Awesomeness
Computer Virus
Computer Virus are malicious programs
which disrupts the normal functioning of the
computer system and can transfer through
computers without the acknowledge or
permission of the user.
-Bipul Pant
Computer Virus
• Computer viruses can spread into our system without any permission.
So, we should always be aware before running any unknown or
suspicious files.
Computer viruses can also harm our whole system , they can corrupt
all our files to wierd extensions and make them unusable.
We must be sure that the unknow file is safe
to use otherwise we shouldn’t run it.
If you don’t know that the file is safe, always press no.
• Always make sure you have an antivirus
software installed, if not take some
advice from your seniors to download
it.
• Some examples of antivirus softwares are:
• Avast Secure Connection -Kaspersky -Malwarebytes
Stealth Virus
• It uses special techniques to hide its presence from the user and
virus scan.
• The examples are Frodo, Joshi and Whale.
• A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software.
• Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.
• Users are typically tricked by some form of social engineering into loading and executing
Trojans on their systems.
Trojan Horse
Purpose of creating virus
 To stop the software piracy.
 To entertain user by displaying interesting message and pictures.
 To steal data and information.
 To destroy data, information and files.
 To expose their programming ability
 To earn money
IF WE GET ANY FILES LIKE THIS , WE MUST SCAN OUR
COMPUTER AND REMOVE THE VIRUS.
Types of computer virus
There are 5 tyes of computer virus.
Boot Sector Infector Virus (Start Up Infector or Bootstrap Virus):
Infects the bootstrap loader and the file that contains files information. C-Brain,
Stone, Disk Killer etc. are some popular Boot sector viruses.
File Infector or Parasitic Virus (General Purpose Application Infector):
Infects executable files or program (i.e. files having .exe, .bin, .sys or .com extension)
in the computer. Ambulance virus, Die Heart etc are the examples of file viruses.
Multi-partite Virus :
 have the abilities of the parasitic and the bootstrap sector viruses. So they are able to
infect either executable files or boot sector.
Types of Viruses Continue...
 Macro Virus (Document infector virus) :
• Infects specially the documents created in Microsoft applications
like MS-Word, MS-Excel, MS-Access or MS-
PowerPoint. Melissa, LoveLetter etc. are some examples of
macro virus.
 Script Virus:
 Written in script programming languages, such
as VBScript(Visual Basic Script) Java Script. “HTML.Redloaf.A”
and “Iloveyou” viruses are the examples of Script Viruses.
Computer virus | Definition | Explaination

Computer virus | Definition | Explaination

  • 1.
    Awesomeness Computer Virus Computer Virusare malicious programs which disrupts the normal functioning of the computer system and can transfer through computers without the acknowledge or permission of the user. -Bipul Pant
  • 2.
  • 3.
    • Computer virusescan spread into our system without any permission. So, we should always be aware before running any unknown or suspicious files. Computer viruses can also harm our whole system , they can corrupt all our files to wierd extensions and make them unusable.
  • 4.
    We must besure that the unknow file is safe to use otherwise we shouldn’t run it. If you don’t know that the file is safe, always press no.
  • 5.
    • Always makesure you have an antivirus software installed, if not take some advice from your seniors to download it.
  • 6.
    • Some examplesof antivirus softwares are: • Avast Secure Connection -Kaspersky -Malwarebytes
  • 7.
    Stealth Virus • Ituses special techniques to hide its presence from the user and virus scan. • The examples are Frodo, Joshi and Whale.
  • 8.
    • A Trojanhorse or Trojan is a type of malware that is often disguised as legitimate software. • Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. • Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Trojan Horse
  • 9.
    Purpose of creatingvirus  To stop the software piracy.  To entertain user by displaying interesting message and pictures.  To steal data and information.  To destroy data, information and files.  To expose their programming ability  To earn money
  • 10.
    IF WE GETANY FILES LIKE THIS , WE MUST SCAN OUR COMPUTER AND REMOVE THE VIRUS.
  • 11.
    Types of computervirus There are 5 tyes of computer virus. Boot Sector Infector Virus (Start Up Infector or Bootstrap Virus): Infects the bootstrap loader and the file that contains files information. C-Brain, Stone, Disk Killer etc. are some popular Boot sector viruses. File Infector or Parasitic Virus (General Purpose Application Infector): Infects executable files or program (i.e. files having .exe, .bin, .sys or .com extension) in the computer. Ambulance virus, Die Heart etc are the examples of file viruses. Multi-partite Virus :  have the abilities of the parasitic and the bootstrap sector viruses. So they are able to infect either executable files or boot sector.
  • 12.
    Types of VirusesContinue...  Macro Virus (Document infector virus) : • Infects specially the documents created in Microsoft applications like MS-Word, MS-Excel, MS-Access or MS- PowerPoint. Melissa, LoveLetter etc. are some examples of macro virus.  Script Virus:  Written in script programming languages, such as VBScript(Visual Basic Script) Java Script. “HTML.Redloaf.A” and “Iloveyou” viruses are the examples of Script Viruses.