SlideShare a Scribd company logo
1 of 11
Click to edit Master title style
1
BASIC SECURITY ISSUES:COMPUTER
VIRUSES,MALWARE,ETC.ANTI-VIRUS
SOFTWARE
Click to edit Master title style
2
PREPARED BY :
NAME :VATSAL BHATT
ROLL NO. : 71
ENROLLMENT NO. : 23002170110011
BATCH : D-3
BRANCH : C.E
NAME :ROCHAN SHAH
ROLL NO. : 67
ENROLLMENT NO. : 23002170110170
BATCH : D-3
BRANCH : C.E
NAME :DHRUV PATEL
ROLL NO. : 62
ENROLLMENT NO. : 23002170210079
BATCH : D-3
BRANCH : I.T
NAME :KRISH SANGHANI
ROLL NO. : 81
ENROLLMENT NO. : 23002170110162
BATCH : D-3
BRANCH : C.E
NAME :VIRAJ SHAH
ROLL NO. : 91
ENROLLMENT NO. : 23002170110172
BATCH : D-3
BRANCH : C.E
Click to edit Master title style
3
• I N T R O D U C T I O N
• W H AT A C O M P U T E R V I R U S D O ?
• T Y P E S O F C O M P U T E R V I R U S
• H O W D O C O M P U T E R V I R U S S P R E A D ?
• W H AT I S A N T I - V I R U S S O F T WA R E ?
• H O W A N A N T I - V I R U S S O F T WA R E W O R K S ?
• H O W T O P R O T E C T Y O U R S Y S T E M A G A I N S T V I R U S ?
Content
Click to edit Master title style
4
• What is Computer Virus ?
A c omputer virus is a type of malic ious
s oftw ar e , or malw ar e , that s pr eads betw een
c omputer s and c aus es damage to data and
s oftw ar e .
INTRODUCTION
Click to edit Master title style
5
• A vir us tr ies to tak e c ontr ol of c omputer s ys tem
at the fir s t oppor tunity available.
• Als o it mak es c opies of it s elf and tr y to c ar r y
harmful tas k written in its program.
• This pr oc es s c an happen s o quic k ly that the
us er is not even aw ar e of the pr es enc e of a
vir us in c omputer.
WHAT A COMPUTER VIRUS DO ?
Click to edit Master title style
6
1 . Boot s ec tor vir u s
2 . Web s c r ipting vir us
3 . Br ow s er hijac k er
4 . R es ident vir us
5. Direc t ac tion virus
6 . Polymor phic vir us
7 . File infec tor vir us
8 . Multipar tite vir us
9 . Mac r o vir us
TYPES OF COMPUTER VIRUS
Click to edit Master title style
7
• Computer virus es us ually s pread in one of three
w ays :
 Removable media.
 Downloads off the Internet;
 E-mail attachments.
HOW DO COMPUTER VIRUS SPREAD ?
Click to edit Master title style
8
• A n t i v i r u s s o f t wa r e i s a p r o g r a m t h a t a r e d e s i g n e d t o
p r e v e n t , s e a r c h f o r, d e t e c t , a n d r e m o v e s o f t wa r e
v i r u s e s . O n c e i n s t a l l e d , m o s t a n t i v i r u s s o f t wa r e r u n s
a u t o m a t i c a l l y i n t h e b a c k g r o u n d t o p r o v i d e r e a l - t i m e
p r o t e c t i o n a g a i n s t v i r u s a t t a c k s .
• E x a m p l e : N o r t o n , Q u i c k H e a l , AV G e t c .
WHAT IS ANTI-VIRUS SOFTWARE?
Click to edit Master title style
9
• T h e a n t i v i r u s s o f t wa r e e x a m i n e s e a c h a n d e v e r y f i l e
i n a c o m p u t e r a n d e x a m i n e s i t s c o n t e n t wi t h t h e
v i r u s d e f i n i t i o n s s t o r e d i n i t s v i r u s d i c t i o n a r y.
• A v i r u s d i c t i o n a r y i s a n i n b u i l t f i l e b e l o n g i n g t o a n
a n t i v i r u s s o f t wa r e t h a t c o n t a i n s c o d e i d e n t i f i e d a s a
v i r u s b y t h e a n t i v i r u s a u t h o r s .
HOW AN ANTI-VIRUS SOFTWARE
WORKS?
VIRUS
Found!
Click to edit Master title style
10
 I n s t a l l a g o o d a n t i v i r u s s o f t w a r e o n y o u r s y s t e m .
 U p d a t e y o u r a n t i v i r u s r e g u l a r l y.
 B e c a r e f u l w h i l e d o w n l o a d i n g f i l e s o r p r o g r a m s f r o m t h e
w e b .
 A l w a y s s c a n y o u r r e m o v a b l e d e v i c e s ( C D , P e n d r i v e e t c . ) .
 D o n o t u s e p i r a t e d o r c r a c k e d s o f t w a r e .
 A l w a y s t u r n o n f i r e w a l l o f y o u r o p e r a t i n g s y s t e m .
HOW TO PROTECT YOUR SYSTEM AGAINST
VIRUS ?
Click to edit Master title style
11

More Related Content

Similar to CWS-Basic Security threats,compter virus.pptx

Call Monitoring - 5 Best Practices
Call Monitoring - 5 Best PracticesCall Monitoring - 5 Best Practices
Call Monitoring - 5 Best PracticesAnjani Vigha
 
THE SCIENCE OF STORYTELLING - HOW TO GET ATTENTION & RESULT?
THE SCIENCE OF STORYTELLING - HOW TO GET ATTENTION & RESULT?THE SCIENCE OF STORYTELLING - HOW TO GET ATTENTION & RESULT?
THE SCIENCE OF STORYTELLING - HOW TO GET ATTENTION & RESULT?Sohil Solanki
 
The evolution of the internet
The evolution of the internetThe evolution of the internet
The evolution of the internetRachelQuince
 
Create Success With Analytics: A Guide to Designing Delightful Dashboards
Create Success With Analytics: A Guide to Designing Delightful DashboardsCreate Success With Analytics: A Guide to Designing Delightful Dashboards
Create Success With Analytics: A Guide to Designing Delightful DashboardsAggregage
 
Create Success With Analytics: A Guide to Designing Delightful Dashboards
Create Success With Analytics: A Guide to Designing Delightful Dashboards Create Success With Analytics: A Guide to Designing Delightful Dashboards
Create Success With Analytics: A Guide to Designing Delightful Dashboards Hannah Flynn
 
Cisa domain 2 part 1 governance and management of it
Cisa domain 2 part 1 governance and management of itCisa domain 2 part 1 governance and management of it
Cisa domain 2 part 1 governance and management of itShivamSharma909
 
Jm future of system verilog verification
Jm future of system verilog verificationJm future of system verilog verification
Jm future of system verilog verificationObsidian Software
 
Anatomy of a wikinews review
Anatomy of a wikinews reviewAnatomy of a wikinews review
Anatomy of a wikinews reviewLaura Hale
 
Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Wise Person
 
Warnable informational Overview
Warnable informational OverviewWarnable informational Overview
Warnable informational OverviewWarnable Solutions
 
Navigating the Employee Lifecycle: Create Your Own Remote Culture
Navigating the Employee Lifecycle: Create Your Own Remote CultureNavigating the Employee Lifecycle: Create Your Own Remote Culture
Navigating the Employee Lifecycle: Create Your Own Remote CultureAggregage
 
Compensation Analysis
Compensation AnalysisCompensation Analysis
Compensation Analysissansl3
 

Similar to CWS-Basic Security threats,compter virus.pptx (20)

Call Monitoring - 5 Best Practices
Call Monitoring - 5 Best PracticesCall Monitoring - 5 Best Practices
Call Monitoring - 5 Best Practices
 
ILFS Case study
ILFS Case studyILFS Case study
ILFS Case study
 
ENG4000 Documents
ENG4000 DocumentsENG4000 Documents
ENG4000 Documents
 
THE SCIENCE OF STORYTELLING - HOW TO GET ATTENTION & RESULT?
THE SCIENCE OF STORYTELLING - HOW TO GET ATTENTION & RESULT?THE SCIENCE OF STORYTELLING - HOW TO GET ATTENTION & RESULT?
THE SCIENCE OF STORYTELLING - HOW TO GET ATTENTION & RESULT?
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
The evolution of the internet
The evolution of the internetThe evolution of the internet
The evolution of the internet
 
Create Success With Analytics: A Guide to Designing Delightful Dashboards
Create Success With Analytics: A Guide to Designing Delightful DashboardsCreate Success With Analytics: A Guide to Designing Delightful Dashboards
Create Success With Analytics: A Guide to Designing Delightful Dashboards
 
Create Success With Analytics: A Guide to Designing Delightful Dashboards
Create Success With Analytics: A Guide to Designing Delightful Dashboards Create Success With Analytics: A Guide to Designing Delightful Dashboards
Create Success With Analytics: A Guide to Designing Delightful Dashboards
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
Cisa domain 2 part 1 governance and management of it
Cisa domain 2 part 1 governance and management of itCisa domain 2 part 1 governance and management of it
Cisa domain 2 part 1 governance and management of it
 
Jm future of system verilog verification
Jm future of system verilog verificationJm future of system verilog verification
Jm future of system verilog verification
 
Anatomy of a wikinews review
Anatomy of a wikinews reviewAnatomy of a wikinews review
Anatomy of a wikinews review
 
Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13
 
cofaso Presentation
cofaso Presentationcofaso Presentation
cofaso Presentation
 
DevOps introduction
DevOps introductionDevOps introduction
DevOps introduction
 
War robot.pptx
War robot.pptxWar robot.pptx
War robot.pptx
 
The Future of Content
The Future of ContentThe Future of Content
The Future of Content
 
Warnable informational Overview
Warnable informational OverviewWarnable informational Overview
Warnable informational Overview
 
Navigating the Employee Lifecycle: Create Your Own Remote Culture
Navigating the Employee Lifecycle: Create Your Own Remote CultureNavigating the Employee Lifecycle: Create Your Own Remote Culture
Navigating the Employee Lifecycle: Create Your Own Remote Culture
 
Compensation Analysis
Compensation AnalysisCompensation Analysis
Compensation Analysis
 

Recently uploaded

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

CWS-Basic Security threats,compter virus.pptx

  • 1. Click to edit Master title style 1 BASIC SECURITY ISSUES:COMPUTER VIRUSES,MALWARE,ETC.ANTI-VIRUS SOFTWARE
  • 2. Click to edit Master title style 2 PREPARED BY : NAME :VATSAL BHATT ROLL NO. : 71 ENROLLMENT NO. : 23002170110011 BATCH : D-3 BRANCH : C.E NAME :ROCHAN SHAH ROLL NO. : 67 ENROLLMENT NO. : 23002170110170 BATCH : D-3 BRANCH : C.E NAME :DHRUV PATEL ROLL NO. : 62 ENROLLMENT NO. : 23002170210079 BATCH : D-3 BRANCH : I.T NAME :KRISH SANGHANI ROLL NO. : 81 ENROLLMENT NO. : 23002170110162 BATCH : D-3 BRANCH : C.E NAME :VIRAJ SHAH ROLL NO. : 91 ENROLLMENT NO. : 23002170110172 BATCH : D-3 BRANCH : C.E
  • 3. Click to edit Master title style 3 • I N T R O D U C T I O N • W H AT A C O M P U T E R V I R U S D O ? • T Y P E S O F C O M P U T E R V I R U S • H O W D O C O M P U T E R V I R U S S P R E A D ? • W H AT I S A N T I - V I R U S S O F T WA R E ? • H O W A N A N T I - V I R U S S O F T WA R E W O R K S ? • H O W T O P R O T E C T Y O U R S Y S T E M A G A I N S T V I R U S ? Content
  • 4. Click to edit Master title style 4 • What is Computer Virus ? A c omputer virus is a type of malic ious s oftw ar e , or malw ar e , that s pr eads betw een c omputer s and c aus es damage to data and s oftw ar e . INTRODUCTION
  • 5. Click to edit Master title style 5 • A vir us tr ies to tak e c ontr ol of c omputer s ys tem at the fir s t oppor tunity available. • Als o it mak es c opies of it s elf and tr y to c ar r y harmful tas k written in its program. • This pr oc es s c an happen s o quic k ly that the us er is not even aw ar e of the pr es enc e of a vir us in c omputer. WHAT A COMPUTER VIRUS DO ?
  • 6. Click to edit Master title style 6 1 . Boot s ec tor vir u s 2 . Web s c r ipting vir us 3 . Br ow s er hijac k er 4 . R es ident vir us 5. Direc t ac tion virus 6 . Polymor phic vir us 7 . File infec tor vir us 8 . Multipar tite vir us 9 . Mac r o vir us TYPES OF COMPUTER VIRUS
  • 7. Click to edit Master title style 7 • Computer virus es us ually s pread in one of three w ays :  Removable media.  Downloads off the Internet;  E-mail attachments. HOW DO COMPUTER VIRUS SPREAD ?
  • 8. Click to edit Master title style 8 • A n t i v i r u s s o f t wa r e i s a p r o g r a m t h a t a r e d e s i g n e d t o p r e v e n t , s e a r c h f o r, d e t e c t , a n d r e m o v e s o f t wa r e v i r u s e s . O n c e i n s t a l l e d , m o s t a n t i v i r u s s o f t wa r e r u n s a u t o m a t i c a l l y i n t h e b a c k g r o u n d t o p r o v i d e r e a l - t i m e p r o t e c t i o n a g a i n s t v i r u s a t t a c k s . • E x a m p l e : N o r t o n , Q u i c k H e a l , AV G e t c . WHAT IS ANTI-VIRUS SOFTWARE?
  • 9. Click to edit Master title style 9 • T h e a n t i v i r u s s o f t wa r e e x a m i n e s e a c h a n d e v e r y f i l e i n a c o m p u t e r a n d e x a m i n e s i t s c o n t e n t wi t h t h e v i r u s d e f i n i t i o n s s t o r e d i n i t s v i r u s d i c t i o n a r y. • A v i r u s d i c t i o n a r y i s a n i n b u i l t f i l e b e l o n g i n g t o a n a n t i v i r u s s o f t wa r e t h a t c o n t a i n s c o d e i d e n t i f i e d a s a v i r u s b y t h e a n t i v i r u s a u t h o r s . HOW AN ANTI-VIRUS SOFTWARE WORKS? VIRUS Found!
  • 10. Click to edit Master title style 10  I n s t a l l a g o o d a n t i v i r u s s o f t w a r e o n y o u r s y s t e m .  U p d a t e y o u r a n t i v i r u s r e g u l a r l y.  B e c a r e f u l w h i l e d o w n l o a d i n g f i l e s o r p r o g r a m s f r o m t h e w e b .  A l w a y s s c a n y o u r r e m o v a b l e d e v i c e s ( C D , P e n d r i v e e t c . ) .  D o n o t u s e p i r a t e d o r c r a c k e d s o f t w a r e .  A l w a y s t u r n o n f i r e w a l l o f y o u r o p e r a t i n g s y s t e m . HOW TO PROTECT YOUR SYSTEM AGAINST VIRUS ?
  • 11. Click to edit Master title style 11