SlideShare a Scribd company logo
Presented by Maryam Zahid
Presented to Mam Maria Ramzan
And
Anti Viruses
 What is anti virus? & short history of it.
 How an antivirus work?
 Configuring antivirus software?
 Some of the symptoms of an infected
computer?
 Deleting Identified Virus files manually?
 Antivirus Effectiveness.
 Antivirus Damaged files.
 Online Antivirus scanning.
 some popular Antivirus.
What is Computer Virus..??
Computer viruses are small software programs that are
designed to spread from one computer to another and to
interfere with computer operation. It is a program or
piece of code that is loaded onto your computer without
your knowledge and runs against your wishes. A
computer virus might corrupt or delete data on your
computer, use your email program to spread itself to
other computers, or even erase everything on your hard
disk.
Viruses – Types and Examples
1. Boot viruses:
This virus infects the hard disks or floppy drives boot sector. This would
make the computer unable to boot. These viruses can, however, be
avoided by ensuring that the floppy disks and hard drive is well protected.
Never start the computer using an unknown disk drive or floppy disk.
Examples: the brain virus -it is the very first wild virus to be created.
2.Overwrite Viruses:
These types of viruses delete any information in a file they infect, leaving
them partially or completely useless once they are infected. Once in the
computer, they replace all the file content but the file size doesn’t change.
Unfortunately, you would only clean the infected file by deleting it
completely, therefore losing original content.
Examples: Trj. Reboot ,Way and Trivial.88.D
3 .Memory Resident Viruses:
They usually fix themselves inside the computer memory. They get
activated every time the OS runs and end up infecting other opened
files. Their effects include corrupting programs and files that are closed,
opened, renamed or copied. They hide in RAM.
Example: CMJ, Meve, Randex and Mrklunky
4 .Direct Action Viruses
These viruses mainly replicate or take action once they are executed.
When a certain condition is met, the viruses will act by infecting the files
in the directory or the folder specified in the AUTOEXEC.BAT. The
viruses are generally found in the hard disk’s root directory, but they
keep on changing location.
Example: Vienna virus
5 .Program Viruses:
These infect executable program files, such as those with extensions like
BIN, COM, EXE, OVL, DRV (driver) and .SYS (device driver). These
programs are loaded in memory during execution, taking the virus with
them. The virus becomes active in memory, making copies of itself
and infecting files on disk.
Examples: Sunday and Cascade
6. Macro Viruses
These viruses infect the files created using some applications or programs that
contain macros such as doc, pps, xls and mdb. They automatically infect the files
with macros and also templates and documents that are contained in the file. They
hide in documents shared through e-mail and networks.
Examples: Relax, bablas and 097M/Y2K
Virus Hoaxes
Trojan Horses
Worms
Spam
Adware
Spyware
Malware
How Do Computer Viruses Spread?
Computer viruses usually spread in one of three
ways:-
•From Removable media.
•From Downloads off the Internet.
•From e-mail attachments.
I. When a virus begins to spread, many program files can
become unstable and display warnings.
II. The operating system may not launch properly.
III. Critical files may get deleted automatically and the
computer may be running slower than usual.
Computer Virus Symptoms:-
Computer is infected with a virus, it may begin to show a
series of Computer Virus symptoms that indicate that a
virus is present.
Virus can damage your system:-
A computer virus can do a lot of damage to your system before
you even realize that it happened.
Computer Viruses: Quickly spreads from one computer to
another computer. It starts by attaching and loading itself onto
the computer without your knowledge.
A computer virus can be duplicated.
How to remove a computer virus?
Install and Update the antivirus software on the
computer. Then, perform a thorough scan of the
computer by using the antivirus software.
Install the latest updates from Microsoft Update
on the computer.
Download, install, and then run the Malicious
Software Removal Tool to remove existing viruses
on the computer.
How to protect your computer against viruses:-
On the computer, turn on the firewall.
Keep the computer operating system
up-to-date.
Use updated antivirus software on
the computer.
Conclusion..!!
TopicTopic
Antivirus Software is a computer program that identify and
remove computer viruses, and other malicious software
like Worms and Trojans from an infected computer. Not
only this, an antivirus software also protects the computer
from further virus attacks.
The first anti-virus software in 1987. Fix, a German
astrophysicist and amateur computer programmer
developed software to combat the first computer virus “in
the wild," which means that the virus had escaped the
confines of the lab or network .
An Antivirus works Using dictionary
Approach The antivirus software
examines each and every file in a
computer and examines its content
with the virus definitions stored in its
virus dictionary. A virus dictionary is
an inbuilt file belonging to an antivirus
software that contains code identified
as a virus by the antivirus authors.
Anti-virus applications maintain a database of
known viruses and compare scanned files that
match the characteristics of known viruses. If a
scanned files matches those characteristics of
known viruses. If a scanned file matches those
characteristics, it is quarantined (which means
moved to a new, presumably safe location on disk
and renamed, so you can find it should you ever
need it) so that it cannot affect other files on your
system.
1.AVG
AVG is one of the most popular antivirus programs that can be
obtained for free and is easy to download directly from the Internet. It
can also work with a number of different Windows systems. It has the
ability to hold virus files in quarantine so that they cannot do any harm
before they can be checked and deleted.
2.McAfee
McAfee Virus Scan has been the second most popular antivirus
programs on the market. It provides for spyware and virus protection
under one program, rather than separately as many other programs
do. It is necessary downloads when they are required.
3.Norton
There are a number of Norton antivirus programs available which are
all produced by Symantec. They have quickly proven themselves to be
a market leader when it comes to computer system security. Norton
Anti-Virus software programs that searches the computer and deletes
any viruses that it finds.
4.Kaspersky
Though Kaspersky is not the most popular of all the antivirus
protection programs. However, they still provide a very effective
product in the protection against viruses, spyware and Trojan horses.
.
5.AdAware
Ad Aware provides protection against a large number of cyber security
threats that arise from using the Internet. In addition to finding and
removing viruses and spyware that can detect key strokes and
passwords, it will protect against trojan horses.
Files which have been damaged by computer
viruses are normally damaged beyond
recovery. Anti-virus software removes the
virus code from the file during disinfection, but
this does not always restore the file to its
undamaged state. In such circumstances,
damaged files can only be restored from
existing backups; installed software that is
damaged requires re-installation.
Conclusion
For Joining

More Related Content

What's hot

Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
Adeel Rasheed
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
Computer virus
Computer virusComputer virus
Computer virus
Aarya Khanal
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
Kriti kohli
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Annies Minu
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer Virus
Computer VirusComputer Virus
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Annies Minu
 
Computer virus
Computer virusComputer virus
Computer virus
Utchi
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 

What's hot (20)

Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 

Viewers also liked

Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
DaniZavala261115
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
Lee Ray
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
 
Uses of computer in space
Uses of computer in spaceUses of computer in space
Uses of computer in space
Abdul Hadi
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
BESOR ACADEMY
 
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Neel Pathak
 
Computer virus
Computer virusComputer virus
Computer virus
nikkinikhita
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 

Viewers also liked (14)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Uses of computer in space
Uses of computer in spaceUses of computer in space
Uses of computer in space
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 

Similar to Computer virus and antivirus

Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Virus
VirusVirus
Virus
dddaou
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
Prasad Athukorala
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
Yastee Shah
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Virus
VirusVirus
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Information of Virus
Information of VirusInformation of Virus
Information of Virusjazz_306
 

Similar to Computer virus and antivirus (20)

Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus
VirusVirus
Virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 

Recently uploaded

Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Jay Das
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 

Recently uploaded (20)

Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 

Computer virus and antivirus

  • 1. Presented by Maryam Zahid Presented to Mam Maria Ramzan
  • 3.  What is anti virus? & short history of it.  How an antivirus work?  Configuring antivirus software?  Some of the symptoms of an infected computer?  Deleting Identified Virus files manually?  Antivirus Effectiveness.  Antivirus Damaged files.  Online Antivirus scanning.  some popular Antivirus.
  • 4. What is Computer Virus..?? Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.
  • 5. Viruses – Types and Examples 1. Boot viruses: This virus infects the hard disks or floppy drives boot sector. This would make the computer unable to boot. These viruses can, however, be avoided by ensuring that the floppy disks and hard drive is well protected. Never start the computer using an unknown disk drive or floppy disk. Examples: the brain virus -it is the very first wild virus to be created. 2.Overwrite Viruses: These types of viruses delete any information in a file they infect, leaving them partially or completely useless once they are infected. Once in the computer, they replace all the file content but the file size doesn’t change. Unfortunately, you would only clean the infected file by deleting it completely, therefore losing original content. Examples: Trj. Reboot ,Way and Trivial.88.D
  • 6. 3 .Memory Resident Viruses: They usually fix themselves inside the computer memory. They get activated every time the OS runs and end up infecting other opened files. Their effects include corrupting programs and files that are closed, opened, renamed or copied. They hide in RAM. Example: CMJ, Meve, Randex and Mrklunky 4 .Direct Action Viruses These viruses mainly replicate or take action once they are executed. When a certain condition is met, the viruses will act by infecting the files in the directory or the folder specified in the AUTOEXEC.BAT. The viruses are generally found in the hard disk’s root directory, but they keep on changing location. Example: Vienna virus
  • 7. 5 .Program Viruses: These infect executable program files, such as those with extensions like BIN, COM, EXE, OVL, DRV (driver) and .SYS (device driver). These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk. Examples: Sunday and Cascade 6. Macro Viruses These viruses infect the files created using some applications or programs that contain macros such as doc, pps, xls and mdb. They automatically infect the files with macros and also templates and documents that are contained in the file. They hide in documents shared through e-mail and networks. Examples: Relax, bablas and 097M/Y2K
  • 9. How Do Computer Viruses Spread? Computer viruses usually spread in one of three ways:- •From Removable media. •From Downloads off the Internet. •From e-mail attachments.
  • 10. I. When a virus begins to spread, many program files can become unstable and display warnings. II. The operating system may not launch properly. III. Critical files may get deleted automatically and the computer may be running slower than usual. Computer Virus Symptoms:- Computer is infected with a virus, it may begin to show a series of Computer Virus symptoms that indicate that a virus is present.
  • 11. Virus can damage your system:- A computer virus can do a lot of damage to your system before you even realize that it happened. Computer Viruses: Quickly spreads from one computer to another computer. It starts by attaching and loading itself onto the computer without your knowledge. A computer virus can be duplicated.
  • 12. How to remove a computer virus? Install and Update the antivirus software on the computer. Then, perform a thorough scan of the computer by using the antivirus software. Install the latest updates from Microsoft Update on the computer. Download, install, and then run the Malicious Software Removal Tool to remove existing viruses on the computer.
  • 13. How to protect your computer against viruses:- On the computer, turn on the firewall. Keep the computer operating system up-to-date. Use updated antivirus software on the computer.
  • 16. Antivirus Software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks. The first anti-virus software in 1987. Fix, a German astrophysicist and amateur computer programmer developed software to combat the first computer virus “in the wild," which means that the virus had escaped the confines of the lab or network .
  • 17. An Antivirus works Using dictionary Approach The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary. A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.
  • 18. Anti-virus applications maintain a database of known viruses and compare scanned files that match the characteristics of known viruses. If a scanned files matches those characteristics of known viruses. If a scanned file matches those characteristics, it is quarantined (which means moved to a new, presumably safe location on disk and renamed, so you can find it should you ever need it) so that it cannot affect other files on your system.
  • 19. 1.AVG AVG is one of the most popular antivirus programs that can be obtained for free and is easy to download directly from the Internet. It can also work with a number of different Windows systems. It has the ability to hold virus files in quarantine so that they cannot do any harm before they can be checked and deleted. 2.McAfee McAfee Virus Scan has been the second most popular antivirus programs on the market. It provides for spyware and virus protection under one program, rather than separately as many other programs do. It is necessary downloads when they are required.
  • 20. 3.Norton There are a number of Norton antivirus programs available which are all produced by Symantec. They have quickly proven themselves to be a market leader when it comes to computer system security. Norton Anti-Virus software programs that searches the computer and deletes any viruses that it finds. 4.Kaspersky Though Kaspersky is not the most popular of all the antivirus protection programs. However, they still provide a very effective product in the protection against viruses, spyware and Trojan horses. .
  • 21. 5.AdAware Ad Aware provides protection against a large number of cyber security threats that arise from using the Internet. In addition to finding and removing viruses and spyware that can detect key strokes and passwords, it will protect against trojan horses.
  • 22.
  • 23. Files which have been damaged by computer viruses are normally damaged beyond recovery. Anti-virus software removes the virus code from the file during disinfection, but this does not always restore the file to its undamaged state. In such circumstances, damaged files can only be restored from existing backups; installed software that is damaged requires re-installation.