SlideShare a Scribd company logo
COMPUTER VIRUS AND ANTI VIRUS
ABOUT MYSELF
NAME: BOITUMELO MOKEMANE
bmokemane4@gmail.com
LESOTHO COLLEGE OF EDUCATION THABA-TSEKA
CAMPUS
HISTORY OF VIRUS
Viruses have evolved over the years. First computer
virus was called ‘CREEPER’, this program has been
designed not to damage the computer, but only to
display a message. It was invented in the early
1971 by Bob Thomas. Since then, millions of
viruses have been invented.
WHAT IS COMPUTER VIRUS?
Computer virus is a small software or code that can cause
damage to data and software on a computer.
Virus is a malicious program that is able to attach itself to
executable program that is able to spread from one
computer to another and cause damage and destruction.
WHAT A COMPUTER VIRUS
DO.
 Virus makes copies of itself and try to carry harmful task
written in its program.
A virus tries to take control of computer system at the
opportunity available.
This process can happen so quickly that the user is not
aware of the presence of a virus in computer.
WHY DO PEOPLE CREATE
COMPUTER VIRUSES?
SOME PROGRAMMERS CAN MAKE A VIRUS TO:
1. To take control of a computer and use it for specific tasks.
2. To steal sensitive information like credit card numbers,
passwords, personal detail and data.
3. To steal money.
4. To prove ones skill or for revenge purposes.
5. To disable a computer or network.
HOW DO VIRUSES SPREAD?
COMPUTER VIRUSES CAN SPREAD IN THREE WAY
1. From removable media.
2. From downloads off the internet.
3. From e-mail attachments.1
SIGNS OF VIRUS INFECTION
Unexpected pop-up windows.
Slow start up and slow performance.
Crashes and error messages.
Security attacks.
TYPES OF COMPUTER VIRUSES
THERE ARE MANY TYPES OF COMPUTER VIRUS, BUT I WILL
ONLY DISCUSS THREE:
Spyware is a type of malware installed on computer to
collect information about users without their knowledge.
Worm is a self-replicating virus that does not alter files
but resides in the active memory and duplicates itself.
Ransomware locks down the computer and threaten ton
erase everything unless a ransom is paid to its owner.
ANTI-VIRUS
Antivirus software is a computer program that identify
and remove computer viruses, and other malicious
software like worms and Trojans from an infected
computer.
Also an antivirus software protects the computer from
further virus attacks.
HOW AN ANTI-VIRUS WORKS?
The antivirus software examines each and every file in a
computer and examines its content with the virus
definitions stored in its virus dictionary.
A virus dictionary is an inbuilt file belonging to an
antivirus software that contains code identified as a virus
by the antivirus authors.
HOW TO PROTECT SYSTEM
AGAINST VIRUS?
Install a good anti-virus software on the computer.
Update anti-virus regularly.
Be careful while downloading files or programs from the
internet.
Always scan floppies, CDs, flash drives before using
them.
Do not use pirated software.
Turn on firewall of computer operating system.
CONCLUSION
It is important to scan files and media from an outside
source before opening them and use of antivirus software
that is up to date to protect data and computer devices.
LIST OF REFERENCES
https://www.Microsoft.com/security/pc-security/virus-
whatis.aspx
http://www.allbusiness.com/how-do-comtuter-viruses-
spread-1329-1.html
https://www.youtube.com/watch?v=pMBoq-IL3us
https://www.technibble.com/why-do-people-create-
computer-viruses/
https://en.Wikipedia.org/wiki/Computer_virus

More Related Content

Similar to Computer_Virus_and_Anti_virus.pptx

COMPUTER VIRUS.pptx
COMPUTER  VIRUS.pptxCOMPUTER  VIRUS.pptx
COMPUTER VIRUS.pptx
DiveshRajpoot
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
sonajidongre
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
Faisal Hassan
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
Utkarsh Srivastava
 
Computer virus
Computer virusComputer virus
Computer virus
Utchi
 
Computer Virus
Computer VirusComputer Virus
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 

Similar to Computer_Virus_and_Anti_virus.pptx (20)

COMPUTER VIRUS.pptx
COMPUTER  VIRUS.pptxCOMPUTER  VIRUS.pptx
COMPUTER VIRUS.pptx
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Virus
VirusVirus
Virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus project
Virus projectVirus project
Virus project
 
virus
virusvirus
virus
 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 

Computer_Virus_and_Anti_virus.pptx

  • 1. COMPUTER VIRUS AND ANTI VIRUS
  • 2. ABOUT MYSELF NAME: BOITUMELO MOKEMANE bmokemane4@gmail.com LESOTHO COLLEGE OF EDUCATION THABA-TSEKA CAMPUS
  • 3. HISTORY OF VIRUS Viruses have evolved over the years. First computer virus was called ‘CREEPER’, this program has been designed not to damage the computer, but only to display a message. It was invented in the early 1971 by Bob Thomas. Since then, millions of viruses have been invented.
  • 4. WHAT IS COMPUTER VIRUS? Computer virus is a small software or code that can cause damage to data and software on a computer. Virus is a malicious program that is able to attach itself to executable program that is able to spread from one computer to another and cause damage and destruction.
  • 5. WHAT A COMPUTER VIRUS DO.  Virus makes copies of itself and try to carry harmful task written in its program. A virus tries to take control of computer system at the opportunity available. This process can happen so quickly that the user is not aware of the presence of a virus in computer.
  • 6. WHY DO PEOPLE CREATE COMPUTER VIRUSES? SOME PROGRAMMERS CAN MAKE A VIRUS TO: 1. To take control of a computer and use it for specific tasks. 2. To steal sensitive information like credit card numbers, passwords, personal detail and data. 3. To steal money. 4. To prove ones skill or for revenge purposes. 5. To disable a computer or network.
  • 7. HOW DO VIRUSES SPREAD? COMPUTER VIRUSES CAN SPREAD IN THREE WAY 1. From removable media. 2. From downloads off the internet. 3. From e-mail attachments.1
  • 8. SIGNS OF VIRUS INFECTION Unexpected pop-up windows. Slow start up and slow performance. Crashes and error messages. Security attacks.
  • 9. TYPES OF COMPUTER VIRUSES THERE ARE MANY TYPES OF COMPUTER VIRUS, BUT I WILL ONLY DISCUSS THREE: Spyware is a type of malware installed on computer to collect information about users without their knowledge. Worm is a self-replicating virus that does not alter files but resides in the active memory and duplicates itself. Ransomware locks down the computer and threaten ton erase everything unless a ransom is paid to its owner.
  • 10. ANTI-VIRUS Antivirus software is a computer program that identify and remove computer viruses, and other malicious software like worms and Trojans from an infected computer. Also an antivirus software protects the computer from further virus attacks.
  • 11. HOW AN ANTI-VIRUS WORKS? The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary. A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.
  • 12. HOW TO PROTECT SYSTEM AGAINST VIRUS? Install a good anti-virus software on the computer. Update anti-virus regularly. Be careful while downloading files or programs from the internet. Always scan floppies, CDs, flash drives before using them. Do not use pirated software. Turn on firewall of computer operating system.
  • 13. CONCLUSION It is important to scan files and media from an outside source before opening them and use of antivirus software that is up to date to protect data and computer devices.