The document discusses computer viruses, how they spread and affect systems. It describes how the first virus, called "Creeper, was created in 1970s and outlines common ways viruses enter systems like through email attachments. Different virus types are outlined like memory resident viruses, boot sector viruses and macro viruses that hide in various parts of the system. Symptoms of virus infection and basic prevention tips are provided.
OBJECTIVES
Introduction
What Is Virus?
Why Virus Are Called “Virus”?
How Do Virus Spread?
Virus Operation
How Virus work?
Common Virus Entry Points
Symptoms Of Virus Attack
Types of Computer Virus
Techniques used by Viruses
Anti-Virus Software
Methods used by Antivirus Software
Actions to Prevent Virus Infection
Conclusion
OBJECTIVES
Introduction
What Is Virus?
Why Virus Are Called “Virus”?
How Do Virus Spread?
Virus Operation
How Virus work?
Common Virus Entry Points
Symptoms Of Virus Attack
Types of Computer Virus
Techniques used by Viruses
Anti-Virus Software
Methods used by Antivirus Software
Actions to Prevent Virus Infection
Conclusion
1. What is a computer security risk?
2. Virus
3. Trojan Horse
4. Worms
5. Stand-Alone Utility Programs
6. How can a virus spread through an e-mail message?
7. How does an antivirus program inoculate a program file
?
8. What is a firewall?
.
The primary difference between a virus and a worm is that viruses must be triggered by the activation of their host; whereas worms are stand-alone malicious programs that can self-replicate and propagate independently as soon as they have breached the system.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
3. Computer viruses are a type of
software program that, like a
biological virus, reproduces and
spreads itself.
Some virus may display only a
message on the screen, others
may slow down the Pc.
They can also erase files or
even format your floppy or hard
disk and crash the system.
4. Rich Skrenta
The first computer
virus was called
‘Creeper’. It was
invented in the early
1970s.
Since then, millions
of viruses have
been invented. The
first know computer
virus was written in
1981 by a man
named Rich
Skrenta.
5. Accepting without reading
Opening e-mail attachments
Downloading infected software
By installing infected files
6. Sharing infected files through pen
drive, memory card or Bluetooth
Browsing without anti virus
Logging in to account from a link
received in e -mail, IM, or social
networking
7. Letters look like they are falling to the
bottom of screen
The computer system become slow
The size of available free memory
reduces
The hard disk run out of space
The computer does not boot
File got missing
File turn into short cut
8. Virus programs can be stored in secondary storage
such as a hard drive, flash drive, floppy disk or CD
and DVD disks like other programs.
Viruses can and do reside in RAM, but the virus
programs are lost when the power is turned off.
Typically a computer virus is a program that can
copy itself.
9. There are different types of viruses. They are :
Memory Resident Viruses
Boot Sector Viruses
Macro VIRUS
Multipartite Virus
Worms
Trojans
and many more…………….
10. These viruses fix themselves in the computer memory and get
activated whenever the OS runs and infects all the files that
there are opened.
HIDEOUT :- These type of virus hides in the RAM and stays
there even after the malicious code is executed. It gets control
over the system memory and allocate memory blocks through
which it runs its own code, and executes the code when any
function is executed.
TARGET :- It can corrupt files and programs that are opened
closed, copied, renamed etc.
EXAMPLES :- Randex, CMJ etc.
11. This type of virus affects the boot sector of a hard disk. This is
a crucial part of the disk, in which information of the disk
itself is stored along with a program that makes it possible to
boot the computer from the disk. This type of virus is also
called Master Boot Sector Virus or Master Boot Record
Virus.
HIDEOUT :- It hides in the memory unit DOS accesses the
floppy disk, and whichever boot data is accessed, the virus
infects it.
EXAMPLES :- Polyboot.B, AntiEXE etc.
12. A macro virus is a computer virus that alters or replaces a macro,
which is a set of commands used by programs to perform
common actions.
For example, the “open document action” in many word
processing programs relies on a macro to function, since there
are several discrete steps in the process.
HIDEOUT :- These hide in documents that are shared via e-mail
or networks.
EXAMPLES :- Relax, Melissa.A, Bablas, 097M/Y2K
13. These type of viruses spared in multiple ways
possible. It may vary in its action depending upon
the operating system installed and the presence of
certain files.
HIDEOUT:- In the initial phase, these viruses tend
to hide in the memory as the resident viruses do,
then they infect the hard disk.
EXAMPLES :- Invader, Flip etc.
14. A worm is a program very similar to a virus, it has
the ability to self-replicate and can lead to negative
effects on your system.
HIDEOUT:- This generally spread through e-mails
and networks. They do not infects files or damage
them, but they replicate so fast that the entire
network may collapse.
EXAMPLES :- PSWBugbear.B, Lovagate.F etc.
15. Another unsavory breed of malicious code are
trojan or trojan hores, which unlike viruses, do
not reproduce by infecting other file, not do
they self-replicate like worms. Infect it is a
program which disguises itself as a useful
program or application.
16. Install quality antivirus
Perform daily scans
Don't click on email links or attachments
Try to avoid downloading and installing software
from the internet
Regularly update the program