SlideShare a Scribd company logo
KAMRAN NASIR
REG NO:2521-SE/BSECO
2/S15
SUBJECT: COMPUTER
INSTRUCTOR: DR MOAZAM
COMPUTER VIRUSES
WHAT IS A COMPUTER VIRUS?
Think of a biological virus – the kind that makes you sick. It
persistently keeps you from functioning normally and often requires
something powerful to get of it. A computer virus is very similar.
Designed to relentlessly replicate, computer viruses infect your
programs and files, alter the way your computer operates or stop it
from working altogether. It’s estimated that the Conficker virus
infected more than 10 million computers in 2009. Tens of thousands
of computer viruses now operate over the Internet, and new
computer viruses are discovered every day.
HOW DOES A COMPUTER VIRUS FINDS
ME?
Even if you’re careful you can pick up computer viruses through
normal Web activities like:
1) Sharing music, files or photos with other users
2) Visiting an infected Web site
3) Opening spam email or an email attachment
4) Downloading free games, toolbars, media players and other
system utilities
5) Installing mainstream software applications without fully reading
license agreements.
WHAT DOES A COMPUTER VIRUS DO AND
SYMPTOMS?
Some computer viruses are programmed to harm your computer by damaging programs,
deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a
network with traffic, making it impossible to perform any internet activity. Even less harmful
computer viruses can significantly disrupt your system’s performance, sapping computer
memory and causing frequent computer crashes.
Your computer may be infected if you recognize any of these malware symptoms:
1) Slow computer performance
2) Computer behavior
3) Unexplained data loss
4) Frequent computer crashes
COMPUTER VIRUS TYPES AND THEIR EFFECTS
( 1949-81 )
1949 – 1966 – Self-Reproducing Automata: Self-replicating programs were established in 1949, to produce a large
number of viruses, John von Neumann, whose known to be the “Father of Cybernetics”, wrote an article on the “Theory
of Self-Reproducing Automata” that was published in 1966.
1959 – Core Wars: A computer game was programmed in Bell Laboratory by Victor Vysottsky, H. Douglas McIlroy and
Robert P Morris. They named it Core Wars. In this game, infectious programs named organisms competed with the
processing time of PC.
1971 – The Creeper: Bob Thomas developed an experimental self-replicating program. It accessed through ARPANET
(The Advanced Research Projects Agency Network) and copied to a remote host systems with TENEX operating system. A
message displayed that “I’m the creeper, catch me if you can!”. Another program named Reaper was created to delete
the existing harmful program the Creaper.
1974 – Wabbit (Rabbit): This infectious program was developed to make multiple copies of itself on a computer clogging
the system reducing the performance of the computer.
1974 – 1975 – ANIMAL: John Walker developed a program called ANIMAL for the UNIVAC 1108. This was said to be a
non-malicious Trojan that is known to spread through shared tapes.
1983-1998
1983 – This was the year when the term “Virus” was coined by Frederick Cohen for the computer programs that are infectious as it has the
tendency to replicate.
1986 – Brain: This is a virus also known as the “Brain boot sector”, that is compatible with IBM PC was programmed and developed by two
Pakistani programmers Basit Farooq Alvi, and his brother, Amjad Farooq Alvi.
1987- Lehigh: This virus was programmed to infect command.com files from Yale University.
Cascade: This virus is a self-encrypted file virus which was the outcome of IBM’s own antivirus product.
Jerusalem Virus: This type of virus was first detected in the city of Jerusalem. This was developed to destroy all files in an infected
computers on the thirteenth day that falls on a Friday.
1988 – The Morris Worm: This type of worm was created by Robert Tappan Morris to infect DEC VAX and Sun machines running BSD UNIX
through the Internet. This is best known for exploiting the computers that are prone to buffer overflow vulnerabilities.
1990 - Symantec launched one of the first antivirus programs called the Norton Antivirus, to fight against the infectious viruses. The first
family of polymorphic virus called the Chameleon was developed by Ralf Burger.
1995 – Concept: This virus name Concept was created to spread and attack Microsoft Word documents.
1996 – A macro virus known as Laroux was developed to infect Microsoft Excel Documents, A virus named Baza was developed to infect
Windows 95 and Virus named Staog was created to infect Linux.
1998 – CIH Virus: The release of the first version of CIH viruses developed by Chen Ing Hau from Taiwan.
1999-2014
1999 – Happy99: This type of worm was developed to attach itself to emails with a message Happy New Year. Outlook
Express and Internet Explorer on Windows 95 and 98 were affected.
2000 – ILOVEYOU: The virus is capable of deleting files in JPEGs, MP2, or MP3 formats.
2001 – Anna Kournikova: This virus was spread by emails to the contacts in the compromised address book of Microsoft
Outlook. The emails purported to contain pictures of the very attractive female tennis player, but in fact hid a malicious
virus.
2002 – LFM-926: This virus was developed to infect Shockware Flash files.
Beast or RAT: This is backdoor Trojan horse and is capable of infecting all versions of Windows OS.
2004 – MyDoom: This infectious worm also called the Novang. This was developed to share files and permits hackers to
access to infected computers. It is known as the fastest mailer worm.
2005 – Samy XXA: This type of virus was developed to spread faster and it is known to infect the Windows family.
2006 – OSX/Leap-A: This was the first ever known malware discovered against Mac OS X.
Nyxem: This type of worm was created to spread by mass-mailing, destroying Microsoft Office files.
2007 – Storm Worm: This was a fast spreading email spamming threat against Microsoft systems that compromised
millions of systems.
Zeus: This is a type of Trojan that infects used capture login credentials from banking web sites and commit financial
fraud.
2008 – Koobface: This virus was developed and created to target Facebook and MySpace users.
HOW TO AVOID VIRUSES?
ANTIVIRUS OR ANTI-VIRUS SOFTWARE (OFTEN ABBREVIATED AS AV), SOMETIMES KNOWN AS
ANTI-MALWARE SOFTWARE, IS COMPUTER SOFTWARE USED TO PREVENT, DETECT AND REMOVE
MALICIOUS SOFTWARE.
COMPUTER VIRUS HELP
Make sure that you have the best security software products installed
on your computer:
1) Use antivirus protection and a firewall
2) Get antispyware software
3) Always keep your antivirus protection and antispyware software
up-to-date
4) Update your operating system regularly
5) Increase your browser security settings
6) Avoid questionable Web sites
7) Only download software from sites you trust. Carefully evaluate
free software and file-sharing applications before downloading
QUERY? Feel free to ask.

More Related Content

What's hot

Computer worm
Computer wormComputer worm
Computer worm
zelkan19
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
vipinkumar940
 
Virus09
Virus09Virus09
Virus09
defler
 
Virus
Virus  Virus
Computer Virus
Computer Virus Computer Virus
Computer Virus
Study Hub
 
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and prevention
Cholo Legisma
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and prevention
Cholo Legisma
 
Viruses and its History
Viruses and its HistoryViruses and its History
Viruses and its History
Sunil Kafle
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Gisha Mathyari
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
Nishant Reshwal
 
computer-viruses
computer-virusescomputer-viruses
computer-viruses
Tayyaba farooq
 
Viruses And Hacking
Viruses And HackingViruses And Hacking
Viruses And Hacking
Muhammad Fahd Un-Nabi Khan
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Abdul Wadood Khan
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
jyoti_lakhani
 
Computer virus
Computer virusComputer virus
Computer virus
Shailendra Gohil
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
ESET
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alishba ijaz Muhammad Ijaz
 

What's hot (20)

Computer worm
Computer wormComputer worm
Computer worm
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Virus09
Virus09Virus09
Virus09
 
Virus
Virus  Virus
Virus
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and prevention
 
Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and prevention
 
Viruses and its History
Viruses and its HistoryViruses and its History
Viruses and its History
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
computer-viruses
computer-virusescomputer-viruses
computer-viruses
 
Viruses And Hacking
Viruses And HackingViruses And Hacking
Viruses And Hacking
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Viewers also liked

Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018
IJMER
 
3) M1 Comparing Job Roles
3) M1 Comparing Job Roles3) M1 Comparing Job Roles
3) M1 Comparing Job Roles
Adam Green
 
Военные профессии
Военные профессииВоенные профессии
Военные профессии
GBDOU №51
 
Bh31193198
Bh31193198Bh31193198
Bh31193198
IJMER
 
De3211001104
De3211001104De3211001104
De3211001104
IJMER
 
Яковенко Л. В. Загальний огляд навчально-методичної літератури, що забезпечує...
Яковенко Л. В. Загальний огляд навчально-методичної літератури, що забезпечує...Яковенко Л. В. Загальний огляд навчально-методичної літератури, що забезпечує...
Яковенко Л. В. Загальний огляд навчально-методичної літератури, що забезпечує...Електронні книги Ранок
 
Fremtidens vidensmedarbejder
Fremtidens vidensmedarbejderFremtidens vidensmedarbejder
Fremtidens vidensmedarbejder
Kim Escherich
 
Driving IT: Internet of Things
Driving IT: Internet of ThingsDriving IT: Internet of Things
Driving IT: Internet of Things
Kim Escherich
 
Future Cities: Upgrading Rio to Smart
Future Cities: Upgrading Rio to SmartFuture Cities: Upgrading Rio to Smart
Future Cities: Upgrading Rio to Smart
Kim Escherich
 
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...
Kim Escherich
 
Презентація Битківської ЗОШ І - ІІІ ст. №1
Презентація Битківської ЗОШ І - ІІІ ст. №1Презентація Битківської ЗОШ І - ІІІ ст. №1
Презентація Битківської ЗОШ І - ІІІ ст. №1
Надвірнянський інформаційно - методичний центр
 
Презентація учнівського комітету Середньомайданської ЗОШ І - ІІІ ст.
Презентація  учнівського комітету Середньомайданської ЗОШ І - ІІІ ст.Презентація  учнівського комітету Середньомайданської ЗОШ І - ІІІ ст.
Презентація учнівського комітету Середньомайданської ЗОШ І - ІІІ ст.
Надвірнянський інформаційно - методичний центр
 
зорі
зорізорі
зорі
vira2015
 
Du31580586
Du31580586Du31580586
Du31580586
IJMER
 
Kindergarten orientation 2015
Kindergarten orientation 2015 Kindergarten orientation 2015
Kindergarten orientation 2015
drjkmulloykindie
 
Cognitive Buildings
Cognitive BuildingsCognitive Buildings
Cognitive Buildings
Kim Escherich
 

Viewers also liked (16)

Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018
 
3) M1 Comparing Job Roles
3) M1 Comparing Job Roles3) M1 Comparing Job Roles
3) M1 Comparing Job Roles
 
Военные профессии
Военные профессииВоенные профессии
Военные профессии
 
Bh31193198
Bh31193198Bh31193198
Bh31193198
 
De3211001104
De3211001104De3211001104
De3211001104
 
Яковенко Л. В. Загальний огляд навчально-методичної літератури, що забезпечує...
Яковенко Л. В. Загальний огляд навчально-методичної літератури, що забезпечує...Яковенко Л. В. Загальний огляд навчально-методичної літератури, що забезпечує...
Яковенко Л. В. Загальний огляд навчально-методичної літератури, що забезпечує...
 
Fremtidens vidensmedarbejder
Fremtidens vidensmedarbejderFremtidens vidensmedarbejder
Fremtidens vidensmedarbejder
 
Driving IT: Internet of Things
Driving IT: Internet of ThingsDriving IT: Internet of Things
Driving IT: Internet of Things
 
Future Cities: Upgrading Rio to Smart
Future Cities: Upgrading Rio to SmartFuture Cities: Upgrading Rio to Smart
Future Cities: Upgrading Rio to Smart
 
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...
 
Презентація Битківської ЗОШ І - ІІІ ст. №1
Презентація Битківської ЗОШ І - ІІІ ст. №1Презентація Битківської ЗОШ І - ІІІ ст. №1
Презентація Битківської ЗОШ І - ІІІ ст. №1
 
Презентація учнівського комітету Середньомайданської ЗОШ І - ІІІ ст.
Презентація  учнівського комітету Середньомайданської ЗОШ І - ІІІ ст.Презентація  учнівського комітету Середньомайданської ЗОШ І - ІІІ ст.
Презентація учнівського комітету Середньомайданської ЗОШ І - ІІІ ст.
 
зорі
зорізорі
зорі
 
Du31580586
Du31580586Du31580586
Du31580586
 
Kindergarten orientation 2015
Kindergarten orientation 2015 Kindergarten orientation 2015
Kindergarten orientation 2015
 
Cognitive Buildings
Cognitive BuildingsCognitive Buildings
Cognitive Buildings
 

Similar to Computer viruses

History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
Ammy Vijay
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
VijayPatidar71
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
NORTHCUSTOMS
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
PrinceYdvz
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
Priyanka Aggarwal
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
AsimRaza464161
 
Viruses
VirusesViruses
Viruses
AlyssaFerrer7
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
LadyChristianneCalic
 
Viruses
VirusesViruses
Viruses
yuvan80
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
sonykhan3
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Ali Al Sarraf
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
shoib_245
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
shopnil786
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
radhika.pdf
radhika.pdfradhika.pdf
radhika.pdf
dharmendra321361
 
Computer virus
Computer virusComputer virus
Computer virus
Sahib Sethi
 
computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100701982
 

Similar to Computer viruses (20)

History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
radhika.pdf
radhika.pdfradhika.pdf
radhika.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 

Recently uploaded

BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 

Recently uploaded (20)

BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 

Computer viruses

  • 1.
  • 2. KAMRAN NASIR REG NO:2521-SE/BSECO 2/S15 SUBJECT: COMPUTER INSTRUCTOR: DR MOAZAM
  • 4. WHAT IS A COMPUTER VIRUS? Think of a biological virus – the kind that makes you sick. It persistently keeps you from functioning normally and often requires something powerful to get of it. A computer virus is very similar. Designed to relentlessly replicate, computer viruses infect your programs and files, alter the way your computer operates or stop it from working altogether. It’s estimated that the Conficker virus infected more than 10 million computers in 2009. Tens of thousands of computer viruses now operate over the Internet, and new computer viruses are discovered every day.
  • 5. HOW DOES A COMPUTER VIRUS FINDS ME? Even if you’re careful you can pick up computer viruses through normal Web activities like: 1) Sharing music, files or photos with other users 2) Visiting an infected Web site 3) Opening spam email or an email attachment 4) Downloading free games, toolbars, media players and other system utilities 5) Installing mainstream software applications without fully reading license agreements.
  • 6. WHAT DOES A COMPUTER VIRUS DO AND SYMPTOMS? Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes. Your computer may be infected if you recognize any of these malware symptoms: 1) Slow computer performance 2) Computer behavior 3) Unexplained data loss 4) Frequent computer crashes
  • 7. COMPUTER VIRUS TYPES AND THEIR EFFECTS ( 1949-81 ) 1949 – 1966 – Self-Reproducing Automata: Self-replicating programs were established in 1949, to produce a large number of viruses, John von Neumann, whose known to be the “Father of Cybernetics”, wrote an article on the “Theory of Self-Reproducing Automata” that was published in 1966. 1959 – Core Wars: A computer game was programmed in Bell Laboratory by Victor Vysottsky, H. Douglas McIlroy and Robert P Morris. They named it Core Wars. In this game, infectious programs named organisms competed with the processing time of PC. 1971 – The Creeper: Bob Thomas developed an experimental self-replicating program. It accessed through ARPANET (The Advanced Research Projects Agency Network) and copied to a remote host systems with TENEX operating system. A message displayed that “I’m the creeper, catch me if you can!”. Another program named Reaper was created to delete the existing harmful program the Creaper. 1974 – Wabbit (Rabbit): This infectious program was developed to make multiple copies of itself on a computer clogging the system reducing the performance of the computer. 1974 – 1975 – ANIMAL: John Walker developed a program called ANIMAL for the UNIVAC 1108. This was said to be a non-malicious Trojan that is known to spread through shared tapes.
  • 8. 1983-1998 1983 – This was the year when the term “Virus” was coined by Frederick Cohen for the computer programs that are infectious as it has the tendency to replicate. 1986 – Brain: This is a virus also known as the “Brain boot sector”, that is compatible with IBM PC was programmed and developed by two Pakistani programmers Basit Farooq Alvi, and his brother, Amjad Farooq Alvi. 1987- Lehigh: This virus was programmed to infect command.com files from Yale University. Cascade: This virus is a self-encrypted file virus which was the outcome of IBM’s own antivirus product. Jerusalem Virus: This type of virus was first detected in the city of Jerusalem. This was developed to destroy all files in an infected computers on the thirteenth day that falls on a Friday. 1988 – The Morris Worm: This type of worm was created by Robert Tappan Morris to infect DEC VAX and Sun machines running BSD UNIX through the Internet. This is best known for exploiting the computers that are prone to buffer overflow vulnerabilities. 1990 - Symantec launched one of the first antivirus programs called the Norton Antivirus, to fight against the infectious viruses. The first family of polymorphic virus called the Chameleon was developed by Ralf Burger. 1995 – Concept: This virus name Concept was created to spread and attack Microsoft Word documents. 1996 – A macro virus known as Laroux was developed to infect Microsoft Excel Documents, A virus named Baza was developed to infect Windows 95 and Virus named Staog was created to infect Linux. 1998 – CIH Virus: The release of the first version of CIH viruses developed by Chen Ing Hau from Taiwan.
  • 9. 1999-2014 1999 – Happy99: This type of worm was developed to attach itself to emails with a message Happy New Year. Outlook Express and Internet Explorer on Windows 95 and 98 were affected. 2000 – ILOVEYOU: The virus is capable of deleting files in JPEGs, MP2, or MP3 formats. 2001 – Anna Kournikova: This virus was spread by emails to the contacts in the compromised address book of Microsoft Outlook. The emails purported to contain pictures of the very attractive female tennis player, but in fact hid a malicious virus. 2002 – LFM-926: This virus was developed to infect Shockware Flash files. Beast or RAT: This is backdoor Trojan horse and is capable of infecting all versions of Windows OS. 2004 – MyDoom: This infectious worm also called the Novang. This was developed to share files and permits hackers to access to infected computers. It is known as the fastest mailer worm. 2005 – Samy XXA: This type of virus was developed to spread faster and it is known to infect the Windows family. 2006 – OSX/Leap-A: This was the first ever known malware discovered against Mac OS X. Nyxem: This type of worm was created to spread by mass-mailing, destroying Microsoft Office files. 2007 – Storm Worm: This was a fast spreading email spamming threat against Microsoft systems that compromised millions of systems. Zeus: This is a type of Trojan that infects used capture login credentials from banking web sites and commit financial fraud. 2008 – Koobface: This virus was developed and created to target Facebook and MySpace users.
  • 10. HOW TO AVOID VIRUSES? ANTIVIRUS OR ANTI-VIRUS SOFTWARE (OFTEN ABBREVIATED AS AV), SOMETIMES KNOWN AS ANTI-MALWARE SOFTWARE, IS COMPUTER SOFTWARE USED TO PREVENT, DETECT AND REMOVE MALICIOUS SOFTWARE.
  • 11. COMPUTER VIRUS HELP Make sure that you have the best security software products installed on your computer: 1) Use antivirus protection and a firewall 2) Get antispyware software 3) Always keep your antivirus protection and antispyware software up-to-date 4) Update your operating system regularly 5) Increase your browser security settings 6) Avoid questionable Web sites 7) Only download software from sites you trust. Carefully evaluate free software and file-sharing applications before downloading
  • 12. QUERY? Feel free to ask.