SlideShare a Scribd company logo
1 of 30
Computer viruses
• Created by:-
• Jagath
• Pankaj
• Pratish
• Rasika
• Niraj
What is a computer virus?
• A computer virus is a computer
program that can copy itself and infect a
computer without permission or
knowledge of the user.
• A computer virus can only spread from
one computer to another when its host is
taken to the uninfected computer, for
instance by a user sending it over a
network or the Internet, or by carrying it
on a removable medium such as a floppy
disk, CD, or USB drive.
History of computer viruses
• 1981 Apple Viruses 1, 2, & 3
• 1980’s Fred Cohen
• 1987 Lehigh Virus
• 1988 The first anti virus software
• 1990 The first polymorphic viruses
• 1991 Symantec releases Norton Anti
Virus
• 1992 The Michelangelo Virus
• 1994 Kaos4 virus spreads via adult
websites.
Virus through the internet
• Today almost 87% of all viruses
are spread through the internet.
• Transmission time to a new host
is relatively low, on the order
of hours to days
• “Latent virus”
Symptoms of virus Attack
• Computer no longer boots up.
• Screen sometimes flicker.
• Computer runs slower then usual.
• PC speaker beeps periodically.
• System crashes for no reason.
• Files/directories sometimes
disappear.
• Denial of service (dos)….. & Many
More.
Examples of risky file types
• The following file types should be treated with
suspicion and be confirmed with the sender before
being opened:
– .exe
– .pif
– .bat
– .vbs
– .com
What to do when you find viruses
 Firstly, you should call the administrator for
future action. In some cases it is not good to
start you computer from hard disk, because
the virus may active and then do some harm.
 Make sure that you should get sure that it is
virus and what virus it is. It is important to
know what kind of virus we are dealing with.
Companies that make anti-virus programs
know what different viruses do and you can
go to their web pages and read about the
virus you have.
Cont……
 When you start you computer you should do
it from a clean (non-infected) floppy diskette
and after that run the virus program. The
boot diskette should be write protected so
that virus can not infect the boot diskette too.
 It is good to take a backup of the file that was
infected. Virus program could do some
damage to the file and that is why it is good
to have a backup.
 It is good to let you, to know about the virus,
so viruses would not spread around so much.
How to protect from viruses
Best way to protect yourself is to prepare your computer
against viruses in advance. One way to protect you
computer is to use updated anti-virus program. When you
get an email attachment, you should first check the
attachment by checking the file with an anti-virus program.
One can protect the computer against boot sector viruses
by setting the BIOS to start from a hard disk rather than
from a floppy disk.
Write protection is a good way to prohibit against viruses.
Write protection works well in floppy disks, Windows NT
and UNIX, but not that well in Windows and Windows95.
What is a computer WORM ?
• A computer worm is a self-replicating
computer program. It uses a network to send
copies of itself to other nodes (computer
terminals on the network) and it may do so
without any user intervention.
• Unlike a virus, it does not need to attach itself
to an existing program. Worms almost always
cause harm to the network, if only by
consuming bandwidth, whereas viruses
almost always corrupt or modify files on a
targeted computer.
What are Trojan Horses ?
• A Trojan horse, also known as a trojan, is malware
that appears to perform a desirable function but in
fact performs undisclosed malicious functions.
Therefore, a computer worm or virus may be a Trojan
horse. The term is derived from the classical story of
the Trojan Horse.
• A program named "waterfalls.scr" serves as a simple
example of a trojan horse. The author claims it is a
free waterfall screen saver. When run, it instead
unloads hidden programs, commands, scripts, or any
number of commands without the user's knowledge
or consent.
Types of viruses
• Boot viruses
• Program viruses
• Multipartite viruses
• Stealth viruses
• Polymorphic viruses
How viruses get into
computers
• The four most common virus infections come from:
– File – A virus type that infects existing files on the computer
(approx. 40% of all viruses)
– Macro – A virus that runs as a macro in a host application
such as the MS Office applications (approx. 35%)
– VBScript – A virus that uses Windows VisualBasic Script
functionality (approx. 10%)
– Internet Worm – A virus that is primarily characterized by
it’s replication across the Internet (approx. 5%)
Basic virus defense
• Be cautious of files that you are not expecting and from
unknown senders.
• Many viruses automatically send files without the email account
owner’s knowledge. They can ‘piggyback’ on the email accounts
of senders you know.
• Be suspicious of messages that appear more than once in your
Inbox
• Be aware of sites offering free software downloads
Basic virus defense (cont.)
• Learn file extensions
– Your computer will display both an icon and a file
extension for every file.
– Open only file extensions you know are safe.
ANTIVIRUS
• Antivirus software are computer programs that
attempt to identify, neutralize or eliminate malicious
software. The term "antivirus" is used because the
earliest examples were designed exclusively to
combat computer viruses; however most modern
antivirus software is now designed to combat a wide
range of threats, including worms, phishing attacks,
Trojans, often described collectively as malware.
2009 AntiVirus Software Product
Comparisons
Removal Of Some Common Viruses
• You can remove some of the common
viruses without help of any antivirus
Program.
• Eg : New Folder.exe
• Autorun.inf ( from PDs etc)
New Folder.exe
• It looks just like an folder but actually it is a exe file.
• Step 1: Try deleting the file.
• It will delete if you haven’t executed it, if you’re unable to delete it
• Go to Task manager ( by pressing ctrl+shift+esc )
Go to Process Tab and
try finding that the
process for the exe file
and end the process.
Then Go to the same
folder containing the
exe file and delete it.
Then Open Search and
try finding the .exe files
of same size and delete
them all.
Removal of Autorun.inf
• Open Run dialog Box. Type in “CMD”
press ENTER.
Cont…….
• The Command Prompt will Open Now. In Command prompt go to the drive
containing Autorun.inf
• Now Type In “ attrib –h –s –a” and press enter.
• This will remove drives attributes for all Hidden, System files.
• Now Type “ Delete autorun.inf” and press Enter.
• The Virus has been Successfully Removed.
 Data Fellows F-Prot
 EliaShim ViruSafe
 ESaSS ThunderBYTE
 IBM Antivirus
 McAfee Scan
 Microsoft Anti-Virus
 Symantec Norton Antivirus
 S&S Dr S&S Dr Solomon's AVTK.
 Bit Defender 2008
* How computer viruses have spread
out around the world *
 Computer viruses are a problem all over the world. The
following picture tells us how many times people have
accessed Data Fellows, a company that makes anti-virus
program F-Prot, more than 1,672,846 per month. It means that
people are interesting in virus information. One reason is that
people have to deal with viruses. Viruses in not only a problem
in Finland and USA, it is a problem around the world.
 Today's most common virus is the macro virus. Cap virus is
one of the macro viruses. Last month there were 3100 Cap
macro virus accesses during the last 30 days in Data Fellows.
Next common virus was “Join” with 1171 accesses and third
common was Pen pal Greetings with 895 accesses.
www.solentbiz.co.uk
www.solentbiz.co.uk
conclusion
 There are lots of viruses in the world and new viruses
are coming up every day. There are new anti-virus
programs and techniques developed too. It is good to
be aware of viruses and other malware and it is
cheaper to protect you environment from them rather
then being sorry. There might be a virus in your
computer if it starts acting differently. There is no
reason to panic if the computer virus is found.
 It is good to be a little suspicious of malware when
you surf in the Internet and download files. Some files
that look interesting might hide a malware.
THE LAST WORD
“THE ONLY TRULY SECURE SYSTEM
IS ONE THAT IS POWERED OFF,
CAST IN A BLOCK OF CONCRETE, AND
SEALED IN A LEAD-LINED ROOM WITH
ARMED GUARDS AND EVEN THEN I
HAVE MY DOUBTS.”
Keep your pc
safe......./
THANK YOU

More Related Content

What's hot

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 

What's hot (20)

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus part2
Virus part2Virus part2
Virus part2
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Spyware
SpywareSpyware
Spyware
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware
MalwareMalware
Malware
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 

Viewers also liked

Mechanism Of Polymorphic And Metamorphic Virus
Mechanism Of Polymorphic And Metamorphic VirusMechanism Of Polymorphic And Metamorphic Virus
Mechanism Of Polymorphic And Metamorphic Virus
vivid_0416
 
Security Challenges of Antivirus Engines, Products and Systems
Security Challenges of Antivirus Engines, Products and SystemsSecurity Challenges of Antivirus Engines, Products and Systems
Security Challenges of Antivirus Engines, Products and Systems
Antiy Labs
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 

Viewers also liked (20)

Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Mechanism Of Polymorphic And Metamorphic Virus
Mechanism Of Polymorphic And Metamorphic VirusMechanism Of Polymorphic And Metamorphic Virus
Mechanism Of Polymorphic And Metamorphic Virus
 
Security Challenges of Antivirus Engines, Products and Systems
Security Challenges of Antivirus Engines, Products and SystemsSecurity Challenges of Antivirus Engines, Products and Systems
Security Challenges of Antivirus Engines, Products and Systems
 
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware TrojanMalware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
 
Cryptography
CryptographyCryptography
Cryptography
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Computer virus
Computer virusComputer virus
Computer virus
 

Similar to Computer viruses

computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
jazz_306
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................
vndoon
 
Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 

Similar to Computer viruses (20)

computer viruses
computer virusescomputer viruses
computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus project
Virus projectVirus project
Virus project
 
information about virus
information about virusinformation about virus
information about virus
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harm
 
Virus
VirusVirus
Virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from Pankaj Kumawat (7)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Firewall
FirewallFirewall
Firewall
 
Antivirus
AntivirusAntivirus
Antivirus
 
Android system
Android systemAndroid system
Android system
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Sisth sense technology
Sisth sense technologySisth sense technology
Sisth sense technology
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Computer viruses

  • 1. Computer viruses • Created by:- • Jagath • Pankaj • Pratish • Rasika • Niraj
  • 2. What is a computer virus? • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. • A computer virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 3. History of computer viruses • 1981 Apple Viruses 1, 2, & 3 • 1980’s Fred Cohen • 1987 Lehigh Virus • 1988 The first anti virus software • 1990 The first polymorphic viruses • 1991 Symantec releases Norton Anti Virus • 1992 The Michelangelo Virus • 1994 Kaos4 virus spreads via adult websites.
  • 4. Virus through the internet • Today almost 87% of all viruses are spread through the internet. • Transmission time to a new host is relatively low, on the order of hours to days • “Latent virus”
  • 5. Symptoms of virus Attack • Computer no longer boots up. • Screen sometimes flicker. • Computer runs slower then usual. • PC speaker beeps periodically. • System crashes for no reason. • Files/directories sometimes disappear. • Denial of service (dos)….. & Many More.
  • 6. Examples of risky file types • The following file types should be treated with suspicion and be confirmed with the sender before being opened: – .exe – .pif – .bat – .vbs – .com
  • 7. What to do when you find viruses  Firstly, you should call the administrator for future action. In some cases it is not good to start you computer from hard disk, because the virus may active and then do some harm.  Make sure that you should get sure that it is virus and what virus it is. It is important to know what kind of virus we are dealing with. Companies that make anti-virus programs know what different viruses do and you can go to their web pages and read about the virus you have.
  • 8. Cont……  When you start you computer you should do it from a clean (non-infected) floppy diskette and after that run the virus program. The boot diskette should be write protected so that virus can not infect the boot diskette too.  It is good to take a backup of the file that was infected. Virus program could do some damage to the file and that is why it is good to have a backup.  It is good to let you, to know about the virus, so viruses would not spread around so much.
  • 9. How to protect from viruses Best way to protect yourself is to prepare your computer against viruses in advance. One way to protect you computer is to use updated anti-virus program. When you get an email attachment, you should first check the attachment by checking the file with an anti-virus program. One can protect the computer against boot sector viruses by setting the BIOS to start from a hard disk rather than from a floppy disk. Write protection is a good way to prohibit against viruses. Write protection works well in floppy disks, Windows NT and UNIX, but not that well in Windows and Windows95.
  • 10. What is a computer WORM ? • A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. • Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 11. What are Trojan Horses ? • A Trojan horse, also known as a trojan, is malware that appears to perform a desirable function but in fact performs undisclosed malicious functions. Therefore, a computer worm or virus may be a Trojan horse. The term is derived from the classical story of the Trojan Horse. • A program named "waterfalls.scr" serves as a simple example of a trojan horse. The author claims it is a free waterfall screen saver. When run, it instead unloads hidden programs, commands, scripts, or any number of commands without the user's knowledge or consent.
  • 12. Types of viruses • Boot viruses • Program viruses • Multipartite viruses • Stealth viruses • Polymorphic viruses
  • 13. How viruses get into computers • The four most common virus infections come from: – File – A virus type that infects existing files on the computer (approx. 40% of all viruses) – Macro – A virus that runs as a macro in a host application such as the MS Office applications (approx. 35%) – VBScript – A virus that uses Windows VisualBasic Script functionality (approx. 10%) – Internet Worm – A virus that is primarily characterized by it’s replication across the Internet (approx. 5%)
  • 14. Basic virus defense • Be cautious of files that you are not expecting and from unknown senders. • Many viruses automatically send files without the email account owner’s knowledge. They can ‘piggyback’ on the email accounts of senders you know. • Be suspicious of messages that appear more than once in your Inbox • Be aware of sites offering free software downloads
  • 15. Basic virus defense (cont.) • Learn file extensions – Your computer will display both an icon and a file extension for every file. – Open only file extensions you know are safe.
  • 16. ANTIVIRUS • Antivirus software are computer programs that attempt to identify, neutralize or eliminate malicious software. The term "antivirus" is used because the earliest examples were designed exclusively to combat computer viruses; however most modern antivirus software is now designed to combat a wide range of threats, including worms, phishing attacks, Trojans, often described collectively as malware.
  • 17. 2009 AntiVirus Software Product Comparisons
  • 18. Removal Of Some Common Viruses • You can remove some of the common viruses without help of any antivirus Program. • Eg : New Folder.exe • Autorun.inf ( from PDs etc)
  • 19. New Folder.exe • It looks just like an folder but actually it is a exe file. • Step 1: Try deleting the file. • It will delete if you haven’t executed it, if you’re unable to delete it • Go to Task manager ( by pressing ctrl+shift+esc )
  • 20. Go to Process Tab and try finding that the process for the exe file and end the process. Then Go to the same folder containing the exe file and delete it. Then Open Search and try finding the .exe files of same size and delete them all.
  • 21. Removal of Autorun.inf • Open Run dialog Box. Type in “CMD” press ENTER.
  • 22. Cont……. • The Command Prompt will Open Now. In Command prompt go to the drive containing Autorun.inf • Now Type In “ attrib –h –s –a” and press enter. • This will remove drives attributes for all Hidden, System files. • Now Type “ Delete autorun.inf” and press Enter. • The Virus has been Successfully Removed.
  • 23.  Data Fellows F-Prot  EliaShim ViruSafe  ESaSS ThunderBYTE  IBM Antivirus  McAfee Scan  Microsoft Anti-Virus  Symantec Norton Antivirus  S&S Dr S&S Dr Solomon's AVTK.  Bit Defender 2008
  • 24. * How computer viruses have spread out around the world *  Computer viruses are a problem all over the world. The following picture tells us how many times people have accessed Data Fellows, a company that makes anti-virus program F-Prot, more than 1,672,846 per month. It means that people are interesting in virus information. One reason is that people have to deal with viruses. Viruses in not only a problem in Finland and USA, it is a problem around the world.  Today's most common virus is the macro virus. Cap virus is one of the macro viruses. Last month there were 3100 Cap macro virus accesses during the last 30 days in Data Fellows. Next common virus was “Join” with 1171 accesses and third common was Pen pal Greetings with 895 accesses.
  • 27. conclusion  There are lots of viruses in the world and new viruses are coming up every day. There are new anti-virus programs and techniques developed too. It is good to be aware of viruses and other malware and it is cheaper to protect you environment from them rather then being sorry. There might be a virus in your computer if it starts acting differently. There is no reason to panic if the computer virus is found.  It is good to be a little suspicious of malware when you surf in the Internet and download files. Some files that look interesting might hide a malware.
  • 28. THE LAST WORD “THE ONLY TRULY SECURE SYSTEM IS ONE THAT IS POWERED OFF, CAST IN A BLOCK OF CONCRETE, AND SEALED IN A LEAD-LINED ROOM WITH ARMED GUARDS AND EVEN THEN I HAVE MY DOUBTS.”