SlideShare a Scribd company logo
- BY ISHAAN GOWDA
RESIDENT VIRUS
■ A resident virus is a kind of
computer virus that hides
and stores itself within the
computer memory, which
then allows it to infect any
file that is run by the
computer, depending on the
virus' programming.
■ examples: Randex , CMJ
,Meve, and Mrlunky
DIRECT ACTION VIRUS
■ The virus goes into action
when a specific condition is
met.
■ infects the files in the folder
where the virus is located as
well as the directories
specified in the Autoexec.bat
file path.
■ example : Vienna virus
OVERWRITE VIRUS
■ An overwriting virus is a
malicious program which,
after infection, will effectively
destroy the original program
code, typically by overwriting
data in the system’s memory.
■ examples: Way, Trj.Reboot
6
BOOT SECTOR VIRUS
■ It infects the computer
storage sector where startup
files are found.
■ The boot sector contains all
the files required to start the
operating system (OS) and
other bootable programs.
■ The viruses run at bootup,
allowing them to execute
malicious code during
startup time -- before many
security layers are executed,
including antivirus software.
eg: Polyboot.B
MACRO VIRUS
■ A macro virus is a computer
virus that "infects" a Microsoft
Word or similar application
and causes a sequence of
actions to be performed
automatically when the
application is started or
something else triggers it.
■ Macro viruses tend to be
surprising but relatively
harmless.
■ example: Relax, Melissa. A,
Metys
DIRECTORY VIRUS
■ These viruses change the
path that indicates the
location of a file.
■ When you execute a .COM or
.EXE file infected by virus, you
accidently run the virus
program.
■ It is impossible to locate the
original files after it is
infected.
■ example: Dir-2 virus
7
POLYMORPHIC VIRUS
■ A polymorphic virus is a
complicated computer virus
that affects data types and
functions. It is a self-
encrypted virus designed to
avoid detection by a scanner
■ Upon infection, the
polymorphic virus duplicates
itself by creating usable,
albeit slightly modified,
copies of itself.
■ example : Taureg
FILE INFECTOR VIRUS
■ It is a type of malware that
infects executable files with
the intent to cause permanent
damage or make them
unusable
■ A file-infecting virus
overwrites code or inserts
infected code into a
executable file.
■ example: Cleevix and Cascade
COMPANION VIRUS
■ A companion virus is a
complicated computer virus
which, unlike traditional
viruses, does not modify any
files. Instead, it creates a copy
of the file and places a
different extension on it,
usually .com.
■ This unique quality makes a
companion virus difficult to
detect
■ example: Terrax.1069
8
FAT VIRUS LOGIC BOMBS
A FAT virus is a computer virus which attacks the
file allocation table (FAT), a system used in
Microsoft products and some other types of
computer systems to access the information
stored on a computer.
It is considered as a very dangerous virus .
Damage caused can result in information losses
from individual files or even entire directories.
They are not considered viruses because they
do not replicate.
A logic bomb is a piece of code inserted into
an operating system or software application
that implements a malicious function after a
certain amount of time, or specific conditions
are met.
9
TROJAN HORSE WORMS
■ A Trojan horse program is a file that appears
harmless unless it is executed.
■ A destructive program that pretends to be a
useful application, but harms your computer or
steals your information after it’s installed.
■ The name Trojan Horse has been derived from
the Greek mythology.
■ A computer worm is a self-replicating
computer program that penetrates an
operating system with the intent of
spreading malicious code.
■ Worms utilize networks to send copies of
the original code to other computers,
causing harm by consuming bandwidth or
possibly deleting files or sending documents
via email.
11
cx_Freeze: Python error in main script
cx_Freeze: Python error in main script
cx_Freeze: Python error in main sci
cxJFreeze: Python error in main script
cx_Freeze: Python error in main sc ript
InstallShield Wizard
cx_Freeze: Python error in main script
cx_Freeze: Python error in ma
cx_Freeze: Python error ii
cx_Freeze: Python error in main script
cx_Freeze: Python error iri main script
Setup has experienced an enoi.
Please do the followina:
InstallShield Wizard
rmmmmzm
InstallShield Wizard
Setup has experienced an error.
Please do the following:
• Close any tunning programs
• Empty your temporary folder
■ Check your Internet connection (Internet-based Setups)
InstallShield Wizard
Setup has experienced an error.
Please do the following:
- Close any running programs
- Empty your temporary folder
• Check your Internet connection (Internet-based Setups)
Then try to run the Setup again.
Error code: -6005
cx_Freeze: Python error in main script
cx_Freeze: Python error in main sci
Your computer has detected a virus of unknown origin and will now remo The file
name is:
Microsoft Windows XR The folder it is in is:
CJWINDOWSISystem32
Crasher has stopped working
Windowscancheckorlneforasolutiontotheproblem.Check online for
a solution and close the program
s'iconsole.py"
:older it's in from this computer.
' Close the program
CX Drf-hrti arror in ma
cx_Freeze: Python error i,
Do not delete* Delete Debug the program
cx Freeze: Python error in main script
cx_Freeze: Python error in main script
Keep Bloi
•w[ view problem details i riis is nor a virlJS!
thon error in main script
©
InstallShield Wizard
Traceback(most recent call last):
File ”c : usersprojcx_Free2e-3.0.3initscriptsconsole. py1", File
"src/FretsOnFlre.py", line 79, in ?
■..... 7..... 71S, in run
2<J
Setup has experienced an eiror.
showMessage
_runDialog
5, in run
Windows Firewall has blocked this program from accepting connections from the
Internet or a network. If you recognise the program or trust the publisher, you can
unblock it. When should I unblock, a program?
Ei
mupiuyiL
P.rpgram?
Please do the following:
- Close any running programs
- Empty your temporary folder
- Check your Internet connection (Internet-based Setups)
Then try to run the Setup again. cx_Freeze: Python error in main script
cx_Freeze: Python error in main script
Enor code: -6005 OK
cx_rieeze; Kyuiun ei iuf ill riidin sci ipt
rror in main script
ixilH
cx_Freeze: Python error in main scrip
cx_Freeze: Python error in main scri
CX Dvrthftn arrnr in main c/i
File "s File "s
SystemExit: 1
©
xj
Xj
Tracebads(most recent call last):
File "c: (usersprojcx_Freeze-3.0.3init scriptslconsole .py", File
"src/FretsOnFire.py", line 79, in ?
File "srcGameEngine.py", line 376, in run File "srciDialogs.py", line
1153, in showMessage File "srcDialogs.py", line 1043, injunDialog
File "srcGameEngine,py''j line 366, in run SystemExit: 1
on error in main script
Python error in main script
eze: Python error in main script
Freeze: Python error ! CCleaner-exe - Corrupt File
The file or directory
C: DOCUME~ 1 login. KHAPPLIC~ 1 MozillaFirefoxProfilesi2rkl sju. def aultsearchplugins is
corrupt and unreadable. Please run the Chkdsk utility.
_L cc
The file l._
C: DOCUME~ 1 login. KHAPPLIC~ 1 MozillaFirefoxProhlesi2rkl sju. default searchplugins f
ffl X
FileEdit
Computer lab pranks!! - Page 3 - Ubuntu Forums - Mozilla Firefox (Build 20090701203011}
Runesc
D Compi
Ski
LJ
>
3 O! rt
• Machine DevicesHelp
c C:WINDOWSsystem32Vcmd.exe
C:WINDOWSVsystem32Vcmd.exe
'' C:WINDOW5system32Vcmd.exe
| C:WINDOWSsystem32cmd . exe
| c C:WINPOWSsy5tem32cmd.exe
Book
sa
D 1 s tart © ^ Local Disk (C:) c:v 72 Windows Comm.
Tag;
© CP ^
Done
6 S3 RightCtrl
i*®pi L.
a n&E©F t’) Computer lab... $ [Sun /i rt u a IE3 o x ] 8^ Windows XP ^ © 0 %Q 04:25:51 PM
Clearly, a virus attack is not
something that you wish you
had.
How can you
protect your PC
against
viruses?
1
Basic Line Of Defense
Most Antivirus companies have come up with their
internet security suites over antivirus which is the
need right now. You must have one from reputed
providers in the industry such as Kaspersky, Eset,
Symantec etc. Remember "cheap" always isn’t good.
The product which claims to give you 100%
protection is misleading you.
Whether you use Windows/Mac or any Linux based
distribution you must have it updated with latest
security patches.
Have a firewall installed and updated.
Stop opening emails from unknown sources serving
you with attachments intended to not only Spam but
to make things like ransomware attacks happen.
18
2
Defense: level 2
■ Scan your computer for viruses, malware
everyday/weekly by scheduling it into your security
product.
■ Do not plug and play USB drives without scanning it
properly.
■ Stop downloading and going for the free tag over
the internet when it comes to softwares. Most of them
come with bundled adwares, popups, malwares, weird
browser extensions that will slow down your computer.
■ Look for "https://" tag when browsing a website.
These websites are encrypted and usually safe. But don’t
be mistaken. Sites which spread piracy and illicit content
use them too these days by faking https certificates.
■ Install Ublock Origin, Ghostery, Https Everywhere,
Privacy Badger extensions for Chrome/Firefox to block
most of the popups and malicious ads.
■ Always check the file extension of a file you’re about
to open after downloading from the internet. A .mp3 file
having a .exe extension means you’re on the wrong boat.
Recyde Bin
Warning!
Spyware detected on your computer!
Install an antivirus or spyware remover to clean your computer
T
;start *132:53 PM
LETS WATCH A VIDEO :
computerviruses-171008143158.ppt

More Related Content

Similar to computerviruses-171008143158.ppt

CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
kd123is123live
 
File inflection techniques
File inflection techniquesFile inflection techniques
File inflection techniques
Sandun Perera
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
Vijay Sarathy Rangayyan
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
TayyabaAbbas4
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
pauline234567
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
SridharChowdary10
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
Yash Diwakar
 
Computer virus
Computer virusComputer virus
Computer virus
Goa App
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
Rahul Dhaker
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
F-Secure Corporation
 

Similar to computerviruses-171008143158.ppt (20)

CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
 
File inflection techniques
File inflection techniquesFile inflection techniques
File inflection techniques
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 

Recently uploaded

Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdfBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
daothibichhang1
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
narasimhamurthyh4
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
Adani case
 
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Lviv Startup Club
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
daothibichhang1
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 

Recently uploaded (20)

Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdfBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
 
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 

computerviruses-171008143158.ppt

  • 1. - BY ISHAAN GOWDA
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. RESIDENT VIRUS ■ A resident virus is a kind of computer virus that hides and stores itself within the computer memory, which then allows it to infect any file that is run by the computer, depending on the virus' programming. ■ examples: Randex , CMJ ,Meve, and Mrlunky DIRECT ACTION VIRUS ■ The virus goes into action when a specific condition is met. ■ infects the files in the folder where the virus is located as well as the directories specified in the Autoexec.bat file path. ■ example : Vienna virus OVERWRITE VIRUS ■ An overwriting virus is a malicious program which, after infection, will effectively destroy the original program code, typically by overwriting data in the system’s memory. ■ examples: Way, Trj.Reboot 6
  • 7. BOOT SECTOR VIRUS ■ It infects the computer storage sector where startup files are found. ■ The boot sector contains all the files required to start the operating system (OS) and other bootable programs. ■ The viruses run at bootup, allowing them to execute malicious code during startup time -- before many security layers are executed, including antivirus software. eg: Polyboot.B MACRO VIRUS ■ A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. ■ Macro viruses tend to be surprising but relatively harmless. ■ example: Relax, Melissa. A, Metys DIRECTORY VIRUS ■ These viruses change the path that indicates the location of a file. ■ When you execute a .COM or .EXE file infected by virus, you accidently run the virus program. ■ It is impossible to locate the original files after it is infected. ■ example: Dir-2 virus 7
  • 8. POLYMORPHIC VIRUS ■ A polymorphic virus is a complicated computer virus that affects data types and functions. It is a self- encrypted virus designed to avoid detection by a scanner ■ Upon infection, the polymorphic virus duplicates itself by creating usable, albeit slightly modified, copies of itself. ■ example : Taureg FILE INFECTOR VIRUS ■ It is a type of malware that infects executable files with the intent to cause permanent damage or make them unusable ■ A file-infecting virus overwrites code or inserts infected code into a executable file. ■ example: Cleevix and Cascade COMPANION VIRUS ■ A companion virus is a complicated computer virus which, unlike traditional viruses, does not modify any files. Instead, it creates a copy of the file and places a different extension on it, usually .com. ■ This unique quality makes a companion virus difficult to detect ■ example: Terrax.1069 8
  • 9. FAT VIRUS LOGIC BOMBS A FAT virus is a computer virus which attacks the file allocation table (FAT), a system used in Microsoft products and some other types of computer systems to access the information stored on a computer. It is considered as a very dangerous virus . Damage caused can result in information losses from individual files or even entire directories. They are not considered viruses because they do not replicate. A logic bomb is a piece of code inserted into an operating system or software application that implements a malicious function after a certain amount of time, or specific conditions are met. 9
  • 10.
  • 11. TROJAN HORSE WORMS ■ A Trojan horse program is a file that appears harmless unless it is executed. ■ A destructive program that pretends to be a useful application, but harms your computer or steals your information after it’s installed. ■ The name Trojan Horse has been derived from the Greek mythology. ■ A computer worm is a self-replicating computer program that penetrates an operating system with the intent of spreading malicious code. ■ Worms utilize networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via email. 11
  • 12.
  • 13. cx_Freeze: Python error in main script cx_Freeze: Python error in main script cx_Freeze: Python error in main sci cxJFreeze: Python error in main script cx_Freeze: Python error in main sc ript InstallShield Wizard cx_Freeze: Python error in main script cx_Freeze: Python error in ma cx_Freeze: Python error ii cx_Freeze: Python error in main script cx_Freeze: Python error iri main script Setup has experienced an enoi. Please do the followina: InstallShield Wizard rmmmmzm InstallShield Wizard Setup has experienced an error. Please do the following: • Close any tunning programs • Empty your temporary folder ■ Check your Internet connection (Internet-based Setups) InstallShield Wizard Setup has experienced an error. Please do the following: - Close any running programs - Empty your temporary folder • Check your Internet connection (Internet-based Setups) Then try to run the Setup again. Error code: -6005 cx_Freeze: Python error in main script cx_Freeze: Python error in main sci Your computer has detected a virus of unknown origin and will now remo The file name is: Microsoft Windows XR The folder it is in is: CJWINDOWSISystem32 Crasher has stopped working Windowscancheckorlneforasolutiontotheproblem.Check online for a solution and close the program s'iconsole.py" :older it's in from this computer. ' Close the program CX Drf-hrti arror in ma cx_Freeze: Python error i, Do not delete* Delete Debug the program cx Freeze: Python error in main script cx_Freeze: Python error in main script Keep Bloi •w[ view problem details i riis is nor a virlJS! thon error in main script © InstallShield Wizard Traceback(most recent call last): File ”c : usersprojcx_Free2e-3.0.3initscriptsconsole. py1", File "src/FretsOnFlre.py", line 79, in ? ■..... 7..... 71S, in run 2<J Setup has experienced an eiror. showMessage _runDialog 5, in run Windows Firewall has blocked this program from accepting connections from the Internet or a network. If you recognise the program or trust the publisher, you can unblock it. When should I unblock, a program? Ei mupiuyiL P.rpgram? Please do the following: - Close any running programs - Empty your temporary folder - Check your Internet connection (Internet-based Setups) Then try to run the Setup again. cx_Freeze: Python error in main script cx_Freeze: Python error in main script Enor code: -6005 OK cx_rieeze; Kyuiun ei iuf ill riidin sci ipt rror in main script ixilH cx_Freeze: Python error in main scrip cx_Freeze: Python error in main scri CX Dvrthftn arrnr in main c/i File "s File "s SystemExit: 1 © xj Xj Tracebads(most recent call last): File "c: (usersprojcx_Freeze-3.0.3init scriptslconsole .py", File "src/FretsOnFire.py", line 79, in ? File "srcGameEngine.py", line 376, in run File "srciDialogs.py", line 1153, in showMessage File "srcDialogs.py", line 1043, injunDialog File "srcGameEngine,py''j line 366, in run SystemExit: 1 on error in main script Python error in main script eze: Python error in main script Freeze: Python error ! CCleaner-exe - Corrupt File The file or directory C: DOCUME~ 1 login. KHAPPLIC~ 1 MozillaFirefoxProfilesi2rkl sju. def aultsearchplugins is corrupt and unreadable. Please run the Chkdsk utility. _L cc The file l._ C: DOCUME~ 1 login. KHAPPLIC~ 1 MozillaFirefoxProhlesi2rkl sju. default searchplugins f
  • 14. ffl X FileEdit Computer lab pranks!! - Page 3 - Ubuntu Forums - Mozilla Firefox (Build 20090701203011} Runesc D Compi Ski LJ > 3 O! rt • Machine DevicesHelp c C:WINDOWSsystem32Vcmd.exe C:WINDOWSVsystem32Vcmd.exe '' C:WINDOW5system32Vcmd.exe | C:WINDOWSsystem32cmd . exe | c C:WINPOWSsy5tem32cmd.exe Book sa D 1 s tart © ^ Local Disk (C:) c:v 72 Windows Comm. Tag; © CP ^ Done 6 S3 RightCtrl i*®pi L. a n&E©F t’) Computer lab... $ [Sun /i rt u a IE3 o x ] 8^ Windows XP ^ © 0 %Q 04:25:51 PM
  • 15.
  • 16. Clearly, a virus attack is not something that you wish you had.
  • 17. How can you protect your PC against viruses?
  • 18. 1 Basic Line Of Defense Most Antivirus companies have come up with their internet security suites over antivirus which is the need right now. You must have one from reputed providers in the industry such as Kaspersky, Eset, Symantec etc. Remember "cheap" always isn’t good. The product which claims to give you 100% protection is misleading you. Whether you use Windows/Mac or any Linux based distribution you must have it updated with latest security patches. Have a firewall installed and updated. Stop opening emails from unknown sources serving you with attachments intended to not only Spam but to make things like ransomware attacks happen. 18
  • 19. 2 Defense: level 2 ■ Scan your computer for viruses, malware everyday/weekly by scheduling it into your security product. ■ Do not plug and play USB drives without scanning it properly. ■ Stop downloading and going for the free tag over the internet when it comes to softwares. Most of them come with bundled adwares, popups, malwares, weird browser extensions that will slow down your computer. ■ Look for "https://" tag when browsing a website. These websites are encrypted and usually safe. But don’t be mistaken. Sites which spread piracy and illicit content use them too these days by faking https certificates. ■ Install Ublock Origin, Ghostery, Https Everywhere, Privacy Badger extensions for Chrome/Firefox to block most of the popups and malicious ads. ■ Always check the file extension of a file you’re about to open after downloading from the internet. A .mp3 file having a .exe extension means you’re on the wrong boat. Recyde Bin Warning! Spyware detected on your computer! Install an antivirus or spyware remover to clean your computer T ;start *132:53 PM
  • 20.
  • 21. LETS WATCH A VIDEO :