Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
presentation on Virus
1. COURSE PRESENTATION
Dept. of Information Science & Library Management
University of Rajshahi
Presented by:
Abdullah-Al-Mahmud
Roll:13112956
Session: 2012-13
almahmudru888@gmail.com
3. Computer Virus
virus is a malware program
is able to copy itself
infect a computer without the permission of the user and interfere
in computer operation
may corrupt or delete data on computer, make slow the system,
take control and even erase everything on the hard disk.
Viruses can spread through the attachments in e-mails, instants
messages from one computer to another computer. Random
browsing and downloading from Internet is another cause of virus
infecting. ( access)
4. Types of virus:
Computer viruses are different in types. Such as:
File deleting virus:
caused permanent damage of critical files which are a
part of operating system or data files.
Boot sector virus:
It infects the hard disk. When the computer is turned on,
the virus launches immediately and is loaded into memory, enabling it to
control the computer.
Macro virus:
A macro virus is a computer virus that infects document
files (MS Word), spreadsheet file (MS Excel) or presentation file (MS
PowerPoint) and causes a sequence of actions to be performed
automatically when the application is started. (Packaged)
5. Trojan Horse:
A Trojan horse virus is so named due to fact that the
actual malicious software is programmed inside an innocent piece of
software. Trojan horses do not replicate themselves like other viruses.
This virus can delete data, blocking data, modifying data, copying data
and disrupting the performance of computers. Hackers use Trojan for
stealing important information such as credit card number, passwords
etc.
Retrovirus:
Retrovirus is another type of virus which tries to attack
and disable the anti-virus application running on the computer. A
retrovirus can be considered as anti-antivirus.
Rootkit virus:
Rootkit themselves are not harmful; they are simply
used to hide malware. Rootkit allow viruses and malware to hide by
disguising as necessary files that antivirus software will overlook.
Mass Mailer Viruses:
Mass Mailer Viruses search e-mail programs like MS
outlook for e-mail addresses which are stored in the address book and
replicate by e-mailing themselves to the addresses stored in the address
book of the e-mail program
6. Symptoms:
Slow performance
File missing
Few programs don’t work
Unusual error message
Take much time in starting
Extra files
Anti-virus is disable
7. How to Troubleshoot a Virus affected PC:
Method 1: System Restore
Method 2: Scans
Method 3: Clean install
8. Troubleshoot viruses through Anti-viruses:
Step 1: Back up data
Before starting the virus removal process, we have to make
sure that all of our important data is backed up.
Step 2: Install anti-virus
The computer should already have an anti-virus program
installed. But if don’t then it should ensure to have an anti-virus. There
are many free and commercial anti-viruses available in the market.
Highly used and reliable anti-viruses are Norton, McAfee, Vipre,
Kaspersky, Avast, Panda, Avira, Microsoft Security Essentials etc. It
also required a few anti-malware programs.
Steps 3: reboot in save mode
In order for a virus to do anything, it needs to be run. Safe
mode only loads the most essential files for windows to run, which may
stop almost all virus from activating. This will allow identify and remove
them.
9. Step 4: scans
Run a full system scan with anti-virus program that is already
installed. After finishing virus scan run each additional anti-malware
scans. Each program is capable of removing any infections it finds.
Step 5: test the computer
After the scans have all completed, reboot normally and test
computer’s performance. Run web-browser and other programs to
ensure that the virus infection is gone.
We know prevention is better than cure. To help avoid
computer viruses its essential to stay informed about the recent threats,
avoid browsing and downloading from unauthorized sites and take
immediate scan when connect with any unknown device like pendrive.