SlideShare a Scribd company logo
1 of 1
Pahdi  Yadav<br />Professor Milton<br />English 101<br />5 May 2008<br />Antivirus Programs<br />         Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over network has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measure to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses.<br />         An antivirus program protect a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on coming files. When you purchase a new computers, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot programs, the operating system, and other program that normally are read from but not modified. In addition, many antivirus program automatically scan files downloaded from the Web,  e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205).<br />         One technique that antivirus program used to identify a virus is to look for virus signatures, or virus definitions, which  are known specific patterns of virus code. According to Shelly and Cashman (Antivirus Program), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus<br />___________________<br />         Buloski point out that most antivirus programs also protect against worms and Trojan horses       (55-61)<br />Programs signature files regularly is important, because it will download any new virus definitions that have been added since the last update.<br />        Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus programs, though, is an effective technique to safeguard your computer from loss.  <br />

More Related Content

What's hot (20)

Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
 
antivirus
antivirusantivirus
antivirus
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Anti virus
Anti virusAnti virus
Anti virus
 
Anti virus
Anti virusAnti virus
Anti virus
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 

Similar to Pahdi yadav antivirus

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...UltraUploader
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfBlogger
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfBlogger
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptxdianemullin2
 

Similar to Pahdi yadav antivirus (17)

Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
 
Policy report barrat &amp; associates ltd
Policy report  barrat &amp; associates ltdPolicy report  barrat &amp; associates ltd
Policy report barrat &amp; associates ltd
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptx
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 

More from fernando_bruaj

More from fernando_bruaj (20)

Brua home networks
Brua home networksBrua home networks
Brua home networks
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Lakan
LakanLakan
Lakan
 
Learn more about basket ball
Learn more about basket ballLearn more about basket ball
Learn more about basket ball
 
Check this out brua
Check this out bruaCheck this out brua
Check this out brua
 
Recycling of household waste fernando brua
Recycling of household waste fernando bruaRecycling of household waste fernando brua
Recycling of household waste fernando brua
 
Carmen fernando brua
Carmen fernando bruaCarmen fernando brua
Carmen fernando brua
 
Fernando brua
Fernando bruaFernando brua
Fernando brua
 
Recycling of household waste brua
Recycling of household waste bruaRecycling of household waste brua
Recycling of household waste brua
 
Presentation1
Presentation1Presentation1
Presentation1
 
Water, water, everywhere fernando
Water, water, everywhere fernandoWater, water, everywhere fernando
Water, water, everywhere fernando
 
Fernando brua
Fernando bruaFernando brua
Fernando brua
 
Craft barn
Craft barnCraft barn
Craft barn
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
 
Presentation1
Presentation1Presentation1
Presentation1
 
Rent a cabin fernando brua
Rent a cabin fernando bruaRent a cabin fernando brua
Rent a cabin fernando brua
 
Blooming deals fernando brua
Blooming deals fernando bruaBlooming deals fernando brua
Blooming deals fernando brua
 
Airplane rides fernando brua
Airplane rides fernando bruaAirplane rides fernando brua
Airplane rides fernando brua
 
Airplane rides fernando brua
Airplane rides fernando bruaAirplane rides fernando brua
Airplane rides fernando brua
 

Recently uploaded

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Recently uploaded (20)

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Pahdi yadav antivirus

  • 1. Pahdi Yadav<br />Professor Milton<br />English 101<br />5 May 2008<br />Antivirus Programs<br /> Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over network has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measure to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses.<br /> An antivirus program protect a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on coming files. When you purchase a new computers, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot programs, the operating system, and other program that normally are read from but not modified. In addition, many antivirus program automatically scan files downloaded from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205).<br /> One technique that antivirus program used to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman (Antivirus Program), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus<br />___________________<br /> Buloski point out that most antivirus programs also protect against worms and Trojan horses (55-61)<br />Programs signature files regularly is important, because it will download any new virus definitions that have been added since the last update.<br /> Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus programs, though, is an effective technique to safeguard your computer from loss. <br />