SlideShare a Scribd company logo
VIRUS
-Mahesh Prajapati
1511501126
Table of Contents
1) Objectives
2) What is Virus?
3) Uses of Virus
4) Types of Virus
5) Lifecycle of Virus
6) Removal of Virus from a computer
7) Prevention from Virus
8) Conclusion
9) Reference
10) Queries
(3)
(4)
(5)
(8)
(14)
(16)
(17)
(18)
(19)
Objectives
 To know the uses of virus.
 To protect and prevent yourself from virus.
 To know process of getting your computer
free from virus.
What actually is virus?
1. Small software designed to interfere with
victim’s computer operation.
2. Ability of self-replication.
3. Loaded and run without user’s consent.
4. CODED BY PROGRAMMERS.
Why virus is called ‘virus’?
SIMILARITIES BETWEEN BIOLOGICAL
VIRUS AND COMPUTER VIRUS
1. Need a host as a place of residence.
2. Destroy host gradually without any
knowledge.
3. Ability of self replicate.
Uses of Virus
 To run legal programs.
 To protect own computer from hackers.
 Making tasks easy for user.
Why people create Virus?
1. Stealing valuable data and information.
2. Get access to victim’s computer in order to
spy.
3. Pranks and jokes.
Types of Virus
 Virus
 Worms
 Trojan Horses
Types of Virus (Contd).
1. Virus
Types of Virus (Contd).
2. Worms
Types of Virus (Contd).
3. Trojan Horses.
The virus waits until user transmits the
infected object to another computer
User transmits an infected object to
another computer
The virus locates and infects suitable
objects on the new computer
PC - 4
PC - 2 PC - 3
PC - 4 PC - 7PC - 5 PC - 6
PC - 1PC - 1
PC - 2 PC - 3
PC - 4 PC - 5 PC - 6 PC - 7
Infection of Virus in Computer network
VIRUS
ANTI-
DETECTIN
ROUTINES
COPY
SEARC
H
Detection of Virus
Some Symptoms:
 Program takes longer to load.
 The program size keeps changing.
 The drive light keeps flashing when you are
not doing anything.
 User created files have strange names.
Removal of Virus
 Scan your computer time-to-time.
 Use Windows Defender and make sure to
update it regularly.
 Use online scanning tools like Microsoft
Safety Scanner.
Prevention from Virus
 Never open unusual or spam e-mails.
 Always back up hard drive data.
 Create system restore points regularly.
 Download required software or any data from
trustable websites only.
Conclusion
 Knowing what viruses are.
 Being aware about virus attacks.
 Always give first priority to safety.
Reference
http://www.webopedia.com/DidYouKnow/Internet
/2004/virus.asp - The Difference Between a Virus,
Worm, and Trojan Horse.
http://en.wikipedia.org/wiki/Computer_virus -
Computer Virus
http://www.microsoft.com/protect/computer/basics
/virus.mspx - What is Computer Viruses
http://www.soe.umich.edu/computingnetwork/howt
o/avoidviruses - How To Avoid Computer Viruses
Any Queries
Thank you

More Related Content

What's hot

Computer Virus
Computer VirusComputer Virus
Computer Virus
Gisha Mathyari
 
Anti virus
Anti virusAnti virus
Anti virus
Marlon San Luis
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
Shabnam Bashir
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Computer virus
Computer virusComputer virus
Computer virus
Flora Runyenje
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
Faisal Hassan
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
Prakriti Sharma
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
nikkinikhita
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
Lee Ray
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
sohail awan
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
Jay Shah
 
Computer virus
Computer virusComputer virus
Computer virus
Sammer Khizer
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24
Muhammad Zain
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 

What's hot (19)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Anti virus
Anti virusAnti virus
Anti virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Antivirus
AntivirusAntivirus
Antivirus
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Presentation2
Presentation2Presentation2
Presentation2
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Computer virus
Computer virusComputer virus
Computer virus
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 

Similar to Computer Virus

Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
Teodoro Cipresso
 
Virus
VirusVirus
Virus
Protik Roy
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
jangezkhan
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
SWAMY NAYAK
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
BESOR ACADEMY
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
PritamSahoo16
 
antivirus.pptx
antivirus.pptxantivirus.pptx
antivirus.pptx
AnanyaPandey97
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
 
Virus
Virus Virus
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
dilsherece
 

Similar to Computer Virus (20)

Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Virus
VirusVirus
Virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
antivirus.pptx
antivirus.pptxantivirus.pptx
antivirus.pptx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Virus
Virus Virus
Virus
 
virus
virusvirus
virus
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Computer Virus

  • 2. Table of Contents 1) Objectives 2) What is Virus? 3) Uses of Virus 4) Types of Virus 5) Lifecycle of Virus 6) Removal of Virus from a computer 7) Prevention from Virus 8) Conclusion 9) Reference 10) Queries (3) (4) (5) (8) (14) (16) (17) (18) (19)
  • 3. Objectives  To know the uses of virus.  To protect and prevent yourself from virus.  To know process of getting your computer free from virus.
  • 4. What actually is virus? 1. Small software designed to interfere with victim’s computer operation. 2. Ability of self-replication. 3. Loaded and run without user’s consent. 4. CODED BY PROGRAMMERS.
  • 5. Why virus is called ‘virus’? SIMILARITIES BETWEEN BIOLOGICAL VIRUS AND COMPUTER VIRUS 1. Need a host as a place of residence. 2. Destroy host gradually without any knowledge. 3. Ability of self replicate.
  • 6. Uses of Virus  To run legal programs.  To protect own computer from hackers.  Making tasks easy for user.
  • 7. Why people create Virus? 1. Stealing valuable data and information. 2. Get access to victim’s computer in order to spy. 3. Pranks and jokes.
  • 8. Types of Virus  Virus  Worms  Trojan Horses
  • 9. Types of Virus (Contd). 1. Virus
  • 10. Types of Virus (Contd). 2. Worms
  • 11. Types of Virus (Contd). 3. Trojan Horses.
  • 12. The virus waits until user transmits the infected object to another computer User transmits an infected object to another computer The virus locates and infects suitable objects on the new computer
  • 13. PC - 4 PC - 2 PC - 3 PC - 4 PC - 7PC - 5 PC - 6 PC - 1PC - 1 PC - 2 PC - 3 PC - 4 PC - 5 PC - 6 PC - 7 Infection of Virus in Computer network
  • 15. Detection of Virus Some Symptoms:  Program takes longer to load.  The program size keeps changing.  The drive light keeps flashing when you are not doing anything.  User created files have strange names.
  • 16. Removal of Virus  Scan your computer time-to-time.  Use Windows Defender and make sure to update it regularly.  Use online scanning tools like Microsoft Safety Scanner.
  • 17. Prevention from Virus  Never open unusual or spam e-mails.  Always back up hard drive data.  Create system restore points regularly.  Download required software or any data from trustable websites only.
  • 18. Conclusion  Knowing what viruses are.  Being aware about virus attacks.  Always give first priority to safety.
  • 19. Reference http://www.webopedia.com/DidYouKnow/Internet /2004/virus.asp - The Difference Between a Virus, Worm, and Trojan Horse. http://en.wikipedia.org/wiki/Computer_virus - Computer Virus http://www.microsoft.com/protect/computer/basics /virus.mspx - What is Computer Viruses http://www.soe.umich.edu/computingnetwork/howt o/avoidviruses - How To Avoid Computer Viruses

Editor's Notes

  1. First virus was creeper virus that was detected on ARPANET in 1970s which had ability of self-replication.
  2. 6000 viruses are created and released every month. The words “love” and “I love you” are most vulnerable words in virus world.
  3. 70% of virus-writers works under specific contract. Some virus creator might be small children who were just testing their programming skills.
  4. A virus cannot spread without a human action.
  5. Similar to virus by design. But can travel without human action.
  6. May be silly like adding desktop icon continuously. May be vulnerable like deleting the users file or destroying information on the system. Create a backdoor for malicious user leaving them access to everything in your computer. Do not reproduce or self replicate.
  7. Viruses do not transfer just by opening messages. It spreads after clicking on the link given in the message. 90% messages contain malware.
  8. Did you know? Virus writing is not considered an illegal act in US.