SlideShare a Scribd company logo
Presentation 
Personal Firewalls 
Spyware and Adware Removers 
Anti Viruses 
1 
Presented By: 
Adeel Khurram 
Supervised By: 
Engr.Zahra Noor 
adeel2khurram@gmail.com
What is Personal FireWalls? 
A personal firewall is a utility that detects and 
protects a personal computer from unauthorized 
disturbance. Personal firewalls constantly 
monitor all transmissions to and from a 
computer. When connected to the Internet, your 
computer is open to attacks from a hacker . 
adeel2khurram@gmail.com 
2
INTERNET 
Firewall 
My 
PC 
Secure 
Private 
Network 
adeel2khurram@gmail.com 3
Who are Hackers? 
4 
Hacker 
A hacker is someone who tries to access a 
computer or network illegally. 
adeel2khurram@gmail.com
Operating systems often include a personal 
firewall. Windows automatically enables its 
built-in personal firewall, called Windows 
Firewall, upon installation of the operating 
system. If your operating system does not 
include a personal firewall or you want 
additional protection, you can purchase a 
stand-alone personal firewall utility 
5 
Continue….. 
adeel2khurram@gmail.com
What is an Anti Virus? 
• An antivirus program protects a computer 
against viruses by identifying and removing 
any computer viruses found in memory, on 
storage media, or on incoming files. Most 
antivirus programs also protect against worms 
and Trojan horses. When you purchase a new 
computer, it often includes antivirus software. 
adeel2khurram@gmail.com 
6
Most Famous Anti viruses 
adeel2khurram@gmail.com 7
What is a Virus ? 
adeel2khurram@gmail.com 
8
• The term, computer virus, describes a 
potentially damaging computer program that 
affects, or infects, a computer negatively by 
altering the way the computer works without 
the user’s knowledge or permission. Once the 
virus is in a computer, it can spread 
throughout and may damage your files and 
operating system. 
9 
Virus….. 
adeel2khurram@gmail.com
• Viruses are just one type of malicious 
software. Malware (short for malicious 
software) is software that acts without a 
user’s knowledge and deliberately 
alters the computer’s operations. In addition 
to viruses, worms and Trojan horses are 
malware. 
10 
Continue…. 
adeel2khurram@gmail.com
Worms And Trojan Horse 
• A worm, such as Sasser or Klez, copies itself 
repeatedly, for example, in memory or over a 
network, using up system resources and 
possibly shutting down the system. 
adeel2khurram@gmail.com 
11
Worms And Trojan Horse 
• Trojan HorseTrojan horse (named after the Greek 
myth) hides within or looks like a genuine 
program such as a screen saver. A certain 
condition or action usually start the Trojan 
horse. Unlike a virus or worm, a Trojan horse 
does not reproduce itself to other computers. 
adeel2khurram@gmail.com 
12
Spyware and Adware Remover 
• A spyware remover is a program 
that detects and deletes spyware 
and other similar programs. 
• An adware remover is a program 
that detects and deletes adware. 
adeel2khurram@gmail.com 
13
Spyware and Adware Remover 
• Spyware is a program placed on a computer 
without the user’s knowledge that secretly collects 
information about the user, often related toWeb 
browsing habits. Spyware can enter a computer as a 
virus or as a result of a user installing a new 
program. 
adeel2khurram@gmail.com 
14
Spyware and Adware Remover 
• Adware is a program that displays an online 
advertisement in a banner or pop-up window 
on Web pages, e-mail, or other Internet 
services. Sometimes, spyware is hidden in 
adware. 
adeel2khurram@gmail.com 
15

More Related Content

What's hot

Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
samthking25
 
Network Security
Network SecurityNetwork Security
Network Security
English TVTC
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
Ranjeta Muniandy
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
Satyendra Arora
 
CryptoWall
CryptoWallCryptoWall
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
Abrish06
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your Computer
Dom Cole
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
David Lombrozo
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
Sunjoonah Kambbs
 
Safe computing (circa 2004)
Safe computing (circa 2004)Safe computing (circa 2004)
Safe computing (circa 2004)
Azmi Mohd Tamil
 
Network security
Network securityNetwork security
Network security
nivethabaskar
 
Malware
MalwareMalware
Malware
Avani Patel
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
VishwarajYadav
 
Worm
WormWorm
Spyware
SpywareSpyware
Spyware
Avani Patel
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1
Shobhit Sharma
 
Malware
MalwareMalware
Malware
HHSome
 
Sowmya
SowmyaSowmya

What's hot (20)

Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
Network Security
Network SecurityNetwork Security
Network Security
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
CryptoWall
CryptoWallCryptoWall
CryptoWall
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your Computer
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
 
Safe computing (circa 2004)
Safe computing (circa 2004)Safe computing (circa 2004)
Safe computing (circa 2004)
 
Network security
Network securityNetwork security
Network security
 
Malware
MalwareMalware
Malware
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Worm
WormWorm
Worm
 
Spyware
SpywareSpyware
Spyware
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1
 
Malware
MalwareMalware
Malware
 
Sowmya
SowmyaSowmya
Sowmya
 

Similar to Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses

Personal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and virusesPersonal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and viruses
Adeel Khurram
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
sachingwalani24
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
TayyabaAbbas4
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
Mukul Kumar
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
Softex Software House
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
SWAMY NAYAK
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
KloudLearn
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
nidhidgowda185
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
smeech
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 

Similar to Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses (20)

Personal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and virusesPersonal firewall,Spy ware,ad ware remover and viruses
Personal firewall,Spy ware,ad ware remover and viruses
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus project
Virus projectVirus project
Virus project
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Malicious
MaliciousMalicious
Malicious
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from Adeel Khurram

What is active directory
What is active directoryWhat is active directory
What is active directory
Adeel Khurram
 
Usages of May and can
Usages of May and canUsages of May and can
Usages of May and can
Adeel Khurram
 
English Punctuation
English PunctuationEnglish Punctuation
English Punctuation
Adeel Khurram
 
Computer simulation
Computer simulationComputer simulation
Computer simulation
Adeel Khurram
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
Adeel Khurram
 
Coaxial cable and its types
Coaxial cable and its typesCoaxial cable and its types
Coaxial cable and its types
Adeel Khurram
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Gps2014
Gps2014Gps2014
Gps2014
Adeel Khurram
 

More from Adeel Khurram (8)

What is active directory
What is active directoryWhat is active directory
What is active directory
 
Usages of May and can
Usages of May and canUsages of May and can
Usages of May and can
 
English Punctuation
English PunctuationEnglish Punctuation
English Punctuation
 
Computer simulation
Computer simulationComputer simulation
Computer simulation
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
 
Coaxial cable and its types
Coaxial cable and its typesCoaxial cable and its types
Coaxial cable and its types
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Gps2014
Gps2014Gps2014
Gps2014
 

Recently uploaded

How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
JomonJoseph58
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 

Recently uploaded (20)

How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 

Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses

  • 1. Presentation Personal Firewalls Spyware and Adware Removers Anti Viruses 1 Presented By: Adeel Khurram Supervised By: Engr.Zahra Noor adeel2khurram@gmail.com
  • 2. What is Personal FireWalls? A personal firewall is a utility that detects and protects a personal computer from unauthorized disturbance. Personal firewalls constantly monitor all transmissions to and from a computer. When connected to the Internet, your computer is open to attacks from a hacker . adeel2khurram@gmail.com 2
  • 3. INTERNET Firewall My PC Secure Private Network adeel2khurram@gmail.com 3
  • 4. Who are Hackers? 4 Hacker A hacker is someone who tries to access a computer or network illegally. adeel2khurram@gmail.com
  • 5. Operating systems often include a personal firewall. Windows automatically enables its built-in personal firewall, called Windows Firewall, upon installation of the operating system. If your operating system does not include a personal firewall or you want additional protection, you can purchase a stand-alone personal firewall utility 5 Continue….. adeel2khurram@gmail.com
  • 6. What is an Anti Virus? • An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. Most antivirus programs also protect against worms and Trojan horses. When you purchase a new computer, it often includes antivirus software. adeel2khurram@gmail.com 6
  • 7. Most Famous Anti viruses adeel2khurram@gmail.com 7
  • 8. What is a Virus ? adeel2khurram@gmail.com 8
  • 9. • The term, computer virus, describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. Once the virus is in a computer, it can spread throughout and may damage your files and operating system. 9 Virus….. adeel2khurram@gmail.com
  • 10. • Viruses are just one type of malicious software. Malware (short for malicious software) is software that acts without a user’s knowledge and deliberately alters the computer’s operations. In addition to viruses, worms and Trojan horses are malware. 10 Continue…. adeel2khurram@gmail.com
  • 11. Worms And Trojan Horse • A worm, such as Sasser or Klez, copies itself repeatedly, for example, in memory or over a network, using up system resources and possibly shutting down the system. adeel2khurram@gmail.com 11
  • 12. Worms And Trojan Horse • Trojan HorseTrojan horse (named after the Greek myth) hides within or looks like a genuine program such as a screen saver. A certain condition or action usually start the Trojan horse. Unlike a virus or worm, a Trojan horse does not reproduce itself to other computers. adeel2khurram@gmail.com 12
  • 13. Spyware and Adware Remover • A spyware remover is a program that detects and deletes spyware and other similar programs. • An adware remover is a program that detects and deletes adware. adeel2khurram@gmail.com 13
  • 14. Spyware and Adware Remover • Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user, often related toWeb browsing habits. Spyware can enter a computer as a virus or as a result of a user installing a new program. adeel2khurram@gmail.com 14
  • 15. Spyware and Adware Remover • Adware is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services. Sometimes, spyware is hidden in adware. adeel2khurram@gmail.com 15