Q & A
Why Unnecessary Advertise open when using Internet ?
Malware
Malware Mean malicious software
Malware is any software used to disrupt computer operations, gather
sensitive information, display unwanted advertising.
Malware Coming Sources
• Internet
• via pirated website
• Pirated software
• when you are downloading Pirated Movie, Pirate Game.
• When You are click advertise on malicious website.
• Via E-Mail etc…
Malware Coming Sources
When Offline use
• Cd - DVD
• Pen drive
Three Type Of Malware
1. Virus
2. Trojan
3. Worm
All malware are work differently.
What Virus ?
Infecting computer programs can include as well, data files, or the boot sector
of the hard drive.
Ex. Microsoft Word Document corrupt
If are you share corrupted document any person then to establish virus our
friends computer
What Virus ?
What Virus ?
The first computer virus
The Creeper virus was first detected on ARPANET,
the forerunner of the Internet, in the early 1970s
The first computer virus
The first computer viruses
The first computer viruses
• Brain is the industry standard name for a computer virus that was released in its
first form in January 1986
• The first computer virus for MS-DOS.
• It infects the boot sector of storage media formatted with the DOS File Allocation
Table (FAT) file system.
• Brain was written by two brothers, Basit Farooq Alvi and Amjad Farooq Alvi, from
Lahore, Punjab, Pakistan.
What Trojan?
Trojan is any malicious computer program
which is used to hack into a computer by misleading
users of its true intent.
For Example : Speed Booster, Memory increase Speed, etc…
ट्रोजन किसी भी दुभभावनभपूर्ा िं प्यूटर प्रोग्रभम है जो अपने असली इरभदे उपयोगिर्भाओं िे िो
गुमरभह िरिे एि िं प्यूटर में हैि िरने िे ललए इस्र्ेमभल कियभ जभर्भ है।
Change face after coming your System
What Worm?
A computer worm is a standalone malware computer program that replicates
itself in order to spread to other computers.
For Example: Duplicate Copying in no’s of file
How to Protect with malware
• Visit Trusted website
• Don’t Click misguided Advertise
• E-Mail (Spam)
• Install Anti Virus Or Anti Malware Software (License)
• Don’t Install unknown Source via Pendrive
Firewall
What Is Firewall ?
Protect (a network or system) from unauthorized access with a firewall.
Types Of Firewall
1. Hardware base Firewall
2. Software based firewall
Hardware base Firewall
Hardware base Firewall
Software base Firewall
MacAfee
Norton
Etc…
In Windows Inbuilt Firewall system
Beast is a Windows-based backdoor Trojan horse, more commonly known in the hacking
community as a Remote Administration Tool or a "RAT"
How It Can Affect Malware in Your Computer
Malware, or malicious software, is on the rise and can be found in all corners of the Internet. By
simply navigating to a website or opening an email, you are at risk of infecting your computer.
Malware takes the form of code, scripts, content and even legitimate
software to obtain access to your computer and the
personal information it houses.
मभलवेयर आपिे िं प्यूटर और व्यक्तर्गर् जभनिभरी घरों र्ि पहुुँच प्रभप्र् िरने िे ललए िोड िे ,
ललपपयों, सभमग्री और यहभं र्ि कि ऐसभ वैध सॉफ़्टवेयर िभ रूप ले लेर्भ है।
Malware

Malware

  • 1.
  • 2.
    Why Unnecessary Advertiseopen when using Internet ?
  • 3.
  • 4.
    Malware Mean malicioussoftware Malware is any software used to disrupt computer operations, gather sensitive information, display unwanted advertising.
  • 5.
    Malware Coming Sources •Internet • via pirated website • Pirated software • when you are downloading Pirated Movie, Pirate Game. • When You are click advertise on malicious website. • Via E-Mail etc…
  • 6.
    Malware Coming Sources WhenOffline use • Cd - DVD • Pen drive
  • 7.
    Three Type OfMalware 1. Virus 2. Trojan 3. Worm All malware are work differently.
  • 8.
    What Virus ? Infectingcomputer programs can include as well, data files, or the boot sector of the hard drive. Ex. Microsoft Word Document corrupt If are you share corrupted document any person then to establish virus our friends computer
  • 9.
  • 10.
  • 11.
    The first computervirus The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s
  • 12.
  • 13.
  • 14.
    The first computerviruses • Brain is the industry standard name for a computer virus that was released in its first form in January 1986 • The first computer virus for MS-DOS. • It infects the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system. • Brain was written by two brothers, Basit Farooq Alvi and Amjad Farooq Alvi, from Lahore, Punjab, Pakistan.
  • 15.
    What Trojan? Trojan isany malicious computer program which is used to hack into a computer by misleading users of its true intent. For Example : Speed Booster, Memory increase Speed, etc… ट्रोजन किसी भी दुभभावनभपूर्ा िं प्यूटर प्रोग्रभम है जो अपने असली इरभदे उपयोगिर्भाओं िे िो गुमरभह िरिे एि िं प्यूटर में हैि िरने िे ललए इस्र्ेमभल कियभ जभर्भ है। Change face after coming your System
  • 16.
    What Worm? A computerworm is a standalone malware computer program that replicates itself in order to spread to other computers. For Example: Duplicate Copying in no’s of file
  • 17.
    How to Protectwith malware • Visit Trusted website • Don’t Click misguided Advertise • E-Mail (Spam) • Install Anti Virus Or Anti Malware Software (License) • Don’t Install unknown Source via Pendrive
  • 18.
  • 19.
    What Is Firewall? Protect (a network or system) from unauthorized access with a firewall.
  • 20.
    Types Of Firewall 1.Hardware base Firewall 2. Software based firewall
  • 21.
  • 22.
  • 24.
    Software base Firewall MacAfee Norton Etc… InWindows Inbuilt Firewall system
  • 26.
    Beast is aWindows-based backdoor Trojan horse, more commonly known in the hacking community as a Remote Administration Tool or a "RAT"
  • 27.
    How It CanAffect Malware in Your Computer
  • 28.
    Malware, or malicioussoftware, is on the rise and can be found in all corners of the Internet. By simply navigating to a website or opening an email, you are at risk of infecting your computer.
  • 29.
    Malware takes theform of code, scripts, content and even legitimate software to obtain access to your computer and the personal information it houses. मभलवेयर आपिे िं प्यूटर और व्यक्तर्गर् जभनिभरी घरों र्ि पहुुँच प्रभप्र् िरने िे ललए िोड िे , ललपपयों, सभमग्री और यहभं र्ि कि ऐसभ वैध सॉफ़्टवेयर िभ रूप ले लेर्भ है।