SlideShare a Scribd company logo
• Yastee A. Shah
By:
Program/piece of code that is loaded
onto your computer without your
knowledge & runs against your
wishes.
Has ability to make copies by itself,
which attacks itself to other
applications and files.
All viruses are man-made.
There are many types of virus..
 Boot virus: Affects the boot sector of a floppy or hard disk
(crucial part where information on the disk itself is stored together
with a program that makes it possible to boot computer from the
disk.).
The best way of avoiding boot viruses is to ensure that floppy disks
are write-protected and never start your computer with an unknown
floppy disk in the disk drive.
Examples of boot viruses include: Polyboot.B, AntiEXE.

 Program Virus: Infects program files, with
extinction as .COM,.EXE,.DLL,.SYS,.SRC etc.
Program files are attractive targets because they
are widely used and have relatively simple
formats to which virus can attack themselves.
 Macro virus: Infect files that are created using
certain programs that contain macros. These
mini-programs make it possible to automate
series of operations so that they are performed as
a single action.
Examples of macro viruses: Relax, Melissa. A,
Babbles, O97M/Y2K.
 Directory virus
 Polymorphic virus
 Encrypted virus
 Stealth virus
 Worm
 Trojans
 Cookies etc.
Virus tries to take control of system it
has infected at the first opportunity
available.
It is linked to the host object in such a
way that it activates when host object is
used.
Then , virus looks for other suitable
carrier objects and attacks itself to them.
With this dependency, virus slows down
system.
Slow Down
The
Network
Hijack your
Computer
Delete
Data
Disable
Hardware
Corrupt
Data
Display
messages
Steal Data
Downloaded Programs
Cracked Software
Email Attachments
Internet
Booting from CD
~Whether you saw a message saying a virus
was detected, or your computer just seems
slow and unreliable, you’ll want to scan for
malware on your PC and remove any you
find.
Computer program intended to identify
& eliminate computer virus.
Antivirus program runs in RAM of the
system.
There are mainly 2 types of anti-virus:
Specific.
Generic.
Antivirus application maintains
database of known virus & compare
scanned files that match
characteristics of known virus.
If scanned files matches those
characteristics of virus, it is moved to
separate place so that it cannot affect
other files on your system and can be
used if ever needed.
HOW DOES ANTIVIRUS
WORKS..
 Providing regular updates for virus
dictionary. Antivirus program should
provide free virus updates on periodic
basis.
https://www.microsoft.com/aspx
https://www.privacyrights.org/
http://www.webopedia.com/virus.html
http://www.avast.com/c-computer-virus
http:/google.com/
Types of virus and saviour

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virus
JoydipGhosh12
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Imran Khan
 
Computer virus
Computer virusComputer virus
Computer virus
hrithikjha
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Virus
VirusVirus
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
abdullah shahzad
 
Virus
VirusVirus
Virus and worms
Virus and wormsVirus and worms
Virus and worms
Vikas Sharma
 
As computer virus
As computer virusAs computer virus
As computer virus
achal bisht
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
Computer Virus
Computer VirusComputer Virus
computer virus
computer viruscomputer virus
computer virus
Kunal Yadav
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Viruses ppt
Viruses pptViruses ppt
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
rishi ram khanal
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Virus
VirusVirus
Virus
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Virus
VirusVirus
Virus
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
As computer virus
As computer virusAs computer virus
As computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computer virus
computer viruscomputer virus
computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 

Similar to Types of virus and saviour

Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
Dara Corporates
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
Muhammad Ramzan
 
Computer virus
Computer virusComputer virus
Computer virus
Rahul Baghla
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
Anuj Pawar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
 
Virus
VirusVirus
Virus
dddaou
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
Prasad Athukorala
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
T.J. Schiel
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
Prem Kumar Bonam
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 

Similar to Types of virus and saviour (20)

Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 

More from Yastee Shah

AWT.pptx
AWT.pptxAWT.pptx
AWT.pptx
Yastee Shah
 
jdbc vs hibernate.pptx
jdbc vs hibernate.pptxjdbc vs hibernate.pptx
jdbc vs hibernate.pptx
Yastee Shah
 
FIND MINIMUM TIME TO FINISH ALL JOBS WITH GIVEN CONSTRAINTS.pptx
FIND MINIMUM TIME TO FINISH ALL JOBS WITH GIVEN CONSTRAINTS.pptxFIND MINIMUM TIME TO FINISH ALL JOBS WITH GIVEN CONSTRAINTS.pptx
FIND MINIMUM TIME TO FINISH ALL JOBS WITH GIVEN CONSTRAINTS.pptx
Yastee Shah
 
Application of Queue.pptx
Application of Queue.pptxApplication of Queue.pptx
Application of Queue.pptx
Yastee Shah
 
Edison's work habits and thinking about failure.pptx
Edison's work habits and thinking about failure.pptxEdison's work habits and thinking about failure.pptx
Edison's work habits and thinking about failure.pptx
Yastee Shah
 
Smart grid.pptx
Smart grid.pptxSmart grid.pptx
Smart grid.pptx
Yastee Shah
 
Html vs xhtml
Html vs xhtmlHtml vs xhtml
Html vs xhtml
Yastee Shah
 
Raid
RaidRaid
Water Level Indicator
Water Level IndicatorWater Level Indicator
Water Level Indicator
Yastee Shah
 
Output devices
Output devicesOutput devices
Output devices
Yastee Shah
 
Math
MathMath

More from Yastee Shah (11)

AWT.pptx
AWT.pptxAWT.pptx
AWT.pptx
 
jdbc vs hibernate.pptx
jdbc vs hibernate.pptxjdbc vs hibernate.pptx
jdbc vs hibernate.pptx
 
FIND MINIMUM TIME TO FINISH ALL JOBS WITH GIVEN CONSTRAINTS.pptx
FIND MINIMUM TIME TO FINISH ALL JOBS WITH GIVEN CONSTRAINTS.pptxFIND MINIMUM TIME TO FINISH ALL JOBS WITH GIVEN CONSTRAINTS.pptx
FIND MINIMUM TIME TO FINISH ALL JOBS WITH GIVEN CONSTRAINTS.pptx
 
Application of Queue.pptx
Application of Queue.pptxApplication of Queue.pptx
Application of Queue.pptx
 
Edison's work habits and thinking about failure.pptx
Edison's work habits and thinking about failure.pptxEdison's work habits and thinking about failure.pptx
Edison's work habits and thinking about failure.pptx
 
Smart grid.pptx
Smart grid.pptxSmart grid.pptx
Smart grid.pptx
 
Html vs xhtml
Html vs xhtmlHtml vs xhtml
Html vs xhtml
 
Raid
RaidRaid
Raid
 
Water Level Indicator
Water Level IndicatorWater Level Indicator
Water Level Indicator
 
Output devices
Output devicesOutput devices
Output devices
 
Math
MathMath
Math
 

Recently uploaded

Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Types of virus and saviour

  • 1. • Yastee A. Shah By:
  • 2.
  • 3.
  • 4. Program/piece of code that is loaded onto your computer without your knowledge & runs against your wishes. Has ability to make copies by itself, which attacks itself to other applications and files. All viruses are man-made.
  • 5. There are many types of virus..  Boot virus: Affects the boot sector of a floppy or hard disk (crucial part where information on the disk itself is stored together with a program that makes it possible to boot computer from the disk.). The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive. Examples of boot viruses include: Polyboot.B, AntiEXE. 
  • 6.  Program Virus: Infects program files, with extinction as .COM,.EXE,.DLL,.SYS,.SRC etc. Program files are attractive targets because they are widely used and have relatively simple formats to which virus can attack themselves.  Macro virus: Infect files that are created using certain programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action. Examples of macro viruses: Relax, Melissa. A, Babbles, O97M/Y2K.
  • 7.  Directory virus  Polymorphic virus  Encrypted virus  Stealth virus  Worm  Trojans  Cookies etc.
  • 8. Virus tries to take control of system it has infected at the first opportunity available. It is linked to the host object in such a way that it activates when host object is used. Then , virus looks for other suitable carrier objects and attacks itself to them. With this dependency, virus slows down system.
  • 10. Downloaded Programs Cracked Software Email Attachments Internet Booting from CD
  • 11. ~Whether you saw a message saying a virus was detected, or your computer just seems slow and unreliable, you’ll want to scan for malware on your PC and remove any you find.
  • 12.
  • 13.
  • 14. Computer program intended to identify & eliminate computer virus. Antivirus program runs in RAM of the system. There are mainly 2 types of anti-virus: Specific. Generic.
  • 15. Antivirus application maintains database of known virus & compare scanned files that match characteristics of known virus. If scanned files matches those characteristics of virus, it is moved to separate place so that it cannot affect other files on your system and can be used if ever needed.
  • 17.  Providing regular updates for virus dictionary. Antivirus program should provide free virus updates on periodic basis.
  • 18.
  • 19.