SlideShare a Scribd company logo
1 of 15
“VIRUS..”
SARMAD SOOMRO
2K12/IT/72
What Is Malware?
 Malware: ( stands for Malicious Software ), some times referred as ‘Pestware’.
 Malware is a software designed to harm or secretly access a computer system
without the owner's informed consent.
 Malware is a software program designed to harm, secretly access or get into a
computer system, without any user’s acknowledgement.
Types Of Malwares
 Virus
 Trojan Horse
 Spyware
 Adware
 Rootkits
 Crimeware
 Scareware
Lets Introduce The Common Ones...
VIRUS:
A computer virus is a small program written to alter the way a
computer operates, without the permission or knowledge of the user.
Have the ability to replicate itself, thus continuing to spread.
Also, known as Malicious Software, a program that can cause damage to a computer.
The computer viruses can damage or corrupt data, modify existing data, or degrade the
performance of the system by utilizing resources such as memory or disk space.
It may spread over a network (internet), carried
through removable medium such as a Floppy
disk, CD/DVD Drive, USB Drive.
The main two characteristics of a
VIRUS are:
 It can replicate itself.
 It has the ability to spread itself to other files as well to other computers.
Classification of Computer viruses:
•Boot sector virus
•Master Boot Record (MBR) virus
•File infector virus
•Multipartite virus
•Macro virus
BOOT SECTOR VIRUS:
Boot sector viruses generally hide in the boot sector, either in the
bootable disk or the hard drive.
Infects the boot sector of computers. During system boot, boot
sector virus is loaded into main memory and destroys data into
hard drive.
MASTER BOOT RECORD VIRUS:
MBR viruses are memory-resident viruses that infect disks in the same
manner as boot sector viruses. However it, infects the MBR of the system,
gets activated when the BIOS activates the Master boot code.
MBR infectors normally save a legitimate copy of the master boot record in
an different location.
File Infector Virus:
File Infector viruses infect program files.
Normally infect executable code, such as .COM, .SYS, .BAT and .EXE files.
They can infect other files when an infected program is run from floppy, hard drive, or from
the network.
Many of these viruses are memory resident. After memory becomes infected, any
uninfected executable file that runs becomes infected.
E.g. Snow.A, Jerusalem, Cascade
Macro Virus:
Macro are mini-programs which make it possible to automate series of operations so that
they are performed as a single action, thereby saving the user from having to carry them out
one by one.
Macro viruses infect files that are created using certain applications or programs that
contain macros.
They are platform-independent since the virus itself are written in language of the
application and not the operating system.
They infect documents created from Microsoft Office Word, Excel, PowerPoint and Access
files.
E.g.W97M.Melissa, Bablas, WM.NiceDay, W97M.Groov
Advantages of VIRUS
 A virus is able to take control of a person's computer.
Warning,, its illegal..!!
 But can be used in order to get full record of doubted person’s activity.
 Computer viruses are also considered an important part of technological warfare. For
example, Iran has accused several countries of targeting (and successfully shutting
down) their illegal nuclear facilities, using computer viruses.
 Through computer virus we can inject a virus into a computer that is trying to affect our
system.
 Viruses can be written to take advantage of a particular program or operating system's
features so as to make it more likely that they will
be inadvertently run.
 Viruses can handle Multiple Instructions.
 They can broadcast itself.
Dis-advantages of VIRUS
 May damage hard ware - Usually Bios, hard disk etc.
 Loss of Software Functionality.
 Some the applications won't start (ex: I hate Mozilla virus won't let you
start the Mozilla)
 Your computer gets slowed down.
 Replicates itself without any permission.
 No guarantee of your Privacy, can be easily accessed, modified by
anyone, anytime and anywhere.
Top 10 Most-Destructive Computer Virsues..
 Created by underground crime syndicates and government agencies,
these powerful viruses have done serious damage to computer networks
worldwide
1) Stuxnet (2009-2010)
2) Conficker Virus (2009)
3) Agent.btz (2008)
4) Zeus (2007)
5) PoisonIvy (2005)
6) MyDoom (2004)
7) Fizzer (2003)
8) Slammer (2003)
9) Code Red (2001)
10) Love Letter/I LOVE YOU (2000)
 References…
https://sites.google.com/site/drzeeshanacademy/system-administration
http://technology.blurtit.com/784117/what-are-the-advantages-of-computer-viruses
https://answers.yahoo.com/question/index?qid=20081210042930AAWFf52
http://www.smithsonianmag.com/science-nature/top-ten-most-destructive-computer-
viruses-159542266/#0yHrMQjH3vJOqwuv.99
What is Malware? Types and Viruses Explained

More Related Content

What's hot

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemLee Ray
 
Harmful software
Harmful softwareHarmful software
Harmful softwareBijoKG2
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-VirusesAyman Hussein
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewallsJay Shah
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horsejyoti_lakhani
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Abdulkarim Zakaria
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 

What's hot (20)

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
Presentación1
Presentación1Presentación1
Presentación1
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 

Similar to What is Malware? Types and Viruses Explained

Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & MalwareT.J. Schiel
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxMubashiraP5
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwaresonajidongre
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 

Similar to What is Malware? Types and Viruses Explained (20)

Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virus
VirusVirus
Virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 

Recently uploaded

Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 

Recently uploaded (20)

Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 

What is Malware? Types and Viruses Explained

  • 2. What Is Malware?  Malware: ( stands for Malicious Software ), some times referred as ‘Pestware’.  Malware is a software designed to harm or secretly access a computer system without the owner's informed consent.  Malware is a software program designed to harm, secretly access or get into a computer system, without any user’s acknowledgement.
  • 3. Types Of Malwares  Virus  Trojan Horse  Spyware  Adware  Rootkits  Crimeware  Scareware
  • 4. Lets Introduce The Common Ones... VIRUS: A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. Have the ability to replicate itself, thus continuing to spread. Also, known as Malicious Software, a program that can cause damage to a computer. The computer viruses can damage or corrupt data, modify existing data, or degrade the performance of the system by utilizing resources such as memory or disk space.
  • 5. It may spread over a network (internet), carried through removable medium such as a Floppy disk, CD/DVD Drive, USB Drive. The main two characteristics of a VIRUS are:  It can replicate itself.  It has the ability to spread itself to other files as well to other computers.
  • 6. Classification of Computer viruses: •Boot sector virus •Master Boot Record (MBR) virus •File infector virus •Multipartite virus •Macro virus
  • 7. BOOT SECTOR VIRUS: Boot sector viruses generally hide in the boot sector, either in the bootable disk or the hard drive. Infects the boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data into hard drive.
  • 8. MASTER BOOT RECORD VIRUS: MBR viruses are memory-resident viruses that infect disks in the same manner as boot sector viruses. However it, infects the MBR of the system, gets activated when the BIOS activates the Master boot code. MBR infectors normally save a legitimate copy of the master boot record in an different location.
  • 9. File Infector Virus: File Infector viruses infect program files. Normally infect executable code, such as .COM, .SYS, .BAT and .EXE files. They can infect other files when an infected program is run from floppy, hard drive, or from the network. Many of these viruses are memory resident. After memory becomes infected, any uninfected executable file that runs becomes infected. E.g. Snow.A, Jerusalem, Cascade
  • 10. Macro Virus: Macro are mini-programs which make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one. Macro viruses infect files that are created using certain applications or programs that contain macros. They are platform-independent since the virus itself are written in language of the application and not the operating system. They infect documents created from Microsoft Office Word, Excel, PowerPoint and Access files. E.g.W97M.Melissa, Bablas, WM.NiceDay, W97M.Groov
  • 11. Advantages of VIRUS  A virus is able to take control of a person's computer. Warning,, its illegal..!!  But can be used in order to get full record of doubted person’s activity.  Computer viruses are also considered an important part of technological warfare. For example, Iran has accused several countries of targeting (and successfully shutting down) their illegal nuclear facilities, using computer viruses.  Through computer virus we can inject a virus into a computer that is trying to affect our system.  Viruses can be written to take advantage of a particular program or operating system's features so as to make it more likely that they will be inadvertently run.  Viruses can handle Multiple Instructions.  They can broadcast itself.
  • 12. Dis-advantages of VIRUS  May damage hard ware - Usually Bios, hard disk etc.  Loss of Software Functionality.  Some the applications won't start (ex: I hate Mozilla virus won't let you start the Mozilla)  Your computer gets slowed down.  Replicates itself without any permission.  No guarantee of your Privacy, can be easily accessed, modified by anyone, anytime and anywhere.
  • 13. Top 10 Most-Destructive Computer Virsues..  Created by underground crime syndicates and government agencies, these powerful viruses have done serious damage to computer networks worldwide 1) Stuxnet (2009-2010) 2) Conficker Virus (2009) 3) Agent.btz (2008) 4) Zeus (2007) 5) PoisonIvy (2005) 6) MyDoom (2004) 7) Fizzer (2003) 8) Slammer (2003) 9) Code Red (2001) 10) Love Letter/I LOVE YOU (2000)