SlideShare a Scribd company logo
Complied by KAYODE
A computer virus(Malware)
or worm is a self-replicating
program that can spread by
email or by inserting copies
of itself into other programs
or documents.
Virus epidemics mostly
infect Microsoft Windows
systems due to their
popularity
how to avoid them
Don’t download all your email to an emailDon’t download all your email to an email
client unseen. Screen your email first,client unseen. Screen your email first,
and delete suspicious-looking andand delete suspicious-looking and
unwanted messages before downloadingunwanted messages before downloading
the legitimate email to your local emailthe legitimate email to your local email
clientclient
Make sure your computer has
updated anti-virus software
running on it. Automatic updates are
essential for effective virus protection.
Combined with server side scanning,
you now have two layers of security.
Disable message preview in your
email client, especially on Windows
platforms. Otherwise, malicious
programs attached to incoming
messages may execute automatically
and infect your computer.
Take caution when opening
graphics and media
attachments, as viruses can be
disguised as such files.
Maintain several independent email
accounts. If a virus infects your only
business email address, you’ll be in
trouble. Also, keep backups of your
most important email and files
separately.
Virus-makers and spammers often cooperate
in devious schemes to send as much spam as
possible as efficiently as possible. They create
viruses that infect vulnerable computers
around the world and turn them into spam-
generating “robots“. The infected computers
then send massive amounts of spam,
unbeknownst to the computer owner.
There are various types of
computer viruses designed by
who? to do one thing...
Cause havoc on your computer
and you.
Trojan Horse
Spyware
Adware
Worms
Boot sector Viruses
Time bombs
Boot Sector Virus
Browser Hijacker
File Infector Virus
Polymorphic Virus
Macro Virus
Web Scripting Virus
Believe it or not, a lot of viruses are
written to target Microsoft software.
Viruses writers know the majority of
users use Windows as their Operating
system and Internet Explorer as their
web browser. One easy way to reduce
your chances of picking up a virus is to run
a Linux operating system and use a web
browser such as Mozilla Firefox or Google
Chrome.
A program written to deliver a malicious
program that may then cause destruction
to your computer. A Trojan horse is
delivered by someone or hidden within
another program that may seem
harmless.
A program written to monitor your actions on a
computer. A common type of spyware is a key-
logger program. This program can record every key
stroke and mouse click you make. Spyware can be
delivered via a Trojan horse program. Some
spyware is not meant to be malicious, such as
tracking cookies. A tracking cookie tracks your
internet usage and sends the information back to its
source.
Adware is a form of malware. One word
- pop-ups. Adware is designed to pop
up advertisements. Adware can be very
annoying.
Just a nasty little program to cause
slowness in a network. A worm will
replicate itself and spread from computer
to computer. Worms are commonly
spread through email attachments.
Not so common anymore, but they
were nasty little programs that got
loaded into your master boot
record. Most commonly spread by
floppy disks. These viruses could
then launch themselves before
your operating system even
loaded. Today most BIOS
prevents code from being written
to the boot sector.
A virus written to execute at a later date
or upon an action performed. These
programs lay dormant until an event
occurs.
Browser Hijacker
A virus that will over take your web
browser and automatically redirect you to
another website.
A virus that lives within a file, typically
a .exe file. When the file is executed, it
will then run its nasty code.
Polymorphic Virus
A virus written to change itself in order
to evade virus detection.
A virus that hides itself inside of macros used
by programs such as Microsoft Excel.
Web Scripting Virus
A virus that hides within a website. Some
are put there on purpose, some get injected
into websites that are not properly secured.
Signs of an infected computer can be
numerous depending on which virus your
computer is infected with.
Common signs are:
Computer running very slow
Numerous pop-ups
Hard Drive filling up
Applications launching by themselves
CD/DVD drive opening and closing by itself
Computer freezing and crashing
Anti-virus software is a program
or set of programs that are
designed to prevent, search for,
detect, and remove software
viruses, and other malicious
software like worms, trojans,
adware, and more.
These tools are critical for users to
have installed and up-to-date because
a computer without anti-virus
software installed will be infected
within minutes of connecting to the
internet. The bombardment is
constant, with anti-virus companies
update their detection tools constantly
to deal with the more than 60,000
new pieces of malware created daily.
There are several different companies that build
and offer anti-virus software and what each
offers can vary but all perform some basic
functions:
Scan specific files or directories for any malware or
known malicious patterns
Allow you to schedule scans to automatically run for
you
Allow you to initiate a scan of a specific file or of
your computer, or of a CD or flash drive at any time.
Remove any malicious code detected –sometimes
you will be notified of an infection and asked if you
want to clean the file, other programs will
automatically do this behind the scenes.
Show you the ‘health’ of your computer
Cyber Defender [ P ]
Protector Plus [ P ]
G Data Antivirus [ P ]
Max Secure Antivirus [ P ]
ClamWin [ F ]
Spyware Doctor [ F ]
Outpost Antivirus [ P ]
Zone Alarm Antivirus [ P ]
BitDefender Antivirus [ P ]
McAfee Antivirus [ P ]
Tizer Secure [ P ]
Vipre Antivirus [ P ]
Vba32 antivirus [ p ]
Quick heal antivirus [ p ]
Rising antivirus [ b ]
Kingsoft antivirus [ b ]
Vexira antivirus [ p ]
Arcavir antivirus [ p ]
Nprotect antivirus [ p ]
Virobot antivirus [ p ]
Antiy antivirus [ p ]
System shield antivirus [ p ]
Csam antivirus [ p ]
Blue point security [ p ]
Microsoft security essentials [ f ]
Net protector antivirus [ p ]
Eacceleration antivirus [ p ]
Zillya! Antivirus [ b ]
Paretologic antivirus plus [ p ]
Blink personal [ p ]
Drive sentry [ p ]
P = Paid Antivirus
F = Free Antivirus
B = Paid and Free both
Available
Avira Antivirus [ B ]
Avast Antivirus [ B ]
AVG Antivirus [ B ]
Immunet Protect [ B ]
Emsisoft Antimalware [ B ] free
version has no Real time Protection
Digital Patrol [ P ]
K7 Antivirus [ P ]
eScan Antivirus [ P ]
Comodo Antivirus [ P ]
Dr.Web Antivirus [ P ]
Digital Defender Antivirus [ P ]
Kaspersky Antivirus often treated as the best
available Antivirus application and has a special
version for file servers. It covers almost all sections
needed for a top class security. Kaspersky provides
hourly virus definition update to keep you up-to-date.
BitDefender is one of the best antivirus with
top class defending ability. It provides hourly
definition updates for latest threats.
BitDefender comes with P2P File Sharing and
Registry Startup Protection but lacks Email
scanning.
Trend Micro is a well-known and popular
antivirus with Spyware and Adware
Protection. It has some great features
including Remote File Lock that safeguards
your private files in case your laptop is lost
or stolen. But lacks P2P File Sharing and
Registry Startup Scanning.
Norton Antivirus is one of the most popular and
well-known antivirus application. The latest version
has the ability to map your wireless home network
and safeguards your wi-fi networks. Recently
Norton has introduced a special version for gaming
PCs known as Norton 2009 Gaming Edition. It
comes with daily virus definition update but no
support for P2P File Sharing and Registry Startup
Protection.
McAfee is one of the leading antivirus in
security industry. McAfee introduced 2
features ScriptStopper and WormStopper.
But it has no support for P2P File Sharing,
Instant Messenger and Registry Startup. The
inbuilt updater updates virus definitions on a
regular basis to keep your up-to-date.
Panda Antivirus comes with a new feature call
UltraFast scan engine that scan almost 30%
faster compared to other antivirus applications.
It has few unique features as follows
Identity protection through Anti-Phishing Filter
and Anti-Banking Trojans Engine
Panda Antivirus has an advanced heuristic
scan which maximum possible identity theft
Inbuilt Personal Firewall

More Related Content

What's hot

How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)cdebraj16101991
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Annies Minu
 
Virus
VirusVirus
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
Computer virus
Computer virusComputer virus
Computer virus
Aarya Khanal
 
computer virus
computer viruscomputer virus
computer virus
Kunal Yadav
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
Prem Kumar Bonam
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
Prasad Athukorala
 
Computer virus
Computer virusComputer virus
Computer virus
Walden University
 

What's hot (20)

How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus
computer viruscomputer virus
computer virus
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked

Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Yahoo Mail & Gmail Facilities
Yahoo Mail & Gmail FacilitiesYahoo Mail & Gmail Facilities
Yahoo Mail & Gmail Facilities
Cristina Ghilimei
 
Gmail in education means organization november 2011
Gmail in education means organization november 2011Gmail in education means organization november 2011
Gmail in education means organization november 2011Karen Brooks
 
How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com
Amirul Islam
 
Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
DaniZavala261115
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
Lee Ray
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirusVishwarajYadav
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
How to create a group on Yahoo.com
How to create a group on Yahoo.comHow to create a group on Yahoo.com
How to create a group on Yahoo.com
Agency Management Institute
 
Software testing - basics
Software testing - basicsSoftware testing - basics
Software testing - basics
Prasad Gali
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
Mahamudul Hassan Niaz
 
Beyond Email Open Rates: How to Unlock the Potential in Your Audience
Beyond Email Open Rates: How to Unlock the Potential in Your AudienceBeyond Email Open Rates: How to Unlock the Potential in Your Audience
Beyond Email Open Rates: How to Unlock the Potential in Your Audience
Kissmetrics on SlideShare
 
Panganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusPanganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at Virus
Marie Jaja Tan Roa
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Annies Minu
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Cs 435
Cs 435Cs 435
Presentation on java
Presentation  on  javaPresentation  on  java
Presentation on java
shashi shekhar
 

Viewers also liked (20)

Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Yahoo Mail & Gmail Facilities
Yahoo Mail & Gmail FacilitiesYahoo Mail & Gmail Facilities
Yahoo Mail & Gmail Facilities
 
Gmail in education means organization november 2011
Gmail in education means organization november 2011Gmail in education means organization november 2011
Gmail in education means organization november 2011
 
How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com
 
Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Chapter iv computer virus
Chapter iv  computer virusChapter iv  computer virus
Chapter iv computer virus
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
How to create a group on Yahoo.com
How to create a group on Yahoo.comHow to create a group on Yahoo.com
How to create a group on Yahoo.com
 
Software testing - basics
Software testing - basicsSoftware testing - basics
Software testing - basics
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Beyond Email Open Rates: How to Unlock the Potential in Your Audience
Beyond Email Open Rates: How to Unlock the Potential in Your AudienceBeyond Email Open Rates: How to Unlock the Potential in Your Audience
Beyond Email Open Rates: How to Unlock the Potential in Your Audience
 
Panganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusPanganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Cs 435
Cs 435Cs 435
Cs 435
 
Presentation on java
Presentation  on  javaPresentation  on  java
Presentation on java
 

Similar to Computer virus and antivirus

List of Malwares
List of MalwaresList of Malwares
List of Malwares
Vishalya Dulam
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
PritamSahoo16
 
Computer virus
Computer virusComputer virus
Computer virus
JoydipGhosh12
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
Abdullah-Al- Mahmud
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
Mukul Kumar
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................
vndoon
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
Sarhad Baez
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 

Similar to Computer virus and antivirus (20)

List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 

More from BESOR ACADEMY

File extension
File extensionFile extension
File extension
BESOR ACADEMY
 
Common errors web.pptx [autosaved]
Common errors web.pptx [autosaved]Common errors web.pptx [autosaved]
Common errors web.pptx [autosaved]
BESOR ACADEMY
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
BESOR ACADEMY
 
Keyboard
KeyboardKeyboard
Keyboard
BESOR ACADEMY
 
Introduction to Computer Engineering
Introduction to Computer EngineeringIntroduction to Computer Engineering
Introduction to Computer Engineering
BESOR ACADEMY
 
Getting ready to teach computer
Getting ready to teach computerGetting ready to teach computer
Getting ready to teach computer
BESOR ACADEMY
 
Connectors and plugs
Connectors and plugsConnectors and plugs
Connectors and plugs
BESOR ACADEMY
 
Computer resolution
Computer resolutionComputer resolution
Computer resolution
BESOR ACADEMY
 
Computer languages
Computer languagesComputer languages
Computer languages
BESOR ACADEMY
 
Random access memory
Random access memoryRandom access memory
Random access memory
BESOR ACADEMY
 
Printers
PrintersPrinters
Printers
BESOR ACADEMY
 
Welcome to ms pub
Welcome to ms pubWelcome to ms pub
Welcome to ms pub
BESOR ACADEMY
 
Things you need to know about internet
Things you need to know about internetThings you need to know about internet
Things you need to know about internet
BESOR ACADEMY
 
BESOR ACADEMY - TRAINING THE TRAINERS
BESOR ACADEMY - TRAINING THE TRAINERSBESOR ACADEMY - TRAINING THE TRAINERS
BESOR ACADEMY - TRAINING THE TRAINERS
BESOR ACADEMY
 
Motherboard
MotherboardMotherboard
Motherboard
BESOR ACADEMY
 
Motherboard components and their functions
Motherboard components and their functionsMotherboard components and their functions
Motherboard components and their functions
BESOR ACADEMY
 
Learning the corel draw
Learning the corel drawLearning the corel draw
Learning the corel draw
BESOR ACADEMY
 
Introduction to powerpoint
Introduction to powerpointIntroduction to powerpoint
Introduction to powerpoint
BESOR ACADEMY
 
INTRODUCTION TO MICROSOFT EXCEL FOR BEGINEER
INTRODUCTION TO MICROSOFT EXCEL FOR BEGINEERINTRODUCTION TO MICROSOFT EXCEL FOR BEGINEER
INTRODUCTION TO MICROSOFT EXCEL FOR BEGINEER
BESOR ACADEMY
 
Empowering the Youth to engage in ICT
Empowering the Youth to engage in ICTEmpowering the Youth to engage in ICT
Empowering the Youth to engage in ICT
BESOR ACADEMY
 

More from BESOR ACADEMY (20)

File extension
File extensionFile extension
File extension
 
Common errors web.pptx [autosaved]
Common errors web.pptx [autosaved]Common errors web.pptx [autosaved]
Common errors web.pptx [autosaved]
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
Keyboard
KeyboardKeyboard
Keyboard
 
Introduction to Computer Engineering
Introduction to Computer EngineeringIntroduction to Computer Engineering
Introduction to Computer Engineering
 
Getting ready to teach computer
Getting ready to teach computerGetting ready to teach computer
Getting ready to teach computer
 
Connectors and plugs
Connectors and plugsConnectors and plugs
Connectors and plugs
 
Computer resolution
Computer resolutionComputer resolution
Computer resolution
 
Computer languages
Computer languagesComputer languages
Computer languages
 
Random access memory
Random access memoryRandom access memory
Random access memory
 
Printers
PrintersPrinters
Printers
 
Welcome to ms pub
Welcome to ms pubWelcome to ms pub
Welcome to ms pub
 
Things you need to know about internet
Things you need to know about internetThings you need to know about internet
Things you need to know about internet
 
BESOR ACADEMY - TRAINING THE TRAINERS
BESOR ACADEMY - TRAINING THE TRAINERSBESOR ACADEMY - TRAINING THE TRAINERS
BESOR ACADEMY - TRAINING THE TRAINERS
 
Motherboard
MotherboardMotherboard
Motherboard
 
Motherboard components and their functions
Motherboard components and their functionsMotherboard components and their functions
Motherboard components and their functions
 
Learning the corel draw
Learning the corel drawLearning the corel draw
Learning the corel draw
 
Introduction to powerpoint
Introduction to powerpointIntroduction to powerpoint
Introduction to powerpoint
 
INTRODUCTION TO MICROSOFT EXCEL FOR BEGINEER
INTRODUCTION TO MICROSOFT EXCEL FOR BEGINEERINTRODUCTION TO MICROSOFT EXCEL FOR BEGINEER
INTRODUCTION TO MICROSOFT EXCEL FOR BEGINEER
 
Empowering the Youth to engage in ICT
Empowering the Youth to engage in ICTEmpowering the Youth to engage in ICT
Empowering the Youth to engage in ICT
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Computer virus and antivirus

  • 2.
  • 3. A computer virus(Malware) or worm is a self-replicating program that can spread by email or by inserting copies of itself into other programs or documents.
  • 4. Virus epidemics mostly infect Microsoft Windows systems due to their popularity
  • 5. how to avoid them Don’t download all your email to an emailDon’t download all your email to an email client unseen. Screen your email first,client unseen. Screen your email first, and delete suspicious-looking andand delete suspicious-looking and unwanted messages before downloadingunwanted messages before downloading the legitimate email to your local emailthe legitimate email to your local email clientclient
  • 6. Make sure your computer has updated anti-virus software running on it. Automatic updates are essential for effective virus protection. Combined with server side scanning, you now have two layers of security.
  • 7. Disable message preview in your email client, especially on Windows platforms. Otherwise, malicious programs attached to incoming messages may execute automatically and infect your computer.
  • 8. Take caution when opening graphics and media attachments, as viruses can be disguised as such files. Maintain several independent email accounts. If a virus infects your only business email address, you’ll be in trouble. Also, keep backups of your most important email and files separately.
  • 9.
  • 10. Virus-makers and spammers often cooperate in devious schemes to send as much spam as possible as efficiently as possible. They create viruses that infect vulnerable computers around the world and turn them into spam- generating “robots“. The infected computers then send massive amounts of spam, unbeknownst to the computer owner.
  • 11. There are various types of computer viruses designed by who? to do one thing... Cause havoc on your computer and you.
  • 12. Trojan Horse Spyware Adware Worms Boot sector Viruses Time bombs Boot Sector Virus Browser Hijacker File Infector Virus Polymorphic Virus Macro Virus Web Scripting Virus
  • 13.
  • 14. Believe it or not, a lot of viruses are written to target Microsoft software. Viruses writers know the majority of users use Windows as their Operating system and Internet Explorer as their web browser. One easy way to reduce your chances of picking up a virus is to run a Linux operating system and use a web browser such as Mozilla Firefox or Google Chrome.
  • 15. A program written to deliver a malicious program that may then cause destruction to your computer. A Trojan horse is delivered by someone or hidden within another program that may seem harmless.
  • 16. A program written to monitor your actions on a computer. A common type of spyware is a key- logger program. This program can record every key stroke and mouse click you make. Spyware can be delivered via a Trojan horse program. Some spyware is not meant to be malicious, such as tracking cookies. A tracking cookie tracks your internet usage and sends the information back to its source.
  • 17. Adware is a form of malware. One word - pop-ups. Adware is designed to pop up advertisements. Adware can be very annoying.
  • 18. Just a nasty little program to cause slowness in a network. A worm will replicate itself and spread from computer to computer. Worms are commonly spread through email attachments.
  • 19. Not so common anymore, but they were nasty little programs that got loaded into your master boot record. Most commonly spread by floppy disks. These viruses could then launch themselves before your operating system even loaded. Today most BIOS prevents code from being written to the boot sector.
  • 20. A virus written to execute at a later date or upon an action performed. These programs lay dormant until an event occurs. Browser Hijacker A virus that will over take your web browser and automatically redirect you to another website.
  • 21. A virus that lives within a file, typically a .exe file. When the file is executed, it will then run its nasty code. Polymorphic Virus A virus written to change itself in order to evade virus detection.
  • 22. A virus that hides itself inside of macros used by programs such as Microsoft Excel. Web Scripting Virus A virus that hides within a website. Some are put there on purpose, some get injected into websites that are not properly secured.
  • 23. Signs of an infected computer can be numerous depending on which virus your computer is infected with. Common signs are: Computer running very slow Numerous pop-ups Hard Drive filling up Applications launching by themselves CD/DVD drive opening and closing by itself Computer freezing and crashing
  • 24. Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
  • 25. These tools are critical for users to have installed and up-to-date because a computer without anti-virus software installed will be infected within minutes of connecting to the internet. The bombardment is constant, with anti-virus companies update their detection tools constantly to deal with the more than 60,000 new pieces of malware created daily.
  • 26. There are several different companies that build and offer anti-virus software and what each offers can vary but all perform some basic functions: Scan specific files or directories for any malware or known malicious patterns Allow you to schedule scans to automatically run for you Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time. Remove any malicious code detected –sometimes you will be notified of an infection and asked if you want to clean the file, other programs will automatically do this behind the scenes. Show you the ‘health’ of your computer
  • 27.
  • 28.
  • 29. Cyber Defender [ P ] Protector Plus [ P ] G Data Antivirus [ P ] Max Secure Antivirus [ P ] ClamWin [ F ] Spyware Doctor [ F ] Outpost Antivirus [ P ] Zone Alarm Antivirus [ P ] BitDefender Antivirus [ P ] McAfee Antivirus [ P ] Tizer Secure [ P ] Vipre Antivirus [ P ] Vba32 antivirus [ p ] Quick heal antivirus [ p ] Rising antivirus [ b ] Kingsoft antivirus [ b ] Vexira antivirus [ p ] Arcavir antivirus [ p ] Nprotect antivirus [ p ] Virobot antivirus [ p ] Antiy antivirus [ p ] System shield antivirus [ p ] Csam antivirus [ p ] Blue point security [ p ] Microsoft security essentials [ f ] Net protector antivirus [ p ] Eacceleration antivirus [ p ] Zillya! Antivirus [ b ] Paretologic antivirus plus [ p ] Blink personal [ p ] Drive sentry [ p ] P = Paid Antivirus F = Free Antivirus B = Paid and Free both Available
  • 30. Avira Antivirus [ B ] Avast Antivirus [ B ] AVG Antivirus [ B ] Immunet Protect [ B ] Emsisoft Antimalware [ B ] free version has no Real time Protection Digital Patrol [ P ] K7 Antivirus [ P ] eScan Antivirus [ P ] Comodo Antivirus [ P ] Dr.Web Antivirus [ P ] Digital Defender Antivirus [ P ]
  • 31. Kaspersky Antivirus often treated as the best available Antivirus application and has a special version for file servers. It covers almost all sections needed for a top class security. Kaspersky provides hourly virus definition update to keep you up-to-date.
  • 32. BitDefender is one of the best antivirus with top class defending ability. It provides hourly definition updates for latest threats. BitDefender comes with P2P File Sharing and Registry Startup Protection but lacks Email scanning.
  • 33. Trend Micro is a well-known and popular antivirus with Spyware and Adware Protection. It has some great features including Remote File Lock that safeguards your private files in case your laptop is lost or stolen. But lacks P2P File Sharing and Registry Startup Scanning.
  • 34. Norton Antivirus is one of the most popular and well-known antivirus application. The latest version has the ability to map your wireless home network and safeguards your wi-fi networks. Recently Norton has introduced a special version for gaming PCs known as Norton 2009 Gaming Edition. It comes with daily virus definition update but no support for P2P File Sharing and Registry Startup Protection.
  • 35. McAfee is one of the leading antivirus in security industry. McAfee introduced 2 features ScriptStopper and WormStopper. But it has no support for P2P File Sharing, Instant Messenger and Registry Startup. The inbuilt updater updates virus definitions on a regular basis to keep your up-to-date.
  • 36. Panda Antivirus comes with a new feature call UltraFast scan engine that scan almost 30% faster compared to other antivirus applications. It has few unique features as follows Identity protection through Anti-Phishing Filter and Anti-Banking Trojans Engine Panda Antivirus has an advanced heuristic scan which maximum possible identity theft Inbuilt Personal Firewall