SlideShare a Scribd company logo
1 of 10
COURSE PRESENTATION
Dept. of Information Science & Library Management
University of Rajshahi
Presented by:
Abdullah-Al-Mahmud
Roll:13112956
Session: 2012-13
almahmudru888@gmail.com
PRESENTATION TOPIC :
 Virus
 Types of Virus
 Troubleshooting a virus affected PC
Computer Virus
 virus is a malware program
 is able to copy itself
 infect a computer without the permission of the user and interfere
in computer operation
 may corrupt or delete data on computer, make slow the system,
take control and even erase everything on the hard disk.
 Viruses can spread through the attachments in e-mails, instants
messages from one computer to another computer. Random
browsing and downloading from Internet is another cause of virus
infecting. ( access)
Types of virus:
Computer viruses are different in types. Such as:
File deleting virus:
caused permanent damage of critical files which are a
part of operating system or data files.
Boot sector virus:
It infects the hard disk. When the computer is turned on,
the virus launches immediately and is loaded into memory, enabling it to
control the computer.
Macro virus:
A macro virus is a computer virus that infects document
files (MS Word), spreadsheet file (MS Excel) or presentation file (MS
PowerPoint) and causes a sequence of actions to be performed
automatically when the application is started. (Packaged)
Trojan Horse:
A Trojan horse virus is so named due to fact that the
actual malicious software is programmed inside an innocent piece of
software. Trojan horses do not replicate themselves like other viruses.
This virus can delete data, blocking data, modifying data, copying data
and disrupting the performance of computers. Hackers use Trojan for
stealing important information such as credit card number, passwords
etc.
Retrovirus:
Retrovirus is another type of virus which tries to attack
and disable the anti-virus application running on the computer. A
retrovirus can be considered as anti-antivirus.
Rootkit virus:
Rootkit themselves are not harmful; they are simply
used to hide malware. Rootkit allow viruses and malware to hide by
disguising as necessary files that antivirus software will overlook.
Mass Mailer Viruses:
Mass Mailer Viruses search e-mail programs like MS
outlook for e-mail addresses which are stored in the address book and
replicate by e-mailing themselves to the addresses stored in the address
book of the e-mail program
Symptoms:
 Slow performance
 File missing
 Few programs don’t work
 Unusual error message
 Take much time in starting
 Extra files
 Anti-virus is disable
How to Troubleshoot a Virus affected PC:
 Method 1: System Restore
 Method 2: Scans
 Method 3: Clean install
Troubleshoot viruses through Anti-viruses:
Step 1: Back up data
Before starting the virus removal process, we have to make
sure that all of our important data is backed up.
Step 2: Install anti-virus
The computer should already have an anti-virus program
installed. But if don’t then it should ensure to have an anti-virus. There
are many free and commercial anti-viruses available in the market.
Highly used and reliable anti-viruses are Norton, McAfee, Vipre,
Kaspersky, Avast, Panda, Avira, Microsoft Security Essentials etc. It
also required a few anti-malware programs.
Steps 3: reboot in save mode
In order for a virus to do anything, it needs to be run. Safe
mode only loads the most essential files for windows to run, which may
stop almost all virus from activating. This will allow identify and remove
them.
Step 4: scans
Run a full system scan with anti-virus program that is already
installed. After finishing virus scan run each additional anti-malware
scans. Each program is capable of removing any infections it finds.
Step 5: test the computer
After the scans have all completed, reboot normally and test
computer’s performance. Run web-browser and other programs to
ensure that the virus infection is gone.
We know prevention is better than cure. To help avoid
computer viruses its essential to stay informed about the recent threats,
avoid browsing and downloading from unauthorized sites and take
immediate scan when connect with any unknown device like pendrive.
THANK YOU

More Related Content

What's hot

What's hot (20)

Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 

Viewers also liked

Comparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statementsComparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statementsLucas Jellema
 
Tracxn Research - Finance & Accounting Landscape, February 2017
Tracxn Research - Finance & Accounting Landscape, February 2017Tracxn Research - Finance & Accounting Landscape, February 2017
Tracxn Research - Finance & Accounting Landscape, February 2017Tracxn
 
Introducing NoSQL and MongoDB to complement Relational Databases (AMIS SIG 14...
Introducing NoSQL and MongoDB to complement Relational Databases (AMIS SIG 14...Introducing NoSQL and MongoDB to complement Relational Databases (AMIS SIG 14...
Introducing NoSQL and MongoDB to complement Relational Databases (AMIS SIG 14...Lucas Jellema
 
MongoDB NoSQL database a deep dive -MyWhitePaper
MongoDB  NoSQL database a deep dive -MyWhitePaperMongoDB  NoSQL database a deep dive -MyWhitePaper
MongoDB NoSQL database a deep dive -MyWhitePaperRajesh Kumar
 
ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...
ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...
ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...mdn13
 
Tugas 4 0317-fahreza yozi-1612510832 -
Tugas 4 0317-fahreza yozi-1612510832 - Tugas 4 0317-fahreza yozi-1612510832 -
Tugas 4 0317-fahreza yozi-1612510832 - fahreza yozi
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big DataHaluan Irsad
 
Tracxn Research - Mobile Advertising Landscape, February 2017
Tracxn Research - Mobile Advertising Landscape, February 2017Tracxn Research - Mobile Advertising Landscape, February 2017
Tracxn Research - Mobile Advertising Landscape, February 2017Tracxn
 
La ilustración narrativa
La ilustración narrativaLa ilustración narrativa
La ilustración narrativaJavier García
 
Migrating to Amazon RDS with Database Migration Service
Migrating to Amazon RDS with Database Migration ServiceMigrating to Amazon RDS with Database Migration Service
Migrating to Amazon RDS with Database Migration ServiceAmazon Web Services
 
團隊開發永遠的痛 談導入團隊開發的共同規範(Final)
團隊開發永遠的痛   談導入團隊開發的共同規範(Final)團隊開發永遠的痛   談導入團隊開發的共同規範(Final)
團隊開發永遠的痛 談導入團隊開發的共同規範(Final)Gelis Wu
 
Fundamentos de liderazgo medico.
Fundamentos de liderazgo medico.Fundamentos de liderazgo medico.
Fundamentos de liderazgo medico.Jorge E. Valdez
 

Viewers also liked (15)

System testing
System testingSystem testing
System testing
 
Comparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statementsComparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statements
 
Tracxn Research - Finance & Accounting Landscape, February 2017
Tracxn Research - Finance & Accounting Landscape, February 2017Tracxn Research - Finance & Accounting Landscape, February 2017
Tracxn Research - Finance & Accounting Landscape, February 2017
 
Introducing NoSQL and MongoDB to complement Relational Databases (AMIS SIG 14...
Introducing NoSQL and MongoDB to complement Relational Databases (AMIS SIG 14...Introducing NoSQL and MongoDB to complement Relational Databases (AMIS SIG 14...
Introducing NoSQL and MongoDB to complement Relational Databases (AMIS SIG 14...
 
MongoDB NoSQL database a deep dive -MyWhitePaper
MongoDB  NoSQL database a deep dive -MyWhitePaperMongoDB  NoSQL database a deep dive -MyWhitePaper
MongoDB NoSQL database a deep dive -MyWhitePaper
 
ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...
ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...
ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Tugas 4 0317-fahreza yozi-1612510832 -
Tugas 4 0317-fahreza yozi-1612510832 - Tugas 4 0317-fahreza yozi-1612510832 -
Tugas 4 0317-fahreza yozi-1612510832 -
 
BANSDOC
BANSDOCBANSDOC
BANSDOC
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 
Tracxn Research - Mobile Advertising Landscape, February 2017
Tracxn Research - Mobile Advertising Landscape, February 2017Tracxn Research - Mobile Advertising Landscape, February 2017
Tracxn Research - Mobile Advertising Landscape, February 2017
 
La ilustración narrativa
La ilustración narrativaLa ilustración narrativa
La ilustración narrativa
 
Migrating to Amazon RDS with Database Migration Service
Migrating to Amazon RDS with Database Migration ServiceMigrating to Amazon RDS with Database Migration Service
Migrating to Amazon RDS with Database Migration Service
 
團隊開發永遠的痛 談導入團隊開發的共同規範(Final)
團隊開發永遠的痛   談導入團隊開發的共同規範(Final)團隊開發永遠的痛   談導入團隊開發的共同規範(Final)
團隊開發永遠的痛 談導入團隊開發的共同規範(Final)
 
Fundamentos de liderazgo medico.
Fundamentos de liderazgo medico.Fundamentos de liderazgo medico.
Fundamentos de liderazgo medico.
 

Similar to presentation on Virus

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirussandipslides
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirussandipslides
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 

Similar to presentation on Virus (20)

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus
VirusVirus
Virus
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 

More from Abdullah-Al- Mahmud

More from Abdullah-Al- Mahmud (7)

Voice Change
Voice ChangeVoice Change
Voice Change
 
Transformation of sentences
Transformation of sentencesTransformation of sentences
Transformation of sentences
 
Tag questions
Tag questionsTag questions
Tag questions
 
Table of degree
Table of degreeTable of degree
Table of degree
 
Narration
NarrationNarration
Narration
 
Motherboard components and their functions
Motherboard components and their functionsMotherboard components and their functions
Motherboard components and their functions
 
Data vs information
Data vs informationData vs information
Data vs information
 

Recently uploaded

How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfIdiosysTechnologies1
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 

Recently uploaded (20)

How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdf
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 

presentation on Virus

  • 1. COURSE PRESENTATION Dept. of Information Science & Library Management University of Rajshahi Presented by: Abdullah-Al-Mahmud Roll:13112956 Session: 2012-13 almahmudru888@gmail.com
  • 2. PRESENTATION TOPIC :  Virus  Types of Virus  Troubleshooting a virus affected PC
  • 3. Computer Virus  virus is a malware program  is able to copy itself  infect a computer without the permission of the user and interfere in computer operation  may corrupt or delete data on computer, make slow the system, take control and even erase everything on the hard disk.  Viruses can spread through the attachments in e-mails, instants messages from one computer to another computer. Random browsing and downloading from Internet is another cause of virus infecting. ( access)
  • 4. Types of virus: Computer viruses are different in types. Such as: File deleting virus: caused permanent damage of critical files which are a part of operating system or data files. Boot sector virus: It infects the hard disk. When the computer is turned on, the virus launches immediately and is loaded into memory, enabling it to control the computer. Macro virus: A macro virus is a computer virus that infects document files (MS Word), spreadsheet file (MS Excel) or presentation file (MS PowerPoint) and causes a sequence of actions to be performed automatically when the application is started. (Packaged)
  • 5. Trojan Horse: A Trojan horse virus is so named due to fact that the actual malicious software is programmed inside an innocent piece of software. Trojan horses do not replicate themselves like other viruses. This virus can delete data, blocking data, modifying data, copying data and disrupting the performance of computers. Hackers use Trojan for stealing important information such as credit card number, passwords etc. Retrovirus: Retrovirus is another type of virus which tries to attack and disable the anti-virus application running on the computer. A retrovirus can be considered as anti-antivirus. Rootkit virus: Rootkit themselves are not harmful; they are simply used to hide malware. Rootkit allow viruses and malware to hide by disguising as necessary files that antivirus software will overlook. Mass Mailer Viruses: Mass Mailer Viruses search e-mail programs like MS outlook for e-mail addresses which are stored in the address book and replicate by e-mailing themselves to the addresses stored in the address book of the e-mail program
  • 6. Symptoms:  Slow performance  File missing  Few programs don’t work  Unusual error message  Take much time in starting  Extra files  Anti-virus is disable
  • 7. How to Troubleshoot a Virus affected PC:  Method 1: System Restore  Method 2: Scans  Method 3: Clean install
  • 8. Troubleshoot viruses through Anti-viruses: Step 1: Back up data Before starting the virus removal process, we have to make sure that all of our important data is backed up. Step 2: Install anti-virus The computer should already have an anti-virus program installed. But if don’t then it should ensure to have an anti-virus. There are many free and commercial anti-viruses available in the market. Highly used and reliable anti-viruses are Norton, McAfee, Vipre, Kaspersky, Avast, Panda, Avira, Microsoft Security Essentials etc. It also required a few anti-malware programs. Steps 3: reboot in save mode In order for a virus to do anything, it needs to be run. Safe mode only loads the most essential files for windows to run, which may stop almost all virus from activating. This will allow identify and remove them.
  • 9. Step 4: scans Run a full system scan with anti-virus program that is already installed. After finishing virus scan run each additional anti-malware scans. Each program is capable of removing any infections it finds. Step 5: test the computer After the scans have all completed, reboot normally and test computer’s performance. Run web-browser and other programs to ensure that the virus infection is gone. We know prevention is better than cure. To help avoid computer viruses its essential to stay informed about the recent threats, avoid browsing and downloading from unauthorized sites and take immediate scan when connect with any unknown device like pendrive.