This is a small presentation that i create to present for my friends when im study in greade 11.it may be useful to u if u are willing to study about computer viruses ,,tell what u feel my friends....... :-/
E - electronic, in computer terms, it refers to anything which is online, anything which uses network.
AEGIS - in computer terms it refers to security, defence.
It’s a software used for security purpose.
The software does not allow to change the MAC Address of the PC.
E - electronic, in computer terms, it refers to anything which is online, anything which uses network.
AEGIS - in computer terms it refers to security, defence.
It’s a software used for security purpose.
The software does not allow to change the MAC Address of the PC.
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Ted Whittemore
Talk on Disinfecting Your Windows PC Using Free Malwarebytes and Spybot, & How to Avoid Infection -- on Jan. 19, 2012 Kinnelon Public Library, NJ -- see the Working Computers Blog Articles:
http://www.kinneloncomputers.com/2012/01/talk-how-to-take-care-of-your-computer.html
and:
http://www.kinneloncomputers.com/2012/01/taking-care-of-your-computer-for-free.html
Presentation on computer software-system software.johnraju213
this is a brief presentation created by me.. comment your opinions my name is john. there is a little problem with some slides so download and see it..
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Ted Whittemore
Talk on Disinfecting Your Windows PC Using Free Malwarebytes and Spybot, & How to Avoid Infection -- on Jan. 19, 2012 Kinnelon Public Library, NJ -- see the Working Computers Blog Articles:
http://www.kinneloncomputers.com/2012/01/talk-how-to-take-care-of-your-computer.html
and:
http://www.kinneloncomputers.com/2012/01/taking-care-of-your-computer-for-free.html
Presentation on computer software-system software.johnraju213
this is a brief presentation created by me.. comment your opinions my name is john. there is a little problem with some slides so download and see it..
Discussed about computer malware and its types like virus, trojan horse, worms etc. and also discussed about antivirus and how an antivirus works. We have also discussed about types of viruses and some latest viruses like ransomware.
A Simple Presentation about Computer Security and Anti Viruses keeping in mind healthcare professionals as the target audience. Contains Definitions, Educational Content , Purchase and Free Options and a Simple tutorial on How to use Avast Free Edition
What is malware? How can I protect myself against malware on my computer? Helpful tips and information about computer Viruses, Worms, Trojans, Ransomware, Scareware, Spyware, Adware and Phishing mails.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
2. When we use computers it is important to prevent corruption and lost of user
data and let user to continue his work without any disturb. For this we must
secure our data.
So it is very important to implement good security mechanisms.
Edited :- Kanchana Eranga Bandara
5. Unauthorized Access
Hacking
• Trying to access or accessing the network by breaching the security by an
unauthorized person is known as hacking.
• Cheating others account numbers, credit card numbers and misuse them.
• Cheating trade secrets, confusing network devices are done by hacking.
• The person who does this is called a hacker.
Edited :- Kanchana Eranga Bandara
6. Cracking
• Changing software content, Serial number, security methods etc.
• This done by a programmer who is not licensed to do so is called cracking
Edited :- Kanchana Eranga Bandara
7. Malicious software
• Malware or Malicious software is software designed to damage a computer system
without the owner's concerns.
• Malicious software is a general term used by computer professionals to mean a
variety of annoying software or program codes.
• Malicious software includes Virus, Worm, Trojan, Adware, Root kit, Spyware and
many other unwanted software.
Edited :- Kanchana Eranga Bandara
8. Computer Virus
• A computer virus is a program code that can copy itself and infect a
computer without the permission of the user.
• In order to replicate itself, a virus must be permitted to execute and write
to memory.
• For this reason, many viruses attach themselves to an executable files that
may be part of legitimate programs. Some viruses change its own code by
itself.
• Viruses spread via network, floppy disk, CDs, USB drive.
Edited :- Kanchana Eranga Bandara
9. •Changes file size.
•Change system date and time.
•Slow down the computer.
•Shut down computer unexpectedly.
•Take more time to boot computer.
Symptoms of a virus attack
Edited :- Kanchana Eranga Bandara
10. Worm
• Worm is a self-replicating computer program.
• It uses a network to send copies of itself to other systems and it may do so without
any user intervention.
• Unlike a virus, it does not need to attach itself to an existing program.
Edited :- Kanchana Eranga Bandara
11. Trojan horse
• This is a program that disguises itself as program.
• Similar to a virus, these programs are hidden and cause an unwanted effect.
• They differ from viruses because they are normally not designed to replicate like
a virus.
•By showing that this is important software running in the computer the Trojan
horse opens a back door to the hacker.
• There after unauthorized person can get into the computer and do harmful to
the user data.
E.g.: By opening unknown e-mail attachments
Edited :- Kanchana Eranga Bandara
12. Symptoms when Trojan horse affects the computer:
•Sending the user’s important details to others.
•Changing or deleting data of the computer.
•Uploading and downloading data in an unauthorized way.
•Spreading malware such as viruses.
•Shutting down the computer unexpectedly.
•Unauthorized Software installation.
Edited :- Kanchana Eranga Bandara
13. • This is a virus which infects the boot sector of a hard disk or other disk drives.
• The boot sector is the portion that stores the boot program that has the code for
loading the operating system file onto memory.
• Once the boot sector is infected with the virus, it may rewrite the boot sector
making it unbootable or scramble the File Allocation Table (FAT).
Boot sector virus
Edited :- Kanchana Eranga Bandara
14. •Sudden error massages.
•Windows restart with a blue screen error message.
•Boot Failure.
•Fail to format a particular drive.
Symptoms when Boot Sector Virus affect the computer:
Edited :- Kanchana Eranga Bandara
15. • These viruses may be one of the type mentioned, but are designed to defeat
antivirus scanning and other antiviral software detection method (firewall).
• Mode of infection is from fake antivirus and software promoting website.
• This virus helps the other viruses too.
Stealth Virus
Edited :- Kanchana Eranga Bandara
16. • Software that is installed into a computer without the user's knowledge.
• Transmits information about the user's computer, and user activities over the
Internet.
• Redirect to sites which spoil the culture and the computer.
Spyware
Edited :- Kanchana Eranga Bandara
17. • Sending user’s important data to others.
• Unauthorized Software installation.
• Redirect Web browser to dangerous web sites.
• Change Computer settings.
• Using anti-spyware we can minimize the damages.
Symptoms when Spy ware affects to your computer:
Edited :- Kanchana Eranga Bandara
18. Time Bomb
• This is simply some code on a computer which does not immediately trigger.
• Instead, it is set to cause it's damage at some point in the future.
• Usually Time bombs are designed to take revenge towards a company or an
organization.
E.g.: Sending messages such as “You are a great FOOL!!!!” on April first.
OR
“vampire time” at 12 A.M
Edited :- Kanchana Eranga Bandara
19. • A logic bomb is a program which will execute a pre-programmed routine when a
designated condition is met.
• Logic bombs do not make copies of themselves.
• Logic bomb work as same as time bomb.
Logic bomb
Edited :- Kanchana Eranga Bandara
21. The large scale of creating virus is for business.
Taking revenge.
Like to see others suffering.
Hobby and fun.
For virus creators?
How would you feel if your important files are corrupted or deleted? Its pretty
bad, it cause redoing all of our work. Therefore, creating and spreading
viruses is an activity one must never indulge in. After all, everyone’s work is as
precious as our are.
Mentally Affected
Edited :- Kanchana Eranga Bandara