companion Viruses
 These types of viruses infect files just like
the direct action and the resident types.
Once inside the computer, they ‘accompany’
other existing files.
 Companion Viruses Include:
 Asimov.1539
 stator and terrax.1069
 Polymorphic Virus
 They encode or encrypt themselves in a different
way every time they infect your computer.
 They use different encryption and algorithms.
 This makes it difficult for the antivirus software
to locate those using signature or string searches
(since they are very different in each
encryption).
 Polymorphic Viruses Include:
 Marburg
 tuareg
 Satan bug
 elkern
 Worm
 This program is very similar to a virus and
has the ability to self-replicate leading to
negative effects on your computer.
 Worm Viruses Include:
 lovgate.F
 sobig.D
 trile. C
 PSWBugbear.B
 Mapson
 Trojans
 Trojans can illegally trace important login
details of users online.
 For example E-Banking is very common
among users, therefore, vulnerability of
tracing your login details whenever your PC
is working without any strong powerful
antivirus installed.
 Email Virus
 This is a virus spread via an email.
 Such a virus will hide in an email and when
the recipient opens the mail.
 Browser Hijacker
 This virus can spread in many different ways
including a voluntary download.
 If infects certain browser functions especially
in form of re-directing the user automatically
to certain sites. A good example is
 Browser Hijackers Include:
 the cool web search
 Boot Infectors
 They include the boot sector plus master
boot record types.
 All the viral codes can be separate location;
however they infect the hard disks or the
floppy.
 Boot Infectors Include:
 the brain virus -it is the very first wild virus
to be created.
 From what we have seen, the many types of
computer viruses and their effects are very
harmful and can completely damage your
system. Always make sure your system is up
to date. Also install antivirus software. The
antivirus program protects your computer
and the personal information in it.

 Don't open unknown attachments in emails
or do a virus scan after opening them.
 (If you get an email from a person that
contains one or more viruses, the viruses
may infect files in the computer.
 The viruses might also send emails to people
from your email address book or email
folders automatically).
 Download files only from trusted sites.
 If you download a program or a
data filefrom the Internet or other shared
networks, viruses might be transferred to
your computer.
 Sometimes the free software programs on
the Internet have viruses especially if you
are downloading from sources such
as Torrent or Usenet newsgroups.
 Remember to do a virus scan for them
after peripheral devices are connected to
your computer.
 The devices such as MP3 players, USB thumb
drives, memory cards or CD drives are also
means of spreading viruses.
 AVG
 Avira
 Avast
 Microsoft Security Essentials
 Malwarebytes
 Panda Cloud AntiVirus
 Comodo Firewall + Antivirus

More Related Content

What's hot

Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
Computer virus
 Computer virus Computer virus
Computer virus
Kawsar Ahmed
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
Mohak Jain
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
Kriti kohli
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
Types of computer viruses
Types of computer viruses Types of computer viruses
Types of computer viruses
shimaBarason
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Computer virus
Computer virusComputer virus
Computer virus
Walden University
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
Prasad Athukorala
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
QuratNaeem
 

What's hot (20)

Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Types of computer viruses
Types of computer viruses Types of computer viruses
Types of computer viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 

Viewers also liked

Computer viruses
Computer virusesComputer viruses
Computer viruses
Annies Minu
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Zombie Virus Preparedness Kit
Zombie Virus Preparedness KitZombie Virus Preparedness Kit
Zombie Virus Preparedness Kit
Kamal Patel
 
How Computers Communicate, Internet Protocols (IP) and Firewalls
How Computers Communicate, Internet Protocols (IP) and FirewallsHow Computers Communicate, Internet Protocols (IP) and Firewalls
How Computers Communicate, Internet Protocols (IP) and Firewalls
Devolutions
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
Muhammad Talha Zaroon
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet securityhimeag
 
MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservices
MediaMosa
 
Computer security 101
Computer security 101Computer security 101
Computer security 101
Khairulmizam Samsudin
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
Utkarsh Srivastava
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminar
Sai Ram
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
badri narayan
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
VTC_NeilaSofien
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
guest5fd01d
 
Virus part1
Virus part1Virus part1
Virus part1
Ajay Banyal
 
Web Terminologies
Web TerminologiesWeb Terminologies
Web Terminologies
Lei Tolentino
 
Computer fundamentals-internet p1
Computer fundamentals-internet p1Computer fundamentals-internet p1
Computer fundamentals-internet p1
Leo Mark Villar
 
IoT Summit 2017 - Fundamentals of Internet of Things
IoT Summit 2017 - Fundamentals of Internet of ThingsIoT Summit 2017 - Fundamentals of Internet of Things
IoT Summit 2017 - Fundamentals of Internet of Things
Edmandie Samonte
 

Viewers also liked (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Zombie Virus Preparedness Kit
Zombie Virus Preparedness KitZombie Virus Preparedness Kit
Zombie Virus Preparedness Kit
 
How Computers Communicate, Internet Protocols (IP) and Firewalls
How Computers Communicate, Internet Protocols (IP) and FirewallsHow Computers Communicate, Internet Protocols (IP) and Firewalls
How Computers Communicate, Internet Protocols (IP) and Firewalls
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservices
 
Computer security 101
Computer security 101Computer security 101
Computer security 101
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminar
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
Virus part1
Virus part1Virus part1
Virus part1
 
Web Terminologies
Web TerminologiesWeb Terminologies
Web Terminologies
 
Computer fundamentals-internet p1
Computer fundamentals-internet p1Computer fundamentals-internet p1
Computer fundamentals-internet p1
 
IoT Summit 2017 - Fundamentals of Internet of Things
IoT Summit 2017 - Fundamentals of Internet of ThingsIoT Summit 2017 - Fundamentals of Internet of Things
IoT Summit 2017 - Fundamentals of Internet of Things
 

Similar to Computer virus

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
Virus
VirusVirus
Virus
dddaou
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
 
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 

Similar to Computer virus (20)

W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Virus
VirusVirus
Virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Computer virus

  • 1. Created by Mark Anthony P. Maranga
  • 2.  To learn deeper of what computer virus is  To be immune of any computer virus attack  To be able defend against computer virus
  • 3.  What is computer virus?  Why do people create computer virus?  Brief History of computer virus?  How will you know you have a computer virus?  Different types of computer viruses  Ways to prevent computer virus  List of trusted free antivirus
  • 4. A computer virus is a program designed to harm or cause harm on an infected computer.
  • 5. To gain control of or hack a computer and use it for specific tasks.
  • 6.  To generate money by using such malware as a cash machine.
  • 7.  To steal sensitive information (credit card number, password, personal details, date, etc.)
  • 8.  To prove that they are capable of writing virus.
  • 9.  Revenge against company, cripple a computer or network.
  • 10.  John von Neumann  came up with the theory about self-replicating programs in 1949.
  • 11.  Fred Cohen  comes up with the term “computer virus”
  • 12.  Core Wars  An application not release until 1984.  It replicates itself every single time it was run in computer
  • 13.  Reaper  Antivirus application specifically designed to destroy core wars of an infected computers.
  • 14.  MS-DOS  Most popular OS when viruses becoming thick and fast.  The most targeted OS by “the brain” virus which release in Pakistan in 1986.
  • 15.  1988 Morris Worm for MSDOS  Created by Robert Morris, 23, a small virus that infected almost 6,000 computers
  • 16.  Melissa Virus  It managed to infect thousands of computers at an alarming speed, causing over $80 million in damages
  • 17.  I Love You Virus  It managed to infect millions of computers in just under a day  The virus sent usernames and passwords it found on the infected computer back to the author
  • 18.  Code Red virus  It infected over 700,000 of computers, causing damages in excess of $2 billion
  • 19.  no more notable viruses appeared due to sophisticated antivirus and firewall systems
  • 20.  Your computer runs unusually slow or freezes
  • 21.  People are receiving emails from you which you did not send
  • 22.  You get pop-up messages or advertisements
  • 23.  Slower than usual network or Internet speed
  • 24.  Files mysteriously appear or disappear from your computer
  • 25.  Your homepage changes and you can not change it back
  • 26.  Your hard drive free space keeps shrinking
  • 27.  Macro Viruses  These viruses infect the files created using some applications or programs that contain macros such as doc, pps, xls and mdb.  They automatically infect the files with macros and also templates and documents that are contained in the file. They hide in documents shared through e-mail and networks.  Macro viruses include:  Relax  bablas  Melissa.A  097M/Y2K
  • 28.  Memory Resident Viruses  They usually fix themselves inside the computer memory. They get activated every time the OS runs and end up infecting other opened files. They hide in RAM.  Memory Resident Viruses Include:  CMJ  meve  randex  mrklunky
  • 29.  Overwrite Viruses  These types of viruses delete any information in a file they infect, leaving them partially or completely useless once they are infected. Once in the computer, they replaces all the file content but the file size doesn’t change.  Overwrite Viruses Include:  Trj.Reboot  way  trivial.88.D
  • 30.  Direct Action Viruses  These viruses mainly replicate or take action once they are executed.  When a certain condition is met, the viruses will act by infecting the files in the directory or the folder specified in the AUTOEXEC.BAT.  The viruses are generally found in the hard disk’s root directory, but they keep on changing location.  Direct Action Viruses Include:  Vienna virus
  • 31.  Directory Virus  Also known as cluster virus or file system virus.  They infect the computer’s directory by changing the path indicating file location.  They are usually located in the disk but affect the entire directory.  Directory Viruses Include:  dir-2 virus
  • 32.  Web Scripting Virus  Most web pages include some complex codes in order to create an interactive and interesting content.  Such a code is often exploited to cause certain undesirable actions.  They mostly originate from the infected web pages or browsers.  Web Scripting Viruses Include:  JS.Fortnight – a virus that spreads via malicious emails.
  • 33.  Multipartite Virus  These type of viruses spread in many different ways.  Their actions vary depending on the OS installed and presence of certain files.  They tend to hide in the computer’s memory but do not infect the hard disk.
  • 34.  FAT Viruses  These lardy viruses attack the file allocation table (FAT) which is the disc part used to store every information about the available space, location of files, unusable space etc.  FAT Viruses Include:  the link virus
  • 35.  Companion Viruses  These types of viruses infect files just like the direct action and the resident types. Once inside the computer, they ‘accompany’ other existing files.  Companion Viruses Include:  Asimov.1539  stator and terrax.1069
  • 36.  Polymorphic Virus  They encode or encrypt themselves in a different way every time they infect your computer.  They use different encryption and algorithms.  This makes it difficult for the antivirus software to locate those using signature or string searches (since they are very different in each encryption).  Polymorphic Viruses Include:  Marburg  tuareg  Satan bug  elkern
  • 37.  Worm  This program is very similar to a virus and has the ability to self-replicate leading to negative effects on your computer.  Worm Viruses Include:  lovgate.F  sobig.D  trile. C  PSWBugbear.B  Mapson
  • 38.  Trojans  Trojans can illegally trace important login details of users online.  For example E-Banking is very common among users, therefore, vulnerability of tracing your login details whenever your PC is working without any strong powerful antivirus installed.
  • 39.  Email Virus  This is a virus spread via an email.  Such a virus will hide in an email and when the recipient opens the mail.
  • 40.  Browser Hijacker  This virus can spread in many different ways including a voluntary download.  If infects certain browser functions especially in form of re-directing the user automatically to certain sites. A good example is  Browser Hijackers Include:  the cool web search
  • 41.  Boot Infectors  They include the boot sector plus master boot record types.  All the viral codes can be separate location; however they infect the hard disks or the floppy.
  • 42.  Boot Infectors Include:  the brain virus -it is the very first wild virus to be created.  From what we have seen, the many types of computer viruses and their effects are very harmful and can completely damage your system. Always make sure your system is up to date. Also install antivirus software. The antivirus program protects your computer and the personal information in it. 
  • 43.  Don't open unknown attachments in emails or do a virus scan after opening them.  (If you get an email from a person that contains one or more viruses, the viruses may infect files in the computer.  The viruses might also send emails to people from your email address book or email folders automatically).
  • 44.
  • 45.  Download files only from trusted sites.  If you download a program or a data filefrom the Internet or other shared networks, viruses might be transferred to your computer.  Sometimes the free software programs on the Internet have viruses especially if you are downloading from sources such as Torrent or Usenet newsgroups.
  • 46.
  • 47.  Remember to do a virus scan for them after peripheral devices are connected to your computer.  The devices such as MP3 players, USB thumb drives, memory cards or CD drives are also means of spreading viruses.
  • 48.
  • 49.  AVG  Avira  Avast  Microsoft Security Essentials  Malwarebytes  Panda Cloud AntiVirus  Comodo Firewall + Antivirus