SlideShare a Scribd company logo
HEKMAT ASEFI – DMC COLLEGE, GOA
university (India)
1
IT viruses
Table of Content
 What is Malware?
 Kinds of Malware
 Viruses and worms
 Trojans and Rootkits
 Spyware and keyloggers
 Disadvantage of Malware
 How do you get rid of malware?
 Ways to stay save from malware?
 How do you prevent malware?
 10 signs that your computer is infected with viruses,
Malware, or Trojans.
2
What is Malware?
The term malware is defined by malicious intent.
malware designed to damage or gain authorized
access to a private computer system.
This malicious software ( malware) created by
hackers to damage computer operations , gather
sensitive information.
3
Different types of malware
The term malware includes computer viruses .
There are many types and each one can damage
or computer like…
 worms, Trojan horses, rootkits, spyware,
adware Keyloggers and more. To get an
overview of the difference between all these
types of threats and the way they work, it makes
sense to divide them into groups.
4
Viruses and worms- The contagious
threat
 Viruses and worms are defined by their behavior –
malicious software designed to spread without the user’s
knowledge. A virus infects legitimate software and when
this software is used by the computer owner it spreads the
virus – so viruses need you to act before they can spread.
Computer worms, on the other hand, spread without user
action. Both viruses and worms can carry as so called
“payload” Malicious code designed to do damage.
5
Trojans and rootkits – The masked threat
 Trojans and rootkits are grouped together as they both seek to
conceal attacks on computers. Trojan Horses are malignant pieces of
software pretending to be benign applications. Users therefore
download them thinking they will get a useful piece of software and
instead end up with a malware infected computer. Rootkits are
different. They are a masking technique for malware, but do not
contain damaging software. Rootkit techniques were invented by
virus writers to conceal malware, so it could go unnoticed by
antivirus detection and removal programs. Today, antivirus products,
like Bull Guard Internet Security, strike back as they come with
effective rootkit removal tools.
6
Spyware and keyloggers - the financial
threat Spyware is software that spies on you, tracking your internet activities in
order to send advertising (Adware) back to your system.
 Records everything you type on your PC in order to glean your log- in
names, passwords, and other sensitive information, and send it on the
sours of the keylogging program. Many times keyloggers are used by
corporations and parents to acquire computer usage information.
7
Disadvantage of Malware
 Some of the disadvantages are:
 You can get viruses on your computer/laptop and this can cause many
problems
 Your computer /laptop can get slow
 Some of your application wont start
 You can get viruses on your computer and cause many Problems which can
damage your computer and can break your computer completely. usually,
malware displays pop- up ads on your desktop or steal your information.
Some of the nastier ones can even crash your computer and delete your
files also can make your computer slow on starting up applications such as
the internet. However, sometimes your application will not start as there
might be so much viruses on your computer they are stopping you to open
an application.
8
How do you get rid of malware?
 The best way to get rid of malware is to prevent it from getting
into your computer. That is why it is very important to have
security software such as antivirus, antispyware and firewall
software. With these three, you can be assured that malware will
not make it into your computer, or at least, such threats are
minimized. As long as the right software is used and you make
sure it can connect to the internet to receive updates, you don’t
have to worry much about malware. However, if your computer
is already infected with malware, depending on the
circumstance, you may need to reinstall your OS, reformat your
hard drive, or simply clean your computer using anti-spyware or
antivirus software if you still don’t have.
9
How can you prevent malware?
 Use Firefox instead of IE. Firefox is immune to much of the
most common malware tricks. With the addition of adblock
and no script its virtually impenetrable.
 Download spybot search and destroy (linked below). It can
immunize you from many different attack vectors, for added
security you use its teatimer app to protect your registry,
although it can be annoying.
10
10 Signs that your computer is
infected with Viruses, Malware, or
Trojans 1. My computer speaks to me.
2. My computer is running extremely slowly.
3. Application won’t start.
4. I cannot connect to the internet or it runs very slowly.
5. When I connect to the internet, all types of window open or the
browser displays pages I have not requested.
6. Where have my files gone?
7. Oh.. My antivirus has disappeared, my firewall is disabled
8. My computer is speaking a strange language.
9. Library files for running games, programs, etc. have disappeared from
my Computer.
11
10. My computer has gone mad …. Literally. 12
THANK YOU
13

More Related Content

What's hot

Spyware Adware
Spyware AdwareSpyware Adware
Malware
MalwareMalware
Malware
Tuhin_Das
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Adware
AdwareAdware
Adware
Avani Patel
 
spyware
spyware spyware
spyware
maaza mohammed
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
rubal_9
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
Raja Kiran
 
Jeopardy
JeopardyJeopardy
Jeopardy
zed_o07
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
sahibe alam
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
amiable_indian
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentationamy.covington215944
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
Vikas Patel
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
OPSWAT
 

What's hot (20)

Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware
SpywareSpyware
Spyware
 
Malware
MalwareMalware
Malware
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Adware
AdwareAdware
Adware
 
spyware
spyware spyware
spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Spyware
SpywareSpyware
Spyware
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
What is malware
What is malwareWhat is malware
What is malware
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 

Similar to IT viruses

SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
Muhammad FAHAD
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
Teodoro Cipresso
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
ollyabraham
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
anthnyq
 
The critical issues you face when not using antivirus software
The critical issues you face when not using antivirus softwareThe critical issues you face when not using antivirus software
The critical issues you face when not using antivirus software
Antivirus Support
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Virus
VirusVirus
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
Acageron
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
Ammar Hasayen
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
Kanha Sahu
 

Similar to IT viruses (20)

SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
The critical issues you face when not using antivirus software
The critical issues you face when not using antivirus softwareThe critical issues you face when not using antivirus software
The critical issues you face when not using antivirus software
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Virus project
Virus projectVirus project
Virus project
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
virus
virusvirus
virus
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Virus
VirusVirus
Virus
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 

Recently uploaded

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

IT viruses

  • 1. HEKMAT ASEFI – DMC COLLEGE, GOA university (India) 1 IT viruses
  • 2. Table of Content  What is Malware?  Kinds of Malware  Viruses and worms  Trojans and Rootkits  Spyware and keyloggers  Disadvantage of Malware  How do you get rid of malware?  Ways to stay save from malware?  How do you prevent malware?  10 signs that your computer is infected with viruses, Malware, or Trojans. 2
  • 3. What is Malware? The term malware is defined by malicious intent. malware designed to damage or gain authorized access to a private computer system. This malicious software ( malware) created by hackers to damage computer operations , gather sensitive information. 3
  • 4. Different types of malware The term malware includes computer viruses . There are many types and each one can damage or computer like…  worms, Trojan horses, rootkits, spyware, adware Keyloggers and more. To get an overview of the difference between all these types of threats and the way they work, it makes sense to divide them into groups. 4
  • 5. Viruses and worms- The contagious threat  Viruses and worms are defined by their behavior – malicious software designed to spread without the user’s knowledge. A virus infects legitimate software and when this software is used by the computer owner it spreads the virus – so viruses need you to act before they can spread. Computer worms, on the other hand, spread without user action. Both viruses and worms can carry as so called “payload” Malicious code designed to do damage. 5
  • 6. Trojans and rootkits – The masked threat  Trojans and rootkits are grouped together as they both seek to conceal attacks on computers. Trojan Horses are malignant pieces of software pretending to be benign applications. Users therefore download them thinking they will get a useful piece of software and instead end up with a malware infected computer. Rootkits are different. They are a masking technique for malware, but do not contain damaging software. Rootkit techniques were invented by virus writers to conceal malware, so it could go unnoticed by antivirus detection and removal programs. Today, antivirus products, like Bull Guard Internet Security, strike back as they come with effective rootkit removal tools. 6
  • 7. Spyware and keyloggers - the financial threat Spyware is software that spies on you, tracking your internet activities in order to send advertising (Adware) back to your system.  Records everything you type on your PC in order to glean your log- in names, passwords, and other sensitive information, and send it on the sours of the keylogging program. Many times keyloggers are used by corporations and parents to acquire computer usage information. 7
  • 8. Disadvantage of Malware  Some of the disadvantages are:  You can get viruses on your computer/laptop and this can cause many problems  Your computer /laptop can get slow  Some of your application wont start  You can get viruses on your computer and cause many Problems which can damage your computer and can break your computer completely. usually, malware displays pop- up ads on your desktop or steal your information. Some of the nastier ones can even crash your computer and delete your files also can make your computer slow on starting up applications such as the internet. However, sometimes your application will not start as there might be so much viruses on your computer they are stopping you to open an application. 8
  • 9. How do you get rid of malware?  The best way to get rid of malware is to prevent it from getting into your computer. That is why it is very important to have security software such as antivirus, antispyware and firewall software. With these three, you can be assured that malware will not make it into your computer, or at least, such threats are minimized. As long as the right software is used and you make sure it can connect to the internet to receive updates, you don’t have to worry much about malware. However, if your computer is already infected with malware, depending on the circumstance, you may need to reinstall your OS, reformat your hard drive, or simply clean your computer using anti-spyware or antivirus software if you still don’t have. 9
  • 10. How can you prevent malware?  Use Firefox instead of IE. Firefox is immune to much of the most common malware tricks. With the addition of adblock and no script its virtually impenetrable.  Download spybot search and destroy (linked below). It can immunize you from many different attack vectors, for added security you use its teatimer app to protect your registry, although it can be annoying. 10
  • 11. 10 Signs that your computer is infected with Viruses, Malware, or Trojans 1. My computer speaks to me. 2. My computer is running extremely slowly. 3. Application won’t start. 4. I cannot connect to the internet or it runs very slowly. 5. When I connect to the internet, all types of window open or the browser displays pages I have not requested. 6. Where have my files gone? 7. Oh.. My antivirus has disappeared, my firewall is disabled 8. My computer is speaking a strange language. 9. Library files for running games, programs, etc. have disappeared from my Computer. 11
  • 12. 10. My computer has gone mad …. Literally. 12