SlideShare a Scribd company logo
1 of 20
Muhammad Uzair Rasheed

        2009-CPE-03
     UCE&T BZU MULTAN PAKISTAN
COMPUTER VIRUSES
COMPUTER VIRUS
What is computer virus?
 an executable program
 Can replicate itself
 Introduce to a computer system
     with any software program
   For internet users come from downloading files
   Can attach itself or replace the existing program
EFFECTS OF VIRUS
 Initiation of Events
 Effects of events
 An annoying message appearing on the computer screen.
 Reduced memory or disk space.
 Modification of data.
 Files overwritten or damaged.
 Hard drive erased.
TYPES OF VIRUSES
 Two major categories of viruses are
  - resident
  - non resident
 Viruses have many types some selected types are as
  follows
 Partition table virus
 Boot sector virus
 File viruses
BOOT SECTOR VIRUS/PARTITION
TABLE VIRUS
 Bootstrap loader
-first sector in the outermost track of floppy
 Master boot program
-first sector in the outermost track of hard disk
 Boot sector substitute itself for bootstrap loader
 Partition table substitute itself for master boot
  program
LOADING OF THESE VIRUSES
 How it loads itself?
-every time when we switch on the computer
 How it effects other diskettes?
-first it will check either diskettes is infected or not
- Infected: requested access is performed
- Not infected: moves original boot record and copies its
  own code
WORKING OF PARTITION TABLE
VIRUS
 It has several forms but attacks in similar way
 Its trick to activate itself
  - it gives allusion of second operating system`
 Effects
  - it prevents computer from starting and spreads onto
  any discs or flash drives that have plugged in.
WORKING OF BOOT SECTOR VIRUS
 Loading
  - Loads whenever computer starts up
  - replacement of boot sector code with its own choice.
 Effects
   - Incredibly destructive
    - Difficult to remove
    - Easily spread
    -Effect all the derives or disk that are in contact
 spread by reading infected disk
Boot virus life cycle
DETECTION
 Detected by searching their signature in memory
 signature is binary subset of virus code
 Selection of signature
 code searching in memory to find virus.
REMOVAL
 Rewrite the partition table or boot sector code
 Check whether the virus is resident
 If virus is resident system should be booted from a
 clean disk.
                OR
    By using a software called antivirus
FILE VIRUS
 DIFINATION
 - A computer virus that infects application file.
 LOADING
 Executable file virus
  - by inserting its code in original code
 Overwrite file virus
   - replacement of entire file
CONTINUE….
 Cannot embedded in pure data files
   - i.e plain text file, plain bitmap file
   - somehow embed these files never execute
 Parts
   - .com file virus
   - .exe file virus
COM File
 Mirror image of program code
   -image on disk is as loaded into the memory
 Single segment files
   -both data and code resides
HOW COM FILE VIRUS INFECTS
          FILES
 If resident may infect com file on execution
 It will interrupt 21H service 4B
     - this service load program into memory
 It will check the parameters of this service
    - if file is .com virus appends itself to a file
    -temper with first 3 bytes of .com file
    -execution branches to virus code
HOW COM VIRUS LOADS ITSELF
 Loaded file occupy number of paragraph controlled by
    MCB
   Infected file spread virus in memory area
   Virus is not independent program , does not have its
    own PSP
   if program terminate virus will also unloaded
   To be independent virus should create its own PSP and
    MCB
   Can also work as an independent program
EXE FILE VIRUSES
 It also relocates itself in the same way like com virus
 Different between exe and com file is
   - com file start execution from first instruction
   -Entry point of execution in exe file can be anywhere
  in the program
 Entry point is tempered by virus in exe file
REMOVAL
 Virus size should be known
 Firstly in case of com files
   - original value of first 3 bytes should be restored
   - In exe file value of entry point should be restored
 Copy the contents of original file into temporary file.
 Virus is not copied
 Delete original file and rename the temporary file

More Related Content

What's hot

What's hot (20)

Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Utility software
Utility softwareUtility software
Utility software
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 

Similar to Computer viruses

CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfkd123is123live
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Computer virus
Computer virusComputer virus
Computer virushrithikjha
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antivirusesSanguine_Eva
 
Information of Virus
Information of VirusInformation of Virus
Information of Virusjazz_306
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer virusestheonlineguru
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virussameer1993
 

Similar to Computer viruses (20)

CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Virus
VirusVirus
Virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Virus
VirusVirus
Virus
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Virus
VirusVirus
Virus
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 

More from Muhammad Uzair Rasheed (20)

Pak Energy conservation
Pak Energy conservation Pak Energy conservation
Pak Energy conservation
 
Pakistan Energy Conservation
Pakistan Energy ConservationPakistan Energy Conservation
Pakistan Energy Conservation
 
Molten Salt Reactor
Molten Salt ReactorMolten Salt Reactor
Molten Salt Reactor
 
Sampling
SamplingSampling
Sampling
 
Zindagi gulzar-hai
Zindagi gulzar-haiZindagi gulzar-hai
Zindagi gulzar-hai
 
C++loop statements
C++loop statementsC++loop statements
C++loop statements
 
Algorithms 1
Algorithms 1Algorithms 1
Algorithms 1
 
Verilog hdl
Verilog hdlVerilog hdl
Verilog hdl
 
Presentation on 2 nd generation telecommunication system
Presentation on 2 nd generation telecommunication systemPresentation on 2 nd generation telecommunication system
Presentation on 2 nd generation telecommunication system
 
Tdm & fdm
Tdm & fdmTdm & fdm
Tdm & fdm
 
Wavelength division multiplexing
Wavelength division multiplexingWavelength division multiplexing
Wavelength division multiplexing
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Guided media
Guided mediaGuided media
Guided media
 
Phase shift
Phase shiftPhase shift
Phase shift
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
First generation network
First generation networkFirst generation network
First generation network
 
First and second generation communication
First and second generation communicationFirst and second generation communication
First and second generation communication
 
Fdm
FdmFdm
Fdm
 
Channel impairments
Channel impairmentsChannel impairments
Channel impairments
 
Angle modulation
Angle modulationAngle modulation
Angle modulation
 

Recently uploaded

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Computer viruses

  • 1. Muhammad Uzair Rasheed 2009-CPE-03 UCE&T BZU MULTAN PAKISTAN
  • 3. COMPUTER VIRUS What is computer virus?  an executable program  Can replicate itself  Introduce to a computer system  with any software program  For internet users come from downloading files  Can attach itself or replace the existing program
  • 4. EFFECTS OF VIRUS  Initiation of Events  Effects of events  An annoying message appearing on the computer screen.  Reduced memory or disk space.  Modification of data.  Files overwritten or damaged.  Hard drive erased.
  • 5. TYPES OF VIRUSES  Two major categories of viruses are - resident - non resident  Viruses have many types some selected types are as follows  Partition table virus  Boot sector virus  File viruses
  • 6. BOOT SECTOR VIRUS/PARTITION TABLE VIRUS  Bootstrap loader -first sector in the outermost track of floppy  Master boot program -first sector in the outermost track of hard disk  Boot sector substitute itself for bootstrap loader  Partition table substitute itself for master boot program
  • 7. LOADING OF THESE VIRUSES  How it loads itself? -every time when we switch on the computer  How it effects other diskettes? -first it will check either diskettes is infected or not - Infected: requested access is performed - Not infected: moves original boot record and copies its own code
  • 8. WORKING OF PARTITION TABLE VIRUS  It has several forms but attacks in similar way  Its trick to activate itself - it gives allusion of second operating system`  Effects - it prevents computer from starting and spreads onto any discs or flash drives that have plugged in.
  • 9. WORKING OF BOOT SECTOR VIRUS  Loading - Loads whenever computer starts up - replacement of boot sector code with its own choice.  Effects - Incredibly destructive - Difficult to remove - Easily spread -Effect all the derives or disk that are in contact  spread by reading infected disk
  • 11. DETECTION  Detected by searching their signature in memory  signature is binary subset of virus code  Selection of signature  code searching in memory to find virus.
  • 12. REMOVAL  Rewrite the partition table or boot sector code  Check whether the virus is resident  If virus is resident system should be booted from a clean disk. OR By using a software called antivirus
  • 13. FILE VIRUS  DIFINATION - A computer virus that infects application file.  LOADING  Executable file virus - by inserting its code in original code  Overwrite file virus - replacement of entire file
  • 14. CONTINUE….  Cannot embedded in pure data files - i.e plain text file, plain bitmap file - somehow embed these files never execute  Parts - .com file virus - .exe file virus
  • 15. COM File  Mirror image of program code -image on disk is as loaded into the memory  Single segment files -both data and code resides
  • 16. HOW COM FILE VIRUS INFECTS FILES  If resident may infect com file on execution  It will interrupt 21H service 4B - this service load program into memory  It will check the parameters of this service - if file is .com virus appends itself to a file -temper with first 3 bytes of .com file -execution branches to virus code
  • 17. HOW COM VIRUS LOADS ITSELF  Loaded file occupy number of paragraph controlled by MCB  Infected file spread virus in memory area  Virus is not independent program , does not have its own PSP  if program terminate virus will also unloaded  To be independent virus should create its own PSP and MCB  Can also work as an independent program
  • 18.
  • 19. EXE FILE VIRUSES  It also relocates itself in the same way like com virus  Different between exe and com file is - com file start execution from first instruction -Entry point of execution in exe file can be anywhere in the program  Entry point is tempered by virus in exe file
  • 20. REMOVAL  Virus size should be known  Firstly in case of com files - original value of first 3 bytes should be restored - In exe file value of entry point should be restored  Copy the contents of original file into temporary file.  Virus is not copied  Delete original file and rename the temporary file

Editor's Notes

  1. bedded