SlideShare a Scribd company logo
Nasrin 
Akter 
Shahidul 
Islam 
Sheikh 
Mohammad 
Tamim 
Azizur 
Rahman
 Computer viruses are a type of 
software program that, like a 
biological virus, reproduces and 
spreads itself. 
 Some virus may display only a 
message on the screen, others 
may slow down the Pc. 
 They can also erase files or 
even format your floppy or hard 
disk and crash the system.
Rich Skrenta 
The first computer 
virus was called 
‘Creeper’. It was 
invented in the early 
1970s. 
Since then, millions 
of viruses have 
been invented. The 
first know computer 
virus was written in 
1981 by a man 
named Rich 
Skrenta.
 Accepting without reading 
 Opening e-mail attachments 
 Downloading infected software 
 By installing infected files
 Sharing infected files through pen 
drive, memory card or Bluetooth 
 Browsing without anti virus 
 Logging in to account from a link 
received in e -mail, IM, or social 
networking
 Letters look like they are falling to the 
bottom of screen 
 The computer system become slow 
 The size of available free memory 
reduces 
 The hard disk run out of space 
 The computer does not boot 
 File got missing 
 File turn into short cut
Virus programs can be stored in secondary storage 
such as a hard drive, flash drive, floppy disk or CD 
and DVD disks like other programs. 
Viruses can and do reside in RAM, but the virus 
programs are lost when the power is turned off. 
Typically a computer virus is a program that can 
copy itself.
There are different types of viruses. They are : 
 Memory Resident Viruses 
 Boot Sector Viruses 
 Macro VIRUS 
 Multipartite Virus 
 Worms 
 Trojans 
and many more…………….
These viruses fix themselves in the computer memory and get 
activated whenever the OS runs and infects all the files that 
there are opened. 
HIDEOUT :- These type of virus hides in the RAM and stays 
there even after the malicious code is executed. It gets control 
over the system memory and allocate memory blocks through 
which it runs its own code, and executes the code when any 
function is executed. 
TARGET :- It can corrupt files and programs that are opened 
closed, copied, renamed etc. 
EXAMPLES :- Randex, CMJ etc.
This type of virus affects the boot sector of a hard disk. This is 
a crucial part of the disk, in which information of the disk 
itself is stored along with a program that makes it possible to 
boot the computer from the disk. This type of virus is also 
called Master Boot Sector Virus or Master Boot Record 
Virus. 
HIDEOUT :- It hides in the memory unit DOS accesses the 
floppy disk, and whichever boot data is accessed, the virus 
infects it. 
EXAMPLES :- Polyboot.B, AntiEXE etc.
A macro virus is a computer virus that alters or replaces a macro, 
which is a set of commands used by programs to perform 
common actions. 
For example, the “open document action” in many word 
processing programs relies on a macro to function, since there 
are several discrete steps in the process. 
HIDEOUT :- These hide in documents that are shared via e-mail 
or networks. 
EXAMPLES :- Relax, Melissa.A, Bablas, 097M/Y2K
These type of viruses spared in multiple ways 
possible. It may vary in its action depending upon 
the operating system installed and the presence of 
certain files. 
HIDEOUT:- In the initial phase, these viruses tend 
to hide in the memory as the resident viruses do, 
then they infect the hard disk. 
EXAMPLES :- Invader, Flip etc.
A worm is a program very similar to a virus, it has 
the ability to self-replicate and can lead to negative 
effects on your system. 
HIDEOUT:- This generally spread through e-mails 
and networks. They do not infects files or damage 
them, but they replicate so fast that the entire 
network may collapse. 
EXAMPLES :- PSWBugbear.B, Lovagate.F etc.
Another unsavory breed of malicious code are 
trojan or trojan hores, which unlike viruses, do 
not reproduce by infecting other file, not do 
they self-replicate like worms. Infect it is a 
program which disguises itself as a useful 
program or application.
 Install quality antivirus 
 Perform daily scans 
 Don't click on email links or attachments 
 Try to avoid downloading and installing software 
from the internet 
 Regularly update the program
Different Types of Anti-Viruses …
 Computer virus

More Related Content

What's hot

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer Virus
Computer VirusComputer Virus
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Computer virus
Computer virusComputer virus
Computer virus
Sammer Khizer
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Annies Minu
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Computer virus
Computer virusComputer virus
Computer virus
Walden University
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Similar to Computer virus

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
Prasad Athukorala
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
Prem Kumar Bonam
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 

Similar to Computer virus (20)

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 

More from Kawsar Ahmed

System software is creating a modern world
System software is creating a modern world System software is creating a modern world
System software is creating a modern world
Kawsar Ahmed
 
Algorithm Design Presentation
Algorithm Design PresentationAlgorithm Design Presentation
Algorithm Design Presentation
Kawsar Ahmed
 
Flow chart
Flow chartFlow chart
Flow chart
Kawsar Ahmed
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Kawsar Ahmed
 
Application software
Application softwareApplication software
Application softwareKawsar Ahmed
 

More from Kawsar Ahmed (7)

System software is creating a modern world
System software is creating a modern world System software is creating a modern world
System software is creating a modern world
 
Algorithm Design Presentation
Algorithm Design PresentationAlgorithm Design Presentation
Algorithm Design Presentation
 
Flow chart
Flow chartFlow chart
Flow chart
 
mmmmmmm
mmmmmmmmmmmmmm
mmmmmmm
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Application software
Application softwareApplication software
Application software
 
Computer security
Computer securityComputer security
Computer security
 

Recently uploaded

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 

Recently uploaded (20)

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 

Computer virus

  • 1.
  • 2. Nasrin Akter Shahidul Islam Sheikh Mohammad Tamim Azizur Rahman
  • 3.  Computer viruses are a type of software program that, like a biological virus, reproduces and spreads itself.  Some virus may display only a message on the screen, others may slow down the Pc.  They can also erase files or even format your floppy or hard disk and crash the system.
  • 4. Rich Skrenta The first computer virus was called ‘Creeper’. It was invented in the early 1970s. Since then, millions of viruses have been invented. The first know computer virus was written in 1981 by a man named Rich Skrenta.
  • 5.  Accepting without reading  Opening e-mail attachments  Downloading infected software  By installing infected files
  • 6.  Sharing infected files through pen drive, memory card or Bluetooth  Browsing without anti virus  Logging in to account from a link received in e -mail, IM, or social networking
  • 7.  Letters look like they are falling to the bottom of screen  The computer system become slow  The size of available free memory reduces  The hard disk run out of space  The computer does not boot  File got missing  File turn into short cut
  • 8. Virus programs can be stored in secondary storage such as a hard drive, flash drive, floppy disk or CD and DVD disks like other programs. Viruses can and do reside in RAM, but the virus programs are lost when the power is turned off. Typically a computer virus is a program that can copy itself.
  • 9. There are different types of viruses. They are :  Memory Resident Viruses  Boot Sector Viruses  Macro VIRUS  Multipartite Virus  Worms  Trojans and many more…………….
  • 10. These viruses fix themselves in the computer memory and get activated whenever the OS runs and infects all the files that there are opened. HIDEOUT :- These type of virus hides in the RAM and stays there even after the malicious code is executed. It gets control over the system memory and allocate memory blocks through which it runs its own code, and executes the code when any function is executed. TARGET :- It can corrupt files and programs that are opened closed, copied, renamed etc. EXAMPLES :- Randex, CMJ etc.
  • 11. This type of virus affects the boot sector of a hard disk. This is a crucial part of the disk, in which information of the disk itself is stored along with a program that makes it possible to boot the computer from the disk. This type of virus is also called Master Boot Sector Virus or Master Boot Record Virus. HIDEOUT :- It hides in the memory unit DOS accesses the floppy disk, and whichever boot data is accessed, the virus infects it. EXAMPLES :- Polyboot.B, AntiEXE etc.
  • 12. A macro virus is a computer virus that alters or replaces a macro, which is a set of commands used by programs to perform common actions. For example, the “open document action” in many word processing programs relies on a macro to function, since there are several discrete steps in the process. HIDEOUT :- These hide in documents that are shared via e-mail or networks. EXAMPLES :- Relax, Melissa.A, Bablas, 097M/Y2K
  • 13. These type of viruses spared in multiple ways possible. It may vary in its action depending upon the operating system installed and the presence of certain files. HIDEOUT:- In the initial phase, these viruses tend to hide in the memory as the resident viruses do, then they infect the hard disk. EXAMPLES :- Invader, Flip etc.
  • 14. A worm is a program very similar to a virus, it has the ability to self-replicate and can lead to negative effects on your system. HIDEOUT:- This generally spread through e-mails and networks. They do not infects files or damage them, but they replicate so fast that the entire network may collapse. EXAMPLES :- PSWBugbear.B, Lovagate.F etc.
  • 15. Another unsavory breed of malicious code are trojan or trojan hores, which unlike viruses, do not reproduce by infecting other file, not do they self-replicate like worms. Infect it is a program which disguises itself as a useful program or application.
  • 16.  Install quality antivirus  Perform daily scans  Don't click on email links or attachments  Try to avoid downloading and installing software from the internet  Regularly update the program
  • 17. Different Types of Anti-Viruses …