SlideShare a Scribd company logo
Computer VirusesPresented BySHopNiL MaHmuD A Short Technical Report On
What is Computer Virus? A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner.  The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware.
How Viruses Work? A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on anetwork file system or a file system that is accessed by another computer.
Types of Viruses Viruses - A virus is a small piece of software that piggybacks on real programs. E-mail viruses - An e-mail virus travels as an attachment toe-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Trojan horses - A Trojan horse is simply a computer program. Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself.
How Virus Can infect Your Computer Like biological virus transform into human bodies, computer virus can also pass from one computer to another. In order to replicate itself, a virus must be permitted to execute code and write to memory.  If user attempts to launch an infected program, the virus' code may be executed simultaneously and multiply itself.
Virus History & Background Traditional computer viruses were first widely seen in the late 1980s, and they came about because of several factors. When PC’s were started using widespread, virus were created by the programmers. And this trend increased day by day ...
Worst  10 Viruses of The History ,[object Object]
Worst Computer Virus 9: ILOVEYOU (2000)
Worst Computer Virus 8: The Klez Virus (2001)
Worst Computer Virus 7: Code Red and Code Red II (2001)

More Related Content

What's hot

Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
wargames12
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
casyrichard
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
amoY91
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
Utkarsh Srivastava
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
abdullah shahzad
 
Virus slides
Virus slidesVirus slides
Virus slides
rahul kundu
 
As computer virus
As computer virusAs computer virus
As computer virus
achal bisht
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
Malwarebytes coupon code
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
Rebaz Hamad
 
computer virus
computer viruscomputer virus
computer virus
Kunal Yadav
 
Computer virus
Computer virusComputer virus
Computer virus
arif srk
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Aasim Mushtaq
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
virus
virusvirus
Virus
VirusVirus
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
sameer1993
 
Computer virus
Computer virusComputer virus
Computer virus
JoydipGhosh12
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
pratikpandya18
 
Computer virus
Computer virusComputer virus
Computer virus
Utchi
 

What's hot (20)

Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Virus slides
Virus slidesVirus slides
Virus slides
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
computer virus
computer viruscomputer virus
computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus
virusvirus
virus
 
Virus
VirusVirus
Virus
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer virus
Computer virusComputer virus
Computer virus
 

Similar to Computer viruses

Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
Malware
MalwareMalware
Malware
zelkan19
 
Malware
MalwareMalware
Malware
zelkan19
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Virus
VirusVirus
Virus
dddaou
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Computer virus
Computer virusComputer virus
Computer virus
BGS Model Public School
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
vipinkumar940
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
Prakriti Sharma
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Aman Chaudhary
 

Similar to Computer viruses (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Virus
VirusVirus
Virus
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Computer viruses

  • 1. Computer VirusesPresented BySHopNiL MaHmuD A Short Technical Report On
  • 2. What is Computer Virus? A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner.  The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware.
  • 3. How Viruses Work? A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on anetwork file system or a file system that is accessed by another computer.
  • 4. Types of Viruses Viruses - A virus is a small piece of software that piggybacks on real programs. E-mail viruses - An e-mail virus travels as an attachment toe-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Trojan horses - A Trojan horse is simply a computer program. Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself.
  • 5. How Virus Can infect Your Computer Like biological virus transform into human bodies, computer virus can also pass from one computer to another. In order to replicate itself, a virus must be permitted to execute code and write to memory.  If user attempts to launch an infected program, the virus' code may be executed simultaneously and multiply itself.
  • 6. Virus History & Background Traditional computer viruses were first widely seen in the late 1980s, and they came about because of several factors. When PC’s were started using widespread, virus were created by the programmers. And this trend increased day by day ...
  • 7.
  • 8. Worst Computer Virus 9: ILOVEYOU (2000)
  • 9. Worst Computer Virus 8: The Klez Virus (2001)
  • 10. Worst Computer Virus 7: Code Red and Code Red II (2001)
  • 11. Worst Computer Virus 6: Nimda (2001)
  • 12. Worst Computer Virus 5: SQL Slammer/Sapphire (2003)
  • 13. Worst Computer Virus 4: MyDoom (2004)
  • 14. Worst Computer Virus 3: Sasser and Netsky (2004)
  • 15. Worst Computer Virus 2: Leap-A/Oompa-A (2006)
  • 16.
  • 17. Stay Aware & Be Conscious Virus can easily be avoided if we stay conscious about it. Virus is not always a bad thing because it can be used in better purposes. It depends on the purpose you use it. Let’s have a safe and sound future of IT. The exciting stories of viruses can not be presented in such a short time, But we’ve tried.
  • 18. Your questions about Virus? Shopnil.d.rocker@gmail.com