SlideShare a Scribd company logo
1 of 10
Download to read offline
Computer Malware
Introduction and origin of computer Malware
Malware is a computer program that can increase and covers
entirely your PC by Copying itself without your knowledge and
permission. Basically it spread from infected computer to an fresh
or uninfected computer , for example a user sending it over a
network or the internet, through removal medium such as a floppy
disk, CD, or USB drive.
Malware firstly came into existence in 1949 as a self-replicating
program by Mathematician John Von Neumann. At that period a
group of programmers develop a game called Core Wars, which
could produce every time it was run, and even saturate the memory
of other players’ computers then the developers of this strange
game also develop the first anti-virus, named Reaper for stopping
the Copies created by Core Wars.
What is Malware
A word Malware is derived from two different words
first is Malicious and second one is Software. Malware
is a general term for any kind of program which came
into existence to infect as well as harm your
Computer.
Different Types of Malware
1.Virus
A computer virus is that which attaches itself to a
legitimate program or files for damaging your
Computer and after that it can copy themselves to
spread rapidly in your entire PC.
2.Trojans
A Trojan is defined as a type of malware that appears
completely harmless but the real thing is that a Trojan
can create a “backdoor” on your PC so that a hacker
can easily get into your system. Though, Trojan cannot
replicate or duplicate themselves.
3.Worms
A worm is also a type of Computer Malware. It can
replicate itself with ease and also can do so without any
human support. Worms travel across computer
networks and can suck up a lot of system memory and
are also capable to crash entire networks.
4 Spyware
It is defined as a Malware having specific aim, as
running in the background to collects information from
your computer system or even your personnel data.
That’s why Spyware is a big threat for your confidential
data.
5. Adware
Adware is a word formed from combining
“Advertisements” and “Software” and is a ad-
supported software. Adware is not harmful as
compared to “Trojan” or “Spyware” but is
annoying due to its flooded of advertisements.
How Malware get transmitted to
your PC
Malware are transmitted through computer
networks, the internet and portable media such
as USB drives, DVDs and CDs. Besides that you
can receive malwares through email or by
copying a program onto a CD and installing it on
your PC.
Various Symptoms of Malware
1.Application that don’t work properly.
2.Unusual error messages.
3 file size Changes of no reason.
4.Printing doesn’t work correctly.
5An increase in the number of files on the system while nothing
has been added.
6.Date of last access doesn’t match with date of last use.
7. Lots of irritating pop-ups displaying on your browser.
8. System slows down, freezes or even crashes.
A best guide to protect your system from
Malware
At first you have to prepare your computer anti-viruses by
using a effective anti-virus and always keep it updated for
complete protection. This is because viruses can change and
become undetected by certain programs and this can only
be preventing by updating the virus definitions offered by
the software Company.
http://cleanpcsolutions.com/
Thanks
for
Watching

More Related Content

Viewers also liked

LPC Role of Clinical Supervsion
LPC Role of Clinical SupervsionLPC Role of Clinical Supervsion
LPC Role of Clinical SupervsionGlenn Duncan
 
bastter -_agulhada_do_didi
bastter -_agulhada_do_didibastter -_agulhada_do_didi
bastter -_agulhada_do_didiPaulo Klosowski
 
Search engine and web crawler
Search engine and web crawlerSearch engine and web crawler
Search engine and web crawlervinay arora
 
LPC Models and Techniques in Clinical Supervision
LPC Models and Techniques in Clinical SupervisionLPC Models and Techniques in Clinical Supervision
LPC Models and Techniques in Clinical SupervisionGlenn Duncan
 

Viewers also liked (6)

Osimis pitch
Osimis pitchOsimis pitch
Osimis pitch
 
Dvojna praksa liječnika, javno i privatno?
Dvojna praksa liječnika, javno i privatno?Dvojna praksa liječnika, javno i privatno?
Dvojna praksa liječnika, javno i privatno?
 
LPC Role of Clinical Supervsion
LPC Role of Clinical SupervsionLPC Role of Clinical Supervsion
LPC Role of Clinical Supervsion
 
bastter -_agulhada_do_didi
bastter -_agulhada_do_didibastter -_agulhada_do_didi
bastter -_agulhada_do_didi
 
Search engine and web crawler
Search engine and web crawlerSearch engine and web crawler
Search engine and web crawler
 
LPC Models and Techniques in Clinical Supervision
LPC Models and Techniques in Clinical SupervisionLPC Models and Techniques in Clinical Supervision
LPC Models and Techniques in Clinical Supervision
 

Recently uploaded

AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoUXDXConf
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreelreely ones
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxEasyPrinterHelp
 

Recently uploaded (20)

AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 

Clean PC Threats | Complete Solutions for PC

  • 2. Introduction and origin of computer Malware Malware is a computer program that can increase and covers entirely your PC by Copying itself without your knowledge and permission. Basically it spread from infected computer to an fresh or uninfected computer , for example a user sending it over a network or the internet, through removal medium such as a floppy disk, CD, or USB drive. Malware firstly came into existence in 1949 as a self-replicating program by Mathematician John Von Neumann. At that period a group of programmers develop a game called Core Wars, which could produce every time it was run, and even saturate the memory of other players’ computers then the developers of this strange game also develop the first anti-virus, named Reaper for stopping the Copies created by Core Wars.
  • 3. What is Malware A word Malware is derived from two different words first is Malicious and second one is Software. Malware is a general term for any kind of program which came into existence to infect as well as harm your Computer.
  • 4. Different Types of Malware 1.Virus A computer virus is that which attaches itself to a legitimate program or files for damaging your Computer and after that it can copy themselves to spread rapidly in your entire PC. 2.Trojans A Trojan is defined as a type of malware that appears completely harmless but the real thing is that a Trojan can create a “backdoor” on your PC so that a hacker can easily get into your system. Though, Trojan cannot replicate or duplicate themselves.
  • 5. 3.Worms A worm is also a type of Computer Malware. It can replicate itself with ease and also can do so without any human support. Worms travel across computer networks and can suck up a lot of system memory and are also capable to crash entire networks. 4 Spyware It is defined as a Malware having specific aim, as running in the background to collects information from your computer system or even your personnel data. That’s why Spyware is a big threat for your confidential data.
  • 6. 5. Adware Adware is a word formed from combining “Advertisements” and “Software” and is a ad- supported software. Adware is not harmful as compared to “Trojan” or “Spyware” but is annoying due to its flooded of advertisements.
  • 7. How Malware get transmitted to your PC Malware are transmitted through computer networks, the internet and portable media such as USB drives, DVDs and CDs. Besides that you can receive malwares through email or by copying a program onto a CD and installing it on your PC.
  • 8. Various Symptoms of Malware 1.Application that don’t work properly. 2.Unusual error messages. 3 file size Changes of no reason. 4.Printing doesn’t work correctly. 5An increase in the number of files on the system while nothing has been added. 6.Date of last access doesn’t match with date of last use. 7. Lots of irritating pop-ups displaying on your browser. 8. System slows down, freezes or even crashes.
  • 9. A best guide to protect your system from Malware At first you have to prepare your computer anti-viruses by using a effective anti-virus and always keep it updated for complete protection. This is because viruses can change and become undetected by certain programs and this can only be preventing by updating the virus definitions offered by the software Company. http://cleanpcsolutions.com/