SlideShare a Scribd company logo
FBI VIRUS
A Power Point Presentation BY:
Sunanda Chakraborty
Stream: ECE (Batch 2)
Sem: 4 . Roll #:118
College : Academy of
Technology
University : WBUT
• Vital Information Resources Under
Seize.
• A computer virus is a self-replicating
program.
• It can "infect" other programs by
modifying them.
Definition of Computer Virus
 It is a Ransomware Virus.
 Ransomware is a class of virus which restricts access to the computer
system that it infects, and demands a ransom.
FBI Virus encrypt files on the system's hard drive.
What is FBI Virus
Screen Shot Of FBI Virus
•Restart in safe mode/safe mode with Networking (F8 during
POST)
•Try System Restore.
• Goto safe mode with command Prompt and then try system
restore. (At the command prompt, type rstrui.exe, and then
press Enter.)
•Run different virus removing tools.
•If nothing works, try PC restore, OSRI/Parallel OSRI.
Get Rid of FBI Virus
PC Restore:
•Reverts the system to factory settings.
•Tap F8 during POST and select 'Repair my Computer'.
•Data loss.
Operating System Reinstallation:
•Boot from OS disk (F12) and delete all the partitions.
•Data Loss
Parallel OSRI:
•Boot from OS disk. Do not delete partitions.
•No data loss.
PC Restore, OSRI & Parallel OSRI
VirusVirus RemovingRemoving
ToolTool
• R Kill
• Rogue Killer
• Malwaebytes
• Super anti spyware
• Trojan Remover
• Hitman Pro
• ADW Remover
• TDS Killer
• Fake AV remover
•Mac, Linux: Hardly get infected.
•Windows 8 and 8.1: Less Susceptible
•Windows 7 and lower OS: Highly Susceptible
Operating System that are susceptible
1.Use antivirus software and keep it up-to-date.
2.Install security patches.
3. Use a firewall.
4.Secure your browser.
5.Take control of your email.
6.Treat IM suspiciously.
7.Avoid P2P and distributed filesharing.
8.Keep abreast of Internet scams.
9.Don't fall victim to virus hoaxes.
How to protect your PC from Virus
THANKS TO
ALL!
QUESTIONS?

More Related Content

What's hot

Rootkits
RootkitsRootkits
Release notes 3_d_v61
Release notes 3_d_v61Release notes 3_d_v61
Release notes 3_d_v61
sundar sivam
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
Tasif Tanzim
 
Malicious software
Malicious softwareMalicious software
Malicious software
msdeepika
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
Ayman Hussein
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Computer virus
Computer virusComputer virus
Computer virus
Utchi
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 
Basic concepts of computer part 2
Basic concepts of computer part 2Basic concepts of computer part 2
Basic concepts of computer part 2
sam shankar
 
Configuring Devices in Windows
Configuring Devices in WindowsConfiguring Devices in Windows
Configuring Devices in Windows
Amir Villas
 
Malicious software
Malicious softwareMalicious software
Malicious software
rajakhurram
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
bios booting process
bios booting processbios booting process
bios booting process
Taimoor Ashraf
 
The Boot Process
The Boot ProcessThe Boot Process
The Boot Process
Amir Villas
 
boot
bootboot
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
O p
O pO p

What's hot (20)

Rootkits
RootkitsRootkits
Rootkits
 
Release notes 3_d_v61
Release notes 3_d_v61Release notes 3_d_v61
Release notes 3_d_v61
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Computer virus
Computer virusComputer virus
Computer virus
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Basic concepts of computer part 2
Basic concepts of computer part 2Basic concepts of computer part 2
Basic concepts of computer part 2
 
Configuring Devices in Windows
Configuring Devices in WindowsConfiguring Devices in Windows
Configuring Devices in Windows
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious
MaliciousMalicious
Malicious
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
bios booting process
bios booting processbios booting process
bios booting process
 
The Boot Process
The Boot ProcessThe Boot Process
The Boot Process
 
boot
bootboot
boot
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
O p
O pO p
O p
 

Similar to Presentation on FBI VIRUS

CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
kd123is123live
 
Malware
MalwareMalware
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
Ali Habeeb
 
Cryptography presentation
Cryptography presentationCryptography presentation
Cryptography presentation
K.m Riajul Islam
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
jenniel143
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
Nicholas Davis
 
Desktop pc computer security
Desktop pc computer securityDesktop pc computer security
Desktop pc computer security
Nicholas Davis
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
cdebraj16101991
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
Wiliam Ferraciolli
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
Computer virus
Computer virusComputer virus
Computer virus
Aarya Khanal
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
Samiullah Khan
 
Computer virus
Computer virusComputer virus
Computer virus
Rahul Baghla
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
DINESH KAMBLE
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
PravinGhosekar
 
Virus Elimination Course
Virus Elimination Course Virus Elimination Course
Virus Elimination Course
Thach Moniroth
 
Virusppt
ViruspptVirusppt
Virusppt
Suman Bose
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
Information Technology
 

Similar to Presentation on FBI VIRUS (20)

CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
 
Malware
MalwareMalware
Malware
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Cryptography presentation
Cryptography presentationCryptography presentation
Cryptography presentation
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
 
Desktop pc computer security
Desktop pc computer securityDesktop pc computer security
Desktop pc computer security
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus Elimination Course
Virus Elimination Course Virus Elimination Course
Virus Elimination Course
 
Virusppt
ViruspptVirusppt
Virusppt
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 

Recently uploaded

Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
kalichargn70th171
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
Karya Keeper
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Peter Caitens
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
Envertis Software Solutions
 

Recently uploaded (20)

Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
 

Presentation on FBI VIRUS

  • 1. FBI VIRUS A Power Point Presentation BY: Sunanda Chakraborty Stream: ECE (Batch 2) Sem: 4 . Roll #:118 College : Academy of Technology University : WBUT
  • 2. • Vital Information Resources Under Seize. • A computer virus is a self-replicating program. • It can "infect" other programs by modifying them. Definition of Computer Virus
  • 3.  It is a Ransomware Virus.  Ransomware is a class of virus which restricts access to the computer system that it infects, and demands a ransom. FBI Virus encrypt files on the system's hard drive. What is FBI Virus
  • 4. Screen Shot Of FBI Virus
  • 5. •Restart in safe mode/safe mode with Networking (F8 during POST) •Try System Restore. • Goto safe mode with command Prompt and then try system restore. (At the command prompt, type rstrui.exe, and then press Enter.) •Run different virus removing tools. •If nothing works, try PC restore, OSRI/Parallel OSRI. Get Rid of FBI Virus
  • 6. PC Restore: •Reverts the system to factory settings. •Tap F8 during POST and select 'Repair my Computer'. •Data loss. Operating System Reinstallation: •Boot from OS disk (F12) and delete all the partitions. •Data Loss Parallel OSRI: •Boot from OS disk. Do not delete partitions. •No data loss. PC Restore, OSRI & Parallel OSRI
  • 7. VirusVirus RemovingRemoving ToolTool • R Kill • Rogue Killer • Malwaebytes • Super anti spyware • Trojan Remover • Hitman Pro • ADW Remover • TDS Killer • Fake AV remover
  • 8. •Mac, Linux: Hardly get infected. •Windows 8 and 8.1: Less Susceptible •Windows 7 and lower OS: Highly Susceptible Operating System that are susceptible
  • 9. 1.Use antivirus software and keep it up-to-date. 2.Install security patches. 3. Use a firewall. 4.Secure your browser. 5.Take control of your email. 6.Treat IM suspiciously. 7.Avoid P2P and distributed filesharing. 8.Keep abreast of Internet scams. 9.Don't fall victim to virus hoaxes. How to protect your PC from Virus