SlideShare a Scribd company logo
What is a computer virus
1. An infective agent that typically consists of a
nucleic acid molecule in a protein coat, is too
small to be seen by light microscopy, and is able
to multiply only within the living cells of a host.
"the hepatitis B virus"
an infection or disease caused by a virus.
"I've had a virus"
a harmful or corrupting influence.
"the virus of cruelty that is latent in all human
beings"
2. A piece of code which is capable of copying
Signs of a virus
If you're conversant with computer code,
looking at the actual strings of code in a
suspect program can help spot suspicious or
out of place commands. But even if you don't
know your way around codes it may help to look
at the contents of a data file anyway. Strange
messages are commonly inserted by virus
writers and can be read within the code. Look
at a data file with a word processing program
and search for these.
• Applications that don't work properly.
• Disks can't be accessed.
• Printing doesn't work correctly.
• Pull-down menus are distorted.
• File size changes for no apparent reason.
• Date of last access does not match date of
last use.
• An increase in the number of files on the
system when nothing has been added
• Uncommanded disk drive activity.
• Unusual error messages.
• System slows down, freezes or crashes.
Signs of a virus conduit
Conduit is normally downloaded along with
software bundles, torrents, freeware,
and shareware as a third party add-on,
extension, toolbar, or plugin. You can also
knowingly download the Conduit
Community Toolbar for your browser
without realizing that it is harmful.
Malicious software developers distribute
their products with Conduit tools
Damage caused by computer virus
Computer virus can do something more than what you think.
Every single document that has been stored in the hard drive
will lost forever if you don’t free your system of virus. Losing
personal information is a nightmare and it can ruin a project or
your entire effort in just a few a minute. You can buy a new
computer, but it is quite impossible to get back all those
important documents once they are lost from the system.
A few people believe that using antivirus is not a mandatory
task when you are using a PC. However, they must remember
that total system failure is another issue and most of the time
virus seems responsible for this incident. It can happen to
both PCs and several desktops as well.
General types of virus
Boot virus
Program virus
Multipartite virus
Stealth virus
Polymorphic virus
Macro virus
Active x virus
Boot virus
Since nobody uses floppy disks anymore, these
types of computer virus are left to infect only
the master boot records of the hard disk. The
boot record program loads the operating
system in the memory at startup. These
viruses replace the boot record and move it to
a different part of the hard disk, or simply
overwrite it. As you can imagine, once you
start your operating system, it loads into
memory, along with the virus. Once the virus is
in the memory, it is free to do whatever it was
Program viruses
These types of computer virus will
infect only executable files (with
extensions like .BIN, .COM, .EXE, .OVL, .DRV, and
.SYS). Once executed, these programs load
into memory, along with the virus
contained within them. Once in the
memory, the scenario repeats – the virus
is free to act and infect other files or
Multipartite viruses
These computer viruses are hybrids,
derived from boot viruses and
program viruses. They infect
executable files, just like the
program viruses but, once the
executable is executed, it infects
the master boot records. The
scenario is similar to the boot virus’s
Stealth viruses
These viruses are specialized in
avoiding detection and will use a
number of techniques to do so. Most
of them simply redirect the hard
disk head, forcing it to read another
memory sector instead of their own.
Some of them also alter the reading
of the file size shown when listing
Polymorphic viruses
The polymorphic viruses will
always change their source
code from one infection to
another. Each infection is
different, and this makes
detection very hard. However,
detection is still possible,
Macro viruses
This virus is relatively new and it
infects macros within a template or
document. When you open a word
processing document, it activates the
virus. The virus infects the
Normal.dot template, which is a
general file used by all the
documents. So, whenever you open an
Active X viruses
Most people do not know how to
configure ActiveX and Java
controls, unconsciously leaving a
security hole. Applets are then
allowed to run freely on the
machine, delivering all ActiveX
viruses. By simply turning off
Anti- virus
Antivirus software is a computer
program that detects, prevents,
and takes action to disarm or
remove malicious software
programs, such as viruses and
worms. You can help protect your
computer against viruses by using
antivirus software, such as
Popular anti - virus
Computer virus (sarthak)

More Related Content

What's hot

Computervirus
ComputervirusComputervirus
Computervirus
kishan alagiya
 
Computer Virus
Computer VirusComputer Virus
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
Virus vs Anti-Virus
Virus vs Anti-VirusVirus vs Anti-Virus
Virus vs Anti-Virus
SamarAhmadKhan1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Billiyan
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
 
Virus
VirusVirus
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
bozzerapide
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robert
robsworld
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
sanmitha rao
 
computer virus
computer virus computer virus
computer virus
Nourhan Markus
 
Cryptovirology - by Malathi
Cryptovirology - by MalathiCryptovirology - by Malathi
Cryptovirology - by Malathi
Santhosh Sundar
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
UltraUploader
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
Pratimesh Pathak
 
Multiple Tools Required To Disinfect A Pc
Multiple Tools Required To Disinfect A PcMultiple Tools Required To Disinfect A Pc
Multiple Tools Required To Disinfect A Pc
Robert Sarkes
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
Dom Mike
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
Gilbert Pagapang
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special viruses
UltraUploader
 
Ict
IctIct
Ict
IctIct

What's hot (20)

Computervirus
ComputervirusComputervirus
Computervirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Virus vs Anti-Virus
Virus vs Anti-VirusVirus vs Anti-Virus
Virus vs Anti-Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Virus
VirusVirus
Virus
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robert
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
 
computer virus
computer virus computer virus
computer virus
 
Cryptovirology - by Malathi
Cryptovirology - by MalathiCryptovirology - by Malathi
Cryptovirology - by Malathi
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
 
Multiple Tools Required To Disinfect A Pc
Multiple Tools Required To Disinfect A PcMultiple Tools Required To Disinfect A Pc
Multiple Tools Required To Disinfect A Pc
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special viruses
 
Ict
IctIct
Ict
 
Ict
IctIct
Ict
 

Viewers also liked

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Bachelor's Degree Academic Transcript
Bachelor's Degree Academic TranscriptBachelor's Degree Academic Transcript
Bachelor's Degree Academic TranscriptReshma Shrestha
 
Following Joe Peters on the Campaign trail
Following Joe Peters on the Campaign trailFollowing Joe Peters on the Campaign trail
Following Joe Peters on the Campaign trail
smulrich77
 
CertificateMagic_04-03-35
CertificateMagic_04-03-35CertificateMagic_04-03-35
CertificateMagic_04-03-35
Guy O'Connor
 
Manual zanussi encimera zes3921 iba
Manual zanussi   encimera zes3921 ibaManual zanussi   encimera zes3921 iba
Manual zanussi encimera zes3921 iba
Alsako Electrodomésticos
 
Manual zanussi encimera zev6340 xba
Manual zanussi   encimera zev6340 xbaManual zanussi   encimera zev6340 xba
Manual zanussi encimera zev6340 xba
Alsako Electrodomésticos
 
Manual zanussi congelador zfc21400 wa
Manual zanussi   congelador zfc21400 waManual zanussi   congelador zfc21400 wa
Manual zanussi congelador zfc21400 wa
Alsako Electrodomésticos
 
Manual zanussi cocina zcg510 g1xa
Manual zanussi   cocina zcg510 g1xaManual zanussi   cocina zcg510 g1xa
Manual zanussi cocina zcg510 g1xa
Alsako Electrodomésticos
 
Compassion International By Lindsey Crown
Compassion International By Lindsey CrownCompassion International By Lindsey Crown
Compassion International By Lindsey Crown
Lindsey Crown
 
Why is politics not essentially contested?
Why is politics not essentially contested?Why is politics not essentially contested?
Why is politics not essentially contested?
robustmotto3357
 
Images d'automne
Images d'automneImages d'automne
Images d'automne
Balcon60
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
Ammy Vijay
 
Organisations in the age of algorithms
Organisations in the age of algorithmsOrganisations in the age of algorithms
Organisations in the age of algorithms
Lee Bryant
 
Manejo de Hipervínculos en PowerPoint2013
Manejo de Hipervínculos en PowerPoint2013Manejo de Hipervínculos en PowerPoint2013
Manejo de Hipervínculos en PowerPoint2013
Mariana Acosta
 
Pib – crecimiento económico
Pib – crecimiento económicoPib – crecimiento económico
Pib – crecimiento económico
steven castillo
 
Social Teams and Organisational Change in Utilities
Social Teams and Organisational Change in UtilitiesSocial Teams and Organisational Change in Utilities
Social Teams and Organisational Change in Utilities
Lee Bryant
 
Exposition AnselmKiefer 11mars126
Exposition AnselmKiefer 11mars126Exposition AnselmKiefer 11mars126
Exposition AnselmKiefer 11mars126
marleroy
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
Android malware analysis
Android malware analysisAndroid malware analysis
Android malware analysis
Jason Ross
 

Viewers also liked (20)

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Bachelor's Degree Academic Transcript
Bachelor's Degree Academic TranscriptBachelor's Degree Academic Transcript
Bachelor's Degree Academic Transcript
 
Following Joe Peters on the Campaign trail
Following Joe Peters on the Campaign trailFollowing Joe Peters on the Campaign trail
Following Joe Peters on the Campaign trail
 
CertificateMagic_04-03-35
CertificateMagic_04-03-35CertificateMagic_04-03-35
CertificateMagic_04-03-35
 
Manual zanussi encimera zes3921 iba
Manual zanussi   encimera zes3921 ibaManual zanussi   encimera zes3921 iba
Manual zanussi encimera zes3921 iba
 
Manual zanussi encimera zev6340 xba
Manual zanussi   encimera zev6340 xbaManual zanussi   encimera zev6340 xba
Manual zanussi encimera zev6340 xba
 
Manual zanussi congelador zfc21400 wa
Manual zanussi   congelador zfc21400 waManual zanussi   congelador zfc21400 wa
Manual zanussi congelador zfc21400 wa
 
Manual zanussi cocina zcg510 g1xa
Manual zanussi   cocina zcg510 g1xaManual zanussi   cocina zcg510 g1xa
Manual zanussi cocina zcg510 g1xa
 
letter rec 3
letter rec 3letter rec 3
letter rec 3
 
Compassion International By Lindsey Crown
Compassion International By Lindsey CrownCompassion International By Lindsey Crown
Compassion International By Lindsey Crown
 
Why is politics not essentially contested?
Why is politics not essentially contested?Why is politics not essentially contested?
Why is politics not essentially contested?
 
Images d'automne
Images d'automneImages d'automne
Images d'automne
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Organisations in the age of algorithms
Organisations in the age of algorithmsOrganisations in the age of algorithms
Organisations in the age of algorithms
 
Manejo de Hipervínculos en PowerPoint2013
Manejo de Hipervínculos en PowerPoint2013Manejo de Hipervínculos en PowerPoint2013
Manejo de Hipervínculos en PowerPoint2013
 
Pib – crecimiento económico
Pib – crecimiento económicoPib – crecimiento económico
Pib – crecimiento económico
 
Social Teams and Organisational Change in Utilities
Social Teams and Organisational Change in UtilitiesSocial Teams and Organisational Change in Utilities
Social Teams and Organisational Change in Utilities
 
Exposition AnselmKiefer 11mars126
Exposition AnselmKiefer 11mars126Exposition AnselmKiefer 11mars126
Exposition AnselmKiefer 11mars126
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Android malware analysis
Android malware analysisAndroid malware analysis
Android malware analysis
 

Similar to Computer virus (sarthak)

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Virus
VirusVirus
Virus
dddaou
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
Muhammad Ramzan
 
Computer virus
Computer virusComputer virus
Computer virus
nutantripathi
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Virus
VirusVirus
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
SridharChowdary10
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
Dara Corporates
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
dilsherece
 
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 
Computer viruses
Computer virusesComputer viruses
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
Sadaf Walliyani
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 

Similar to Computer virus (sarthak) (20)

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus
VirusVirus
Virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Virus
VirusVirus
Virus
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 

Recently uploaded

NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 

Recently uploaded (20)

NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 

Computer virus (sarthak)

  • 1.
  • 2. What is a computer virus 1. An infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host. "the hepatitis B virus" an infection or disease caused by a virus. "I've had a virus" a harmful or corrupting influence. "the virus of cruelty that is latent in all human beings" 2. A piece of code which is capable of copying
  • 3. Signs of a virus If you're conversant with computer code, looking at the actual strings of code in a suspect program can help spot suspicious or out of place commands. But even if you don't know your way around codes it may help to look at the contents of a data file anyway. Strange messages are commonly inserted by virus writers and can be read within the code. Look at a data file with a word processing program and search for these.
  • 4. • Applications that don't work properly. • Disks can't be accessed. • Printing doesn't work correctly. • Pull-down menus are distorted. • File size changes for no apparent reason. • Date of last access does not match date of last use. • An increase in the number of files on the system when nothing has been added • Uncommanded disk drive activity. • Unusual error messages. • System slows down, freezes or crashes.
  • 5. Signs of a virus conduit Conduit is normally downloaded along with software bundles, torrents, freeware, and shareware as a third party add-on, extension, toolbar, or plugin. You can also knowingly download the Conduit Community Toolbar for your browser without realizing that it is harmful. Malicious software developers distribute their products with Conduit tools
  • 6. Damage caused by computer virus Computer virus can do something more than what you think. Every single document that has been stored in the hard drive will lost forever if you don’t free your system of virus. Losing personal information is a nightmare and it can ruin a project or your entire effort in just a few a minute. You can buy a new computer, but it is quite impossible to get back all those important documents once they are lost from the system. A few people believe that using antivirus is not a mandatory task when you are using a PC. However, they must remember that total system failure is another issue and most of the time virus seems responsible for this incident. It can happen to both PCs and several desktops as well.
  • 7. General types of virus Boot virus Program virus Multipartite virus Stealth virus Polymorphic virus Macro virus Active x virus
  • 8. Boot virus Since nobody uses floppy disks anymore, these types of computer virus are left to infect only the master boot records of the hard disk. The boot record program loads the operating system in the memory at startup. These viruses replace the boot record and move it to a different part of the hard disk, or simply overwrite it. As you can imagine, once you start your operating system, it loads into memory, along with the virus. Once the virus is in the memory, it is free to do whatever it was
  • 9. Program viruses These types of computer virus will infect only executable files (with extensions like .BIN, .COM, .EXE, .OVL, .DRV, and .SYS). Once executed, these programs load into memory, along with the virus contained within them. Once in the memory, the scenario repeats – the virus is free to act and infect other files or
  • 10. Multipartite viruses These computer viruses are hybrids, derived from boot viruses and program viruses. They infect executable files, just like the program viruses but, once the executable is executed, it infects the master boot records. The scenario is similar to the boot virus’s
  • 11. Stealth viruses These viruses are specialized in avoiding detection and will use a number of techniques to do so. Most of them simply redirect the hard disk head, forcing it to read another memory sector instead of their own. Some of them also alter the reading of the file size shown when listing
  • 12. Polymorphic viruses The polymorphic viruses will always change their source code from one infection to another. Each infection is different, and this makes detection very hard. However, detection is still possible,
  • 13. Macro viruses This virus is relatively new and it infects macros within a template or document. When you open a word processing document, it activates the virus. The virus infects the Normal.dot template, which is a general file used by all the documents. So, whenever you open an
  • 14. Active X viruses Most people do not know how to configure ActiveX and Java controls, unconsciously leaving a security hole. Applets are then allowed to run freely on the machine, delivering all ActiveX viruses. By simply turning off
  • 15. Anti- virus Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using antivirus software, such as
  • 16. Popular anti - virus