SlideShare a Scribd company logo
ANTI VIRUS PACKAGES
V I R U S
!
Introduction to Virus.
Virus Protection, Deletion & Removal Utilities
Anti-Virus Packages to Prevent, detect & Delete Virus
Viruses, worms, Trojans, and bots are all pats of a class of software
called Malware.
Malware of malicious code is short for malicious software. It is code of
software that is specifically designed to damage, disrupt, steal, or in
general inflict some other “bad” of illegitimate action on data, hosts, or
networks.
Malware cannot damage the physical hardware of systems network
equipment, but is can damage the data and software residing on the
equipment.
What is Malware ?
INTRODUCTION TO VIRUS
A computer virus is a software programwith a abilityto make copies of itself , which
attacks itself to other application or files.
A virus cannot run by itself; it requires that its host programbe run to make the virus
active.
Almost all viruses are attached to an Executablefile.
Classification
VIRUS
4. TSR ( Terminateand stayresident )
1. Boot Virus
5. File infecting viruses ( ProgramVirus)
2. Micro Virus
3. Multipartite
1. Boot Viruses
Boot viruses infects the boot records of harddisk and floppy disks.
Generally these are consideredmore dangerous than programviruses.
A Boot record infectoris a piece of malware that inserts malicious code into
the boot sector of a disk.
2. Macro Virus
These viruses infects data files.
For example, Microsoft word document and template files are susceptibleto
macro virus attacks the spread rapidlyas infecteddocuments are sharedon
networks or downloaded frominternet sites.
3. Multipartite Virus
A multipartite virus is a virus that can infest eitherboot sectors or
executable.
Sucha virus typically has two parts, one for eachtype.
* When it infects an executable, it acts 3 as an executableinfector.
*When it infects a boot sector, it works as a boot sector infector.
4. Terminate and stay resident
A TSR virus is a virus that stays active in memory after the application ( or
bootstrapping, of disk mounting ) has terminated.
TSR viruses can be boot sector infectors or executable infectors.
The brain virus is a TSR virus.
5. File Infecting Viruses
These viruses infect programfiles, which have extensions such as .com, .exe,
.sys, .dll, .ovl or .scr. Programfiles are attractive targets for computer virus
because they are widelyused and have relativity, simpleformats to which
viruses can attach themselves.
Types of Viruses
1) Worms 2) Trojan Horse 3) Bombs
1). Computer Worm
A computer Wormis a standalone malware computer programthat
replicates itself in order to spread to other computers.
Examples : Klez, Nimda, Code Redetc.
2). Trojan Horse Viruses
Trojan Horse, or Trojan, is any malicious computer programwhichis used
to hack into a computer by misleading users of its true intent.
Logic Bombs that execute a certain payloadat a pre-definedtime or when
some other condition is met. This technique can be usedby a virus or worm
to gain momentumand spreadbefore being noticed.
Logic Bombs are usually timed to do maximumdamage.
3). Logic Bombs
 Replicating itself
 Interrupting system/network use
 Modifying configuration settings
 FlashingBIOS
 Format hard drive/destroy data
 Using computer/network resources
 Distribution of confidential information
 Denial of service attacks
How do viruses work ?
Once a virus gains access to a computer, its effects can vary. Possible attacks include.
Sources of Computer Virus Attack
 Removal media or drives
 Downloading internet files
 E-mail attachments
 Unpatchedsoftware and services
 Poor Administrator passwords
 Poor shared passwords
Computer Security
 Patchingthe operating system
 Patchingservices
 Patchingclient software
 Passwords
 Antivirus
 Software
 Firelwalls
Virus Prevention
Perform Basic Computer Safety Maintenance
 Use an internet Firewall
 Update Your Computer
 Virus Detection ( Antivirus Software )
 Strong Passwords
 ValidCertificates before installing software
collezian
Click Here
Name : Md. Azad
Branch : Computer Science and Engineering
Governments Polytechnic Chapra

More Related Content

What's hot

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
cdebraj16101991
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
Amrit Kaur
 

What's hot (20)

Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Anti virus
Anti virusAnti virus
Anti virus
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Mitppt
MitpptMitppt
Mitppt
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 

Similar to Computer viruses

Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
T.J. Schiel
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 

Similar to Computer viruses (20)

Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Presentation2
Presentation2Presentation2
Presentation2
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 

Recently uploaded (20)

How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

Computer viruses

  • 1. ANTI VIRUS PACKAGES V I R U S ! Introduction to Virus. Virus Protection, Deletion & Removal Utilities Anti-Virus Packages to Prevent, detect & Delete Virus
  • 2. Viruses, worms, Trojans, and bots are all pats of a class of software called Malware. Malware of malicious code is short for malicious software. It is code of software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” of illegitimate action on data, hosts, or networks. Malware cannot damage the physical hardware of systems network equipment, but is can damage the data and software residing on the equipment. What is Malware ?
  • 3. INTRODUCTION TO VIRUS A computer virus is a software programwith a abilityto make copies of itself , which attacks itself to other application or files. A virus cannot run by itself; it requires that its host programbe run to make the virus active. Almost all viruses are attached to an Executablefile.
  • 4. Classification VIRUS 4. TSR ( Terminateand stayresident ) 1. Boot Virus 5. File infecting viruses ( ProgramVirus) 2. Micro Virus 3. Multipartite
  • 5. 1. Boot Viruses Boot viruses infects the boot records of harddisk and floppy disks. Generally these are consideredmore dangerous than programviruses. A Boot record infectoris a piece of malware that inserts malicious code into the boot sector of a disk.
  • 6. 2. Macro Virus These viruses infects data files. For example, Microsoft word document and template files are susceptibleto macro virus attacks the spread rapidlyas infecteddocuments are sharedon networks or downloaded frominternet sites.
  • 7. 3. Multipartite Virus A multipartite virus is a virus that can infest eitherboot sectors or executable. Sucha virus typically has two parts, one for eachtype. * When it infects an executable, it acts 3 as an executableinfector. *When it infects a boot sector, it works as a boot sector infector.
  • 8. 4. Terminate and stay resident A TSR virus is a virus that stays active in memory after the application ( or bootstrapping, of disk mounting ) has terminated. TSR viruses can be boot sector infectors or executable infectors. The brain virus is a TSR virus.
  • 9. 5. File Infecting Viruses These viruses infect programfiles, which have extensions such as .com, .exe, .sys, .dll, .ovl or .scr. Programfiles are attractive targets for computer virus because they are widelyused and have relativity, simpleformats to which viruses can attach themselves.
  • 10. Types of Viruses 1) Worms 2) Trojan Horse 3) Bombs
  • 11. 1). Computer Worm A computer Wormis a standalone malware computer programthat replicates itself in order to spread to other computers. Examples : Klez, Nimda, Code Redetc.
  • 12. 2). Trojan Horse Viruses Trojan Horse, or Trojan, is any malicious computer programwhichis used to hack into a computer by misleading users of its true intent.
  • 13. Logic Bombs that execute a certain payloadat a pre-definedtime or when some other condition is met. This technique can be usedby a virus or worm to gain momentumand spreadbefore being noticed. Logic Bombs are usually timed to do maximumdamage. 3). Logic Bombs
  • 14.  Replicating itself  Interrupting system/network use  Modifying configuration settings  FlashingBIOS  Format hard drive/destroy data  Using computer/network resources  Distribution of confidential information  Denial of service attacks How do viruses work ? Once a virus gains access to a computer, its effects can vary. Possible attacks include.
  • 15. Sources of Computer Virus Attack  Removal media or drives  Downloading internet files  E-mail attachments  Unpatchedsoftware and services  Poor Administrator passwords  Poor shared passwords
  • 16. Computer Security  Patchingthe operating system  Patchingservices  Patchingclient software  Passwords  Antivirus  Software  Firelwalls Virus Prevention
  • 17. Perform Basic Computer Safety Maintenance  Use an internet Firewall  Update Your Computer  Virus Detection ( Antivirus Software )  Strong Passwords  ValidCertificates before installing software
  • 18. collezian Click Here Name : Md. Azad Branch : Computer Science and Engineering Governments Polytechnic Chapra