SlideShare a Scribd company logo
ITGS224
Information security
‫مركوس‬ ‫طارق‬ ‫نورهان‬
Nourhan Markus
I don’tknow what is that computer virus ?! I'll tell you ;)
It’s a program or codethat is written by Professional programmer
It’s loaded onto your computer without you know !
This viruses may also replicate themselves *_* and more en more that
They can spread by email or by inserting copies of itself into other programs
or documents .. Etc.
All of this was in general
There are types of computer viruses, including the :
o Boot sector infectors
o Executable infectors
o Multipartite viruses
o TSR viruses
o Stealth viruses
o Encrypted viruses
o Polymorphic viruses
o Macro viruses
Boot sector infectors
It’s a virus that Infects the first section of a hard drive or floppy disk and
inserts itself into the bootsectorof a disk. The first known virus of this type
was called Brain.
Exactly you should be know how is it works !
Let’s see ..
A bootsectorinfector virus places its starting codein the bootsector. When
the computer tries to read and execute the program in the bootsector, the virus
goes into memory where it can gain control over basic computer operations
From memory.
Logically by protectyour bootsector.
But how ? this is the question ..
Removing a bootsector virus can be difficult because it may encrypt the
bootsector that is why the Protection is very important here !
In many cases, users may not even be aware they have been infected with a
virus until they run an antivirus protection program or malware scan. As a
result, it is critical for users to rely on continually updated virus protection
programs that have a large registry of bootviruses and the data needed to
safely remove them. If the virus cannot be removed due to encryption or
excessive damage to existing code, the hard drive may need reformatting to
eliminate the infection
REFERENCES :
http://www.onlinesecurity-on.com/glossary/?c=10&id=11
http://usa.kaspersky.com/internet-security-center/definitions/boot-sector-virus

More Related Content

What's hot

Anti virus
Anti virusAnti virus
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
Khaleel Assadi
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)
allisterm
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
Somanath Kavalase
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
YouQue ™
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Gisha Mathyari
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
Sourav Verma
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
Arnab Singha
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
nikkinikhita
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Computer virus presenatation
Computer virus presenatationComputer virus presenatation
Computer virus presenatation
rarediamond_2012
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
sanmitha rao
 
Antivirus
AntivirusAntivirus
Antivirus
Meti Liona
 
Informative news about an anti virus progra1
Informative news about an anti virus progra1Informative news about an anti virus progra1
Informative news about an anti virus progra1
delta1call
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
Mohit Jaiswal
 

What's hot (20)

Anti virus
Anti virusAnti virus
Anti virus
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer virus presenatation
Computer virus presenatationComputer virus presenatation
Computer virus presenatation
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
 
Antivirus
AntivirusAntivirus
Antivirus
 
Informative news about an anti virus progra1
Informative news about an anti virus progra1Informative news about an anti virus progra1
Informative news about an anti virus progra1
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 

Viewers also liked

Linux Ubuntu Using Vmware
Linux Ubuntu Using VmwareLinux Ubuntu Using Vmware
Linux Ubuntu Using Vmware
Nourhan Markus
 
VMware Paravirtualization
VMware ParavirtualizationVMware Paravirtualization
VMware Paravirtualization
iTawy Community
 
Dspace الدليل العملي لتنصيب
Dspace الدليل العملي لتنصيبDspace الدليل العملي لتنصيب
Dspace الدليل العملي لتنصيب
الدكتور طلال ناظم الزهيري
 
Cloud computing الحوسبة السحابية
Cloud computing الحوسبة السحابية Cloud computing الحوسبة السحابية
Cloud computing الحوسبة السحابية
Sally Jarkas
 
مكونات الحاسب الآلي - أنظمة التشغيل
مكونات الحاسب الآلي - أنظمة التشغيلمكونات الحاسب الآلي - أنظمة التشغيل
مكونات الحاسب الآلي - أنظمة التشغيل
Samer Saner
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
sanjoysanyal
 
الاتصال
 الاتصال الاتصال
الاتصال
Lassad Dhiab
 
Virtualization
VirtualizationVirtualization

Viewers also liked (10)

Lru Algorithm
Lru AlgorithmLru Algorithm
Lru Algorithm
 
Linux Ubuntu Using Vmware
Linux Ubuntu Using VmwareLinux Ubuntu Using Vmware
Linux Ubuntu Using Vmware
 
VMware Paravirtualization
VMware ParavirtualizationVMware Paravirtualization
VMware Paravirtualization
 
1 2
1 21 2
1 2
 
Dspace الدليل العملي لتنصيب
Dspace الدليل العملي لتنصيبDspace الدليل العملي لتنصيب
Dspace الدليل العملي لتنصيب
 
Cloud computing الحوسبة السحابية
Cloud computing الحوسبة السحابية Cloud computing الحوسبة السحابية
Cloud computing الحوسبة السحابية
 
مكونات الحاسب الآلي - أنظمة التشغيل
مكونات الحاسب الآلي - أنظمة التشغيلمكونات الحاسب الآلي - أنظمة التشغيل
مكونات الحاسب الآلي - أنظمة التشغيل
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
 
الاتصال
 الاتصال الاتصال
الاتصال
 
Virtualization
VirtualizationVirtualization
Virtualization
 

Similar to computer virus

Virus
VirusVirus
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Computer virus
Computer virusComputer virus
Computer virus
nutantripathi
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
MDAZAD53
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
Nishant Reshwal
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
Shwana M
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
SridharChowdary10
 
Sowmya
SowmyaSowmya
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
UmairFirdous
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 

Similar to computer virus (20)

Virus
VirusVirus
Virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Presentation2
Presentation2Presentation2
Presentation2
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Internet security
Internet securityInternet security
Internet security
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Sowmya
SowmyaSowmya
Sowmya
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 

computer virus

  • 2. I don’tknow what is that computer virus ?! I'll tell you ;) It’s a program or codethat is written by Professional programmer It’s loaded onto your computer without you know ! This viruses may also replicate themselves *_* and more en more that They can spread by email or by inserting copies of itself into other programs or documents .. Etc. All of this was in general There are types of computer viruses, including the : o Boot sector infectors o Executable infectors o Multipartite viruses o TSR viruses o Stealth viruses o Encrypted viruses o Polymorphic viruses o Macro viruses
  • 3. Boot sector infectors It’s a virus that Infects the first section of a hard drive or floppy disk and inserts itself into the bootsectorof a disk. The first known virus of this type was called Brain. Exactly you should be know how is it works ! Let’s see .. A bootsectorinfector virus places its starting codein the bootsector. When the computer tries to read and execute the program in the bootsector, the virus goes into memory where it can gain control over basic computer operations From memory.
  • 4. Logically by protectyour bootsector. But how ? this is the question .. Removing a bootsector virus can be difficult because it may encrypt the bootsector that is why the Protection is very important here ! In many cases, users may not even be aware they have been infected with a virus until they run an antivirus protection program or malware scan. As a result, it is critical for users to rely on continually updated virus protection programs that have a large registry of bootviruses and the data needed to safely remove them. If the virus cannot be removed due to encryption or excessive damage to existing code, the hard drive may need reformatting to eliminate the infection