SlideShare a Scribd company logo
1 of 18
Computer viruses
Efforts by :- Aagman Saini
A computer is a software program that has the ability to make copies of
itself , and attach itself to programs or files. It may or may not be
destructive. Viruses are written programs that are intended to run on
computer systems without user’s knowledge.
Most viruses stay active in the memory until you turn off the computer.
When you do so, the virus is removed from the computer’s memory, but
not from the file(s) or the disk it has infected. So, the next time you use
your computer the virus program is activated again. It may then attach
itself to more programs and/or files.
Computer viruses
Different viruses can do different things. It can do the following:-
 It can infect executable program files such as word processors,
spread sheets, & operating systems.
 It can infect disks by attaching itself to special programs on the
hard disks, called boot records. these are the programs that the
computer uses to start itself up.
What does a computer virus do?
When you experience strange behaviour on your
screen, it is possible that a virus has infected your
computer. It may corrupt or damage the files,
programs, & data.
Warning signals
If we group the viruses by their target, we can divide them in
the following ways:-
 Program viruses
 Boot viruses
 Macro viruses
 Malware
 Worms
 Trojan horses
 Spyware
 spam
Types of computer viruses
Program viruses infect program files, which have
extensions like .com, .exe, .DLL, etc..
The virus becomes active when executive files are
executed. Examples of program viruses are:-Alien.298,
umbrella.3173, Sunday, Amoeba. A.
Program viruses
Boot viruses infect the boot records of hard disks &
floppy disks. They are considered more dangerous than
program viruses. Examples of boot viruses are:- disk
killer, devil.941,Eek (b)
Boot viruses
A macro virus is a set of commands written by the user
to be executed later. For example, if you execute a set
of commands often in MS Excel or MS Word, you can
save than a set of commands as a macro. A macro virus
uses the macro language for its program. These viruses
infect data file. These viruses spread rapidly, as users
share infected files. Eg. Concept & Nuclear.
Macro viruses
Malware is short for malicious software. The word
refers to any program that infiltrates and harms a
computer without the users consent. Malware is a
general term that includes computer viruses, worms,
Trojan horses, spyware, and spam. Malware can slow
down computers and networks; it can be annoying, or it
can be actively destructive.
Malware
A computer worm is a program capable of reproducing and
spreading itself to another computer system, usually by means of a
computer network. Worms spread without any human action, and
thus differs from viruses. Viruses spread only when the user does
something like running an infected program or attaching an
infected file. A worm e-mails copies of itself to other computers.
Eg. ILOVEYOU, Sircam.
Worms
Trojan horse is a program that appears useful, but is actually a programmed to pass
the user’s data to someone else. Trojan horses attempt to steal and pass on
confidential information like passwords and credit card numbers. They do not
reproduce by infecting other files or by self – replicating like viruses and worms.
When a Trojan horse is activated, it typically changes existing desktop icons or
creates new ones. It may also delete important items. Its main aim is to steel
sensitive information stored on the infected computer. Eg. Beast, Zeus, Subseven
Trojan horses
Spyware refers to computer programs that secretly gather information about the
user and relay it to advertisers or other interested parties. They are also called
spybots or tracking software. Spyware is often installed without user’s consent
when:
 The user downloads something from the internet.
 The user clicks on something in a popup window that appears while browsing.
The biggest problem with spyware is that it can steal your information and misuse
your computer.
Spyware
Spam refers to unsolicited, unwanted e-mail. It may
carry advertisements or serve as a means of spreading
malware like viruses and worms. Some ways of avoiding
spam are:
 Do not give your e-mail address to unknown people.
Delete spam mails without reading them.
Spam
Here are some basic rules to avoid virus definitions:
 Restrict access to your system, both offline & online.
 Only allow trustworthy users to use the system.
 Never use an unknown disk.
 Install & use antivirus software & keep it updated
 Scan files you download from internet
 Keep your programs & data on separate disks, if possible.
Preventing virus infections
Antivirus software refers to applications designed to
detect & remove viruses from computer systems.
However, certain types of viruses are difficult to remove
& files damaged may be lost forever. Whenever the
computer starts up, the antivirus software starts
automatically & keeps check on every file . If it detects a
virus it tries to remove it.
Anti virus software
Virus definition are the database of viruses that
antivirus software scans for. This database needs to be
updated regularly, because new viruses are being
developed & released all the time if it is not updated
antivirus software will not know about new viruses &
will not be able to catch them.
Updating virus definitions
Virus definition are the database of viruses that
antivirus software scans for. This database needs to be
updated regularly, because new viruses are being
developed & released all the time if it is not updated
antivirus software will not know about new viruses &
will not be able to catch them.
Free antivirus software
Nowadays, free antiviruses programs like AVG & Avast
are becoming popular. they are easy to install & use & it
runs efficiently in the background. Updates happen
automatically.
Computer viruses

More Related Content

What's hot (20)

Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware
MalwareMalware
Malware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 

Viewers also liked

Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.QuratNaeem
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 

Viewers also liked (13)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 

Similar to Computer viruses (20)

Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus
VirusVirus
Virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 

More from aagmansaini

Health and hygiene
Health and hygieneHealth and hygiene
Health and hygieneaagmansaini
 
First aid(fainting)
First aid(fainting)First aid(fainting)
First aid(fainting)aagmansaini
 
Travel and tourism
Travel and tourismTravel and tourism
Travel and tourismaagmansaini
 
Disasters (man made and natural disasters)
Disasters (man made and natural disasters)Disasters (man made and natural disasters)
Disasters (man made and natural disasters)aagmansaini
 
Working of political institutuions
Working of political institutuionsWorking of political institutuions
Working of political institutuionsaagmansaini
 
The solar system
The solar systemThe solar system
The solar systemaagmansaini
 
Disasters(by aagman saini)
Disasters(by aagman saini)Disasters(by aagman saini)
Disasters(by aagman saini)aagmansaini
 
Tata iron and steel company(by aagman saini)
Tata iron and steel company(by aagman saini)Tata iron and steel company(by aagman saini)
Tata iron and steel company(by aagman saini)aagmansaini
 
Light(by aagman saini)
Light(by aagman saini)Light(by aagman saini)
Light(by aagman saini)aagmansaini
 

More from aagmansaini (15)

Health and hygiene
Health and hygieneHealth and hygiene
Health and hygiene
 
Ecotourism
EcotourismEcotourism
Ecotourism
 
First aid(fainting)
First aid(fainting)First aid(fainting)
First aid(fainting)
 
Travel and tourism
Travel and tourismTravel and tourism
Travel and tourism
 
Disasters (man made and natural disasters)
Disasters (man made and natural disasters)Disasters (man made and natural disasters)
Disasters (man made and natural disasters)
 
Earth day 2016
Earth day 2016Earth day 2016
Earth day 2016
 
Disasters
DisastersDisasters
Disasters
 
Working of political institutuions
Working of political institutuionsWorking of political institutuions
Working of political institutuions
 
Water
 Water Water
Water
 
Disasters
DisastersDisasters
Disasters
 
The solar system
The solar systemThe solar system
The solar system
 
Friction
FrictionFriction
Friction
 
Disasters(by aagman saini)
Disasters(by aagman saini)Disasters(by aagman saini)
Disasters(by aagman saini)
 
Tata iron and steel company(by aagman saini)
Tata iron and steel company(by aagman saini)Tata iron and steel company(by aagman saini)
Tata iron and steel company(by aagman saini)
 
Light(by aagman saini)
Light(by aagman saini)Light(by aagman saini)
Light(by aagman saini)
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Computer viruses

  • 1. Computer viruses Efforts by :- Aagman Saini
  • 2. A computer is a software program that has the ability to make copies of itself , and attach itself to programs or files. It may or may not be destructive. Viruses are written programs that are intended to run on computer systems without user’s knowledge. Most viruses stay active in the memory until you turn off the computer. When you do so, the virus is removed from the computer’s memory, but not from the file(s) or the disk it has infected. So, the next time you use your computer the virus program is activated again. It may then attach itself to more programs and/or files. Computer viruses
  • 3. Different viruses can do different things. It can do the following:-  It can infect executable program files such as word processors, spread sheets, & operating systems.  It can infect disks by attaching itself to special programs on the hard disks, called boot records. these are the programs that the computer uses to start itself up. What does a computer virus do?
  • 4. When you experience strange behaviour on your screen, it is possible that a virus has infected your computer. It may corrupt or damage the files, programs, & data. Warning signals
  • 5. If we group the viruses by their target, we can divide them in the following ways:-  Program viruses  Boot viruses  Macro viruses  Malware  Worms  Trojan horses  Spyware  spam Types of computer viruses
  • 6. Program viruses infect program files, which have extensions like .com, .exe, .DLL, etc.. The virus becomes active when executive files are executed. Examples of program viruses are:-Alien.298, umbrella.3173, Sunday, Amoeba. A. Program viruses
  • 7. Boot viruses infect the boot records of hard disks & floppy disks. They are considered more dangerous than program viruses. Examples of boot viruses are:- disk killer, devil.941,Eek (b) Boot viruses
  • 8. A macro virus is a set of commands written by the user to be executed later. For example, if you execute a set of commands often in MS Excel or MS Word, you can save than a set of commands as a macro. A macro virus uses the macro language for its program. These viruses infect data file. These viruses spread rapidly, as users share infected files. Eg. Concept & Nuclear. Macro viruses
  • 9. Malware is short for malicious software. The word refers to any program that infiltrates and harms a computer without the users consent. Malware is a general term that includes computer viruses, worms, Trojan horses, spyware, and spam. Malware can slow down computers and networks; it can be annoying, or it can be actively destructive. Malware
  • 10. A computer worm is a program capable of reproducing and spreading itself to another computer system, usually by means of a computer network. Worms spread without any human action, and thus differs from viruses. Viruses spread only when the user does something like running an infected program or attaching an infected file. A worm e-mails copies of itself to other computers. Eg. ILOVEYOU, Sircam. Worms
  • 11. Trojan horse is a program that appears useful, but is actually a programmed to pass the user’s data to someone else. Trojan horses attempt to steal and pass on confidential information like passwords and credit card numbers. They do not reproduce by infecting other files or by self – replicating like viruses and worms. When a Trojan horse is activated, it typically changes existing desktop icons or creates new ones. It may also delete important items. Its main aim is to steel sensitive information stored on the infected computer. Eg. Beast, Zeus, Subseven Trojan horses
  • 12. Spyware refers to computer programs that secretly gather information about the user and relay it to advertisers or other interested parties. They are also called spybots or tracking software. Spyware is often installed without user’s consent when:  The user downloads something from the internet.  The user clicks on something in a popup window that appears while browsing. The biggest problem with spyware is that it can steal your information and misuse your computer. Spyware
  • 13. Spam refers to unsolicited, unwanted e-mail. It may carry advertisements or serve as a means of spreading malware like viruses and worms. Some ways of avoiding spam are:  Do not give your e-mail address to unknown people. Delete spam mails without reading them. Spam
  • 14. Here are some basic rules to avoid virus definitions:  Restrict access to your system, both offline & online.  Only allow trustworthy users to use the system.  Never use an unknown disk.  Install & use antivirus software & keep it updated  Scan files you download from internet  Keep your programs & data on separate disks, if possible. Preventing virus infections
  • 15. Antivirus software refers to applications designed to detect & remove viruses from computer systems. However, certain types of viruses are difficult to remove & files damaged may be lost forever. Whenever the computer starts up, the antivirus software starts automatically & keeps check on every file . If it detects a virus it tries to remove it. Anti virus software
  • 16. Virus definition are the database of viruses that antivirus software scans for. This database needs to be updated regularly, because new viruses are being developed & released all the time if it is not updated antivirus software will not know about new viruses & will not be able to catch them. Updating virus definitions Virus definition are the database of viruses that antivirus software scans for. This database needs to be updated regularly, because new viruses are being developed & released all the time if it is not updated antivirus software will not know about new viruses & will not be able to catch them.
  • 17. Free antivirus software Nowadays, free antiviruses programs like AVG & Avast are becoming popular. they are easy to install & use & it runs efficiently in the background. Updates happen automatically.