SlideShare a Scribd company logo
Viruses allow the intruders to access the computer
system and resources. Viruses enter into the computer
system without the user’s permission or knowledge.
Viruses are computer programme that can replicate
itself and infect the computer.
The purpose of virus may be destructive. It includes
slow down the computer system and destroying the hard
disk.
Structure of Virus
Virus
Replication Payload Trigger
It describes the way in which virus spread .
It is the first stage through which the virus propagates.
Virus mainly spread through email attachments or
viruses attach them to the download such as movie etc.
It contain intended action or actual purpose.
The payload can create accidental or intentional
damage.
It describe the mechanism by which payload is activated.
The payload is triggered or activated on same conditions
which include certain date or time, opening an email
attachment etc.
Trigger component us related to infection mechanism
means that virus needs to be executed.
Virus
Dormant
Phase
Propagation
Phase
Triggering
Phase
Executing
Phase
 Dormant Phase
In this phase virus remains idle. It includes that virus
doing nothing until the user executes the file
 Propagation Phase
In this phase virus gets activated and starts replicating
itself. In this virus places a copy of itself into another
programme or into certain areas in the disk.
In this virus executed its payload. In this virus performs
the actual function which may be harmful.
In this virus gets activated to perform the function for
which it was intended. The event for which virus was
waiting gets initialized
Types of
virus
Boot Sector
Virus
Partite or
Multi
Partite
Virus
Stealth
Virus
Macro
Virus
File
Infector
Virus
File Infector virus
These type of virus attach themselves to files or these
virus basically attack the executable file. It is further
divided into different categories:-
Direct Action File Infector
Resident Infectors
Boot Sector Virus
This virus is always executed and locate in the memory
when the system start. It infects the hard drive of the
computer. These virus replace boot sector programme
with corrupted version.
Macro Virus
It is a virus that is written in macro language. Macro
language is mixed with software application like MS-
Word and MS-Excel.
These virus infect both boot sector and programme files. It
is difficult to repair. In this boot area and files must both
be cleaned of virus or re-infection will occur.
In this movement of virus is quite and careful in order not
to be seen or heard
Tips to Combat Virus
The operating system, applications and software of
computer system should be update.
Firewalls should be used.
Anti-virus must be installed in the computer system.
E –mail programme should not be set to auto run
attachment.
Each file and software should be scanned before
downloading.
Virus

More Related Content

What's hot

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
Rc Os
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Computer virus
 Computer virus Computer virus
Computer virus
Kawsar Ahmed
 
Adware
AdwareAdware
Adware
Avani Patel
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
culltdueet65
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
srivijaymanickam
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Computer virus
Computer virusComputer virus
Computer virus
Aarya Khanal
 
Presentation on Computer Software.ppt
Presentation on Computer Software.pptPresentation on Computer Software.ppt
Presentation on Computer Software.ppt
Daffodil International University
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 

What's hot (20)

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Adware
AdwareAdware
Adware
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Computer virus
Computer virusComputer virus
Computer virus
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on Computer Software.ppt
Presentation on Computer Software.pptPresentation on Computer Software.ppt
Presentation on Computer Software.ppt
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 

Similar to Virus

Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & MalwareT.J. Schiel
 
Viruses ppt
Viruses pptViruses ppt
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarnnimmi_abes
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
 
Computer virus
Computer virusComputer virus
Computer virus
Muhammad Umar Farooq
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
Jose Manuel Acosta
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
Virus
VirusVirus
Virus
dddaou
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
SridharChowdary10
 

Similar to Virus (20)

Virus
VirusVirus
Virus
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 

More from Sapna Gupta

Hospitality sector
Hospitality sectorHospitality sector
Hospitality sector
Sapna Gupta
 
Business law
Business lawBusiness law
Business law
Sapna Gupta
 
Nestle marketing mix
Nestle marketing mixNestle marketing mix
Nestle marketing mix
Sapna Gupta
 
Financial mgt.
Financial mgt.Financial mgt.
Financial mgt.
Sapna Gupta
 
Organising
OrganisingOrganising
Organising
Sapna Gupta
 
Winding up
Winding upWinding up
Winding up
Sapna Gupta
 
Wto & gatt
Wto & gattWto & gatt
Wto & gatt
Sapna Gupta
 
Balanced scorecard and fund flow statement
Balanced scorecard and fund flow statementBalanced scorecard and fund flow statement
Balanced scorecard and fund flow statement
Sapna Gupta
 
Presentation on Google pay
Presentation on Google payPresentation on Google pay
Presentation on Google pay
Sapna Gupta
 
Ndtl (Net deamnd and time liability)
Ndtl (Net deamnd and time liability)Ndtl (Net deamnd and time liability)
Ndtl (Net deamnd and time liability)
Sapna Gupta
 

More from Sapna Gupta (10)

Hospitality sector
Hospitality sectorHospitality sector
Hospitality sector
 
Business law
Business lawBusiness law
Business law
 
Nestle marketing mix
Nestle marketing mixNestle marketing mix
Nestle marketing mix
 
Financial mgt.
Financial mgt.Financial mgt.
Financial mgt.
 
Organising
OrganisingOrganising
Organising
 
Winding up
Winding upWinding up
Winding up
 
Wto & gatt
Wto & gattWto & gatt
Wto & gatt
 
Balanced scorecard and fund flow statement
Balanced scorecard and fund flow statementBalanced scorecard and fund flow statement
Balanced scorecard and fund flow statement
 
Presentation on Google pay
Presentation on Google payPresentation on Google pay
Presentation on Google pay
 
Ndtl (Net deamnd and time liability)
Ndtl (Net deamnd and time liability)Ndtl (Net deamnd and time liability)
Ndtl (Net deamnd and time liability)
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Virus

  • 1.
  • 2. Viruses allow the intruders to access the computer system and resources. Viruses enter into the computer system without the user’s permission or knowledge. Viruses are computer programme that can replicate itself and infect the computer. The purpose of virus may be destructive. It includes slow down the computer system and destroying the hard disk.
  • 4. It describes the way in which virus spread . It is the first stage through which the virus propagates. Virus mainly spread through email attachments or viruses attach them to the download such as movie etc.
  • 5. It contain intended action or actual purpose. The payload can create accidental or intentional damage.
  • 6. It describe the mechanism by which payload is activated. The payload is triggered or activated on same conditions which include certain date or time, opening an email attachment etc. Trigger component us related to infection mechanism means that virus needs to be executed.
  • 8.  Dormant Phase In this phase virus remains idle. It includes that virus doing nothing until the user executes the file  Propagation Phase In this phase virus gets activated and starts replicating itself. In this virus places a copy of itself into another programme or into certain areas in the disk.
  • 9. In this virus executed its payload. In this virus performs the actual function which may be harmful. In this virus gets activated to perform the function for which it was intended. The event for which virus was waiting gets initialized
  • 10. Types of virus Boot Sector Virus Partite or Multi Partite Virus Stealth Virus Macro Virus File Infector Virus
  • 11. File Infector virus These type of virus attach themselves to files or these virus basically attack the executable file. It is further divided into different categories:- Direct Action File Infector Resident Infectors
  • 12. Boot Sector Virus This virus is always executed and locate in the memory when the system start. It infects the hard drive of the computer. These virus replace boot sector programme with corrupted version. Macro Virus It is a virus that is written in macro language. Macro language is mixed with software application like MS- Word and MS-Excel.
  • 13. These virus infect both boot sector and programme files. It is difficult to repair. In this boot area and files must both be cleaned of virus or re-infection will occur. In this movement of virus is quite and careful in order not to be seen or heard
  • 14. Tips to Combat Virus The operating system, applications and software of computer system should be update. Firewalls should be used. Anti-virus must be installed in the computer system. E –mail programme should not be set to auto run attachment. Each file and software should be scanned before downloading.