SlideShare a Scribd company logo
COMPUTER VIRUS
WHAT IS VIRUS ?
 Computer viruses are small software programs that are
designed to spread from one computer to another and to
interference in computer operation.
 A virus might corrupt or delete data on your computer, use
your e-mail program to spread itself to other computers, or
even erase everything on your hard disk.
 Viruses are most easily spread by attachments in e-mail
messages or instant messaging messages.
 That is why it is essential that you never open e-mail
attachments unless you know who it's from and you are
expecting it.
 Once a virus is on your computer, its type or the method it
used to get there is not as important as removing it and
preventing further infection.
 Viruses can be disguised as attachments of funny images,
greeting cards, or audio and video files. Viruses also
spread through downloads on the Internet.
 They can be hidden in illicit software or other files or
programs you might download.
General information about
computer virus
 Different Malware Types.
 Malware is a general name for all programs that are harmful;
viruses, Trojan, worms and all other similar programs.
 These classifications take into account the different ways in
which the virus can infect different parts of a system.
 The manner in which each of these types operates has one
thing in common: any virus has to be executed in order to
operate.
Trojan
 A Trojan Horse is a program that does something else that the
user thought it would do. It is mostly done to someone on
purpose.
 The Trojan Horses are usually masked so that they look
interesting, for example a saxophone. Wav file that interests a
person collecting sound samples of instruments.
 According to an administrator of AOL, the Trojan steals
passwords and sends an E-mail to the hackers fake name and
then the hacker has your account in his hands.
worm
 A worm is a program which spreads usually over network
connections.
 Unlike a virus which attach itself to a host program, worms
always need a host program to spread.
 In practice, worms are not normally associated with one
person computer systems.
 They are mostly found in multi-user systems such as Unix
environments.
 A classic example of a worm is Robert Morrisis Internet-
worm 1988.
Other types of virus
 Bacteria, also known as rabbits, are programs that do not
directly damage the system.
 Instead they replicate themselves until they monopolize CPU,
memory or disk space. This constitutes a denial of service
attack.
 A bomb is actually a type of Trojan horse that can be
used to release a virus or bacteria.
 Bombs work by causing an unauthorized action at a
specified date, time or when a particular condition
occurs.
 There are two types of bombs; logic and time.
 Logic bombs are set to go off when a particular event
occurs. Time bombs go off at a specified time, date or
after a set amount of time elapses.
 Salamis cut away tiny pieces of data. They can be
particularly dangerous as the damage they do is small
and can be attributed to some truncation of the system.
 It is possible for a salami to do a great deal of damage
before it is found.
HOW VIRUSES ACTIVE?
 We are always afraid that viruses do something harmful to
files when they get active, but not all the viruses activate.
Some viruses just spread out, but when viruses activate they
do very different things.
 Might play a part of melody or play music in the background,
show a picture or animated picture, show text, format hard
disk or do changes to files.
 As an example, in one unnamed company: over a long
period of time, the files in a server were corrupted just a
bit.
 So backup copies were taken from the corrupted files. And
after they noticed that something was wrong, it was too
late to get back the data from the backups. That kind of
event is the worst that can happen for the uses.
CONCLUSION
 There are lots of viruses in the world and new viruses are coming up
every day. There are new anti-virus programs and techniques developed
too. It is good to be aware of viruses and other malware and it is cheaper
to protect you environment from them rather then being sorry.
 There might be a virus in your computer if it starts acting differently. There
is no reason to panic if the computer virus is found.
 It is good to be a little suspicious of malware when you surf in the Internet
and download files. Some files that look interesting might hide a malware.
 A computer virus is a program that reproduces itself and its mission is to
spread out. Most viruses are harmless and some viruses might cause
random damage to data files.
 A trojan horse is not a virus because it doesn't reproduce. The trojan
horses are usually masked so that they look interesting. There are trojan
horses that steal passwords and formats hard disks.
Thank You

More Related Content

What's hot

Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
RobC76
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
robsworld
 
Viruses
VirusesViruses
Viruses
Shahidaffridi
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
ainmz
 
Malware programs
Malware programsMalware programs
Malware programs
Prince Singh
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
vipinkumar940
 
Virus
VirusVirus
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100737728_ahmed
 
Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100701982
 
Information security
Information securityInformation security
Information security
JAMEEL AHMED KHOSO
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
Noushin Ahson
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
Sadaf Walliyani
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)
allisterm
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
T.J. Schiel
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
Phương Anh Pađi
 
Learning malware for fun and profit
Learning  malware for fun and profitLearning  malware for fun and profit
Learning malware for fun and profit
sr1nu
 

What's hot (20)

Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
 
Viruses
VirusesViruses
Viruses
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Malware programs
Malware programsMalware programs
Malware programs
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Virus
VirusVirus
Virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Information security
Information securityInformation security
Information security
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Learning malware for fun and profit
Learning  malware for fun and profitLearning  malware for fun and profit
Learning malware for fun and profit
 

Viewers also liked

Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Neeraj Bhandari
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
Arnab Singha
 
Computer virus
Computer virusComputer virus
Computer virus
Maxie Santos
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 

Viewers also liked (7)

Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 

Similar to Computervirus

Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Virus
VirusVirus
Virus
dddaou
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Aman Chaudhary
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
adni_shadah
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
KRT395
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
Dara Corporates
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Aakash Baloch
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
ainizbahari97
 

Similar to Computervirus (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus
VirusVirus
Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
 

Recently uploaded

clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 

Recently uploaded (20)

clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 

Computervirus

  • 2. WHAT IS VIRUS ?  Computer viruses are small software programs that are designed to spread from one computer to another and to interference in computer operation.  A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
  • 3.  Viruses are most easily spread by attachments in e-mail messages or instant messaging messages.  That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.  Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.
  • 4.  Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet.  They can be hidden in illicit software or other files or programs you might download.
  • 5. General information about computer virus  Different Malware Types.  Malware is a general name for all programs that are harmful; viruses, Trojan, worms and all other similar programs.  These classifications take into account the different ways in which the virus can infect different parts of a system.  The manner in which each of these types operates has one thing in common: any virus has to be executed in order to operate.
  • 6. Trojan  A Trojan Horse is a program that does something else that the user thought it would do. It is mostly done to someone on purpose.  The Trojan Horses are usually masked so that they look interesting, for example a saxophone. Wav file that interests a person collecting sound samples of instruments.  According to an administrator of AOL, the Trojan steals passwords and sends an E-mail to the hackers fake name and then the hacker has your account in his hands.
  • 7. worm  A worm is a program which spreads usually over network connections.  Unlike a virus which attach itself to a host program, worms always need a host program to spread.  In practice, worms are not normally associated with one person computer systems.  They are mostly found in multi-user systems such as Unix environments.  A classic example of a worm is Robert Morrisis Internet- worm 1988.
  • 8. Other types of virus  Bacteria, also known as rabbits, are programs that do not directly damage the system.  Instead they replicate themselves until they monopolize CPU, memory or disk space. This constitutes a denial of service attack.
  • 9.  A bomb is actually a type of Trojan horse that can be used to release a virus or bacteria.  Bombs work by causing an unauthorized action at a specified date, time or when a particular condition occurs.  There are two types of bombs; logic and time.  Logic bombs are set to go off when a particular event occurs. Time bombs go off at a specified time, date or after a set amount of time elapses.
  • 10.  Salamis cut away tiny pieces of data. They can be particularly dangerous as the damage they do is small and can be attributed to some truncation of the system.  It is possible for a salami to do a great deal of damage before it is found.
  • 11. HOW VIRUSES ACTIVE?  We are always afraid that viruses do something harmful to files when they get active, but not all the viruses activate. Some viruses just spread out, but when viruses activate they do very different things.  Might play a part of melody or play music in the background, show a picture or animated picture, show text, format hard disk or do changes to files.
  • 12.  As an example, in one unnamed company: over a long period of time, the files in a server were corrupted just a bit.  So backup copies were taken from the corrupted files. And after they noticed that something was wrong, it was too late to get back the data from the backups. That kind of event is the worst that can happen for the uses.
  • 13.
  • 14.
  • 15. CONCLUSION  There are lots of viruses in the world and new viruses are coming up every day. There are new anti-virus programs and techniques developed too. It is good to be aware of viruses and other malware and it is cheaper to protect you environment from them rather then being sorry.  There might be a virus in your computer if it starts acting differently. There is no reason to panic if the computer virus is found.  It is good to be a little suspicious of malware when you surf in the Internet and download files. Some files that look interesting might hide a malware.  A computer virus is a program that reproduces itself and its mission is to spread out. Most viruses are harmless and some viruses might cause random damage to data files.  A trojan horse is not a virus because it doesn't reproduce. The trojan horses are usually masked so that they look interesting. There are trojan horses that steal passwords and formats hard disks.