SlideShare a Scribd company logo
1 of 19
Virus
Virus, Worm, Trojan Horse &
Blended Threat
What is a virus?
A virus is a program that replicates itself. It
spreads by making copies of itself on a
computer or by inserting computer code
into program or operating system files.
Viruses don't always damage files or
computers, but they usually affect a
computer's performance and stability. For
a virus to infect a computer or to spread,
you usually have to do something, such as
open an infected e mail attachment.‑
Are all viruses harmful?
Yes, to varying degrees. Virus damage can
range from slowing computer performance
to a loss of information and programs. In
the worst case, viruses delete or modify
information and programs on your
computer. Some e mail viruses send‑
confidential information in messages when
spreading. Even when a virus is not
directly damaging information, the process
of replication can slow your computer and
Internet connection.
What is a worm?
A worm is computer code that spreads without user
interaction. Most worms begin as e mail attachments‑
that infect a computer when they're opened. The worm
scans the infected computer for files, such as address
books, or temporary webpages, that contain e mail‑
addresses. The worm uses the addresses to send
infected e mail, and often mimics (or spoofs) the "From"‑
addresses in subsequent e mail messages so that those‑
infected messages appear to be from someone you
know. Worms then spread automatically through e mail,‑
networks, or operating system vulnerabilities, often
overwhelming those systems before the cause is known.
Worms aren't always destructive to computers, but they
usually cause computer and network performance and
stability problems.
What is a Trojan horse?
A Trojan horse is a malicious software
program that hides inside other programs.
It enters a computer hidden inside a
legitimate program, such as a screen
saver. It then puts code into the operating
system, which enables a hacker to access
the infected computer. Trojan horses do
not usually spread by themselves; they
are spread by viruses, worms, or
downloaded software.
What is a blended threat?
A blended threat is a combination of some
or all of the malicious programs discussed
in the sections above. Blended threats
often begin when someone interacts with
a virus (such as opening an unsafe e mail‑
attachment). The virus automatically
propagates using worm behavior, and
then installs a Trojan horse on the infected
computer.
How do I prevent viruses?
Protecting your computer from viruses and other
threats isn't difficult, but you have to be diligent.
Install an antivirus program. Installing an
antivirus program and keeping it up-to-date can
help defend your computer against viruses.
Antivirus programs scan for viruses trying to get
into your e mail, operating system, or files. New‑
viruses appear daily, so check the antivirus
manufacturer's website frequently for updates.
Most antivirus programs are sold with annual
subscriptions, that can be renewed as needed.
To find an antivirus scanner, visit the Windows
Security software providers webpage.
How do I prevent viruses?
How do I prevent viruses?
 Do not open e - mail attachments. Many viruses are attached to e -
mail messages and will spread as soon as you open the e - mail
attachment. It's best not to open any attachment unless it is something
you are expecting. Microsoft Outlook and Windows Mail help block
potentially dangerous attachments.
 Keep Windows updated. Periodically, Microsoft releases special
security updates that can help protect your computer. These updates
can help prevent viruses and other computer attacks by closing possible
security holes. Make sure that Windows receives these updates by
turning on Windows automatic updating. To learn how, see Turn
automatic updating on or off.
 Use a firewall.‌ Windows Firewall or any other firewall program can help
alert you to suspicious activity if a virus or worm attempts to connect to
your computer. It can also block viruses, worms, and hackers from
attempting to download potentially harmful programs to your computer.
How do I know if your computer has a virus?
If you can answer "yes" to any of the following
questions, your computer might have a virus.
 Is your computer running very slowly? A
common symptom of a virus is much slower
than normal computer performance. However,
there can be other reasons for slow
performance, including a hard disk that needs
defragmenting, a computer that needs more
memory (RAM), or the existence of spyware or
adware. For more information about spyware,
see How to tell if your computer is infected with
spyware.
if your computer has a virus scan through
Anti Virus Programe
How do I know if your computer has a
virus?
 Are you getting unexpected messages, or are
programs starting automatically? Some viruses can
cause damage to Windows or some of your programs.
The results of this damage might include messages
appearing unexpectedly, programs starting or closing
automatically, or Windows shutting down suddenly.
 Is your modem or hard disk working overtime? An e
-mail virus works by sending many copies of itself by e -
mail. One indicator of this is that the activity light on your
broadband or external modem is constantly lit; another is
the sound of your computer's hard disk continually
working. These are not always symptoms of a computer
virus, but when combined with other problems, can
indicate a virus infection.
How do I check for and remove
viruses?
• Here are a few things you can try to remove a computer virus:
 Keep your antivirus program up to date. If you
have already installed an antivirus program on your computer, it's
important that you keep it up to date. Because new viruses are
being written all the time, most antivirus programs are updated
frequently. Check your antivirus program's documentation or visit
their website to learn how to receive updates. Be aware that some
viruses block common antivirus websites, making it so you cannot
go to the website to download antivirus updates. If this happens,
check with your antivirus vendor to see if they have a disc you can
use to install the latest updates. It might be possible for you to
create this disc on a computer that is not infected (for example, on a
friend's computer).
Keep your antivirus program up to date
 Use an online scanner. If you don't have antivirus software
installed, visit the Windows Security Software website for
more information about security and virus prevention. Some
of the sites offer free online scanners which will search your
computer for the latest viruses. These scanners will not
protect you from getting a virus, but they can help find and
remove viruses your computer already has.
 Use the Malicious Software Removal Tool. Microsoft
offers the Malicious Software Removal Tool, which is
updated once a month. The tool scans your computer for
most new viruses and malicious software. After you run the
tool, you will get a report that describes any malicious
software found on your computer and lists all the viruses it
scanned for.
How do I check for and remove
viruses?
Stop a runaway virus. Viruses are often created
specifically to take control of your computer and send copies of
themselves from your computer to other computers. You can usually
tell this is happening if your computer is performing slowly and
accessing the network more frequently than normal. If this is
happening, you should disconnect from the Internet and network (if
you're on one). If you are connected to the Internet through a
physical connection, disconnect the network or phone cable from
your computer. If you're connected to the Internet through a wireless
connection on a laptop, turn off the wireless adapter on the
computer (either by turning off a switch or removing your wireless
adapter card). Once your computer is disconnected from the
Internet, run your antivirus software (from a disc or software on your
computer) to remove the virus.
How do I check for and remove
viruses?
How do I check for and remove
viruses?
Manually remove viruses. Sometimes a virus
must be removed manually. This is often a technical process and
should only be attempted by computer users who have experience
with the Windows registry and who know how to view and delete
system and program files in Windows.
The first step is to identify the virus. Run your antivirus software to
identify the name of the virus. If you don't have an antivirus program,
or if your program does not detect the virus, you can still identify the
virus by looking for clues about how it behaves. Write down the text
in any messages displayed by the virus or, if you received the virus
in e mail, write down the subject line or name of the file attached to‑
the message. Search the antivirus vendor's website for references
to those specific things you wrote down to try to find the name of the
virus and instructions for how to remove it.
What is Data Execution Prevention?
 Data Execution Prevention (DEP) is a security feature
that can help prevent damage to your computer from
viruses and other security threats. Harmful programs can
try to attack Windows by attempting to run (also known
as execute) code from your computer's memory
reserved for Windows and other authorized programs.
These types of attacks can harm your programs and
files.
 DEP can help protect your computer by monitoring your
programs to make sure that they use computer memory
safely. If DEP notices a program on your computer using
memory incorrectly, it closes the program and notifies
you.
Thank You
Presented by MUKUL
Source : Microsoft Windows

More Related Content

What's hot

Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 

What's hot (20)

Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 

Viewers also liked

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Computer viruses
Computer virusesComputer viruses
Computer virusestejaspaliya
 
Buffer Overflow by SecArmour
 Buffer Overflow by SecArmour Buffer Overflow by SecArmour
Buffer Overflow by SecArmourSec Armour
 
Viruses summary
Viruses summaryViruses summary
Viruses summaryrhkelso
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkCisco Canada
 
Computer network
Computer network Computer network
Computer network Shreya Shah
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security ITSTEFFI_MEDINA
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Computer virus
Computer virusComputer virus
Computer virusviji_tgce
 
Collaboration diagram- UML diagram
Collaboration diagram- UML diagram Collaboration diagram- UML diagram
Collaboration diagram- UML diagram Ramakant Soni
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecturesabari Giri
 
Internet architecture
Internet architectureInternet architecture
Internet architectureNaman Rastogi
 
Collaboration Diagram
Collaboration DiagramCollaboration Diagram
Collaboration Diagramfahad_uaar
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 

Viewers also liked (19)

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Buffer Overflow by SecArmour
 Buffer Overflow by SecArmour Buffer Overflow by SecArmour
Buffer Overflow by SecArmour
 
Viruses summary
Viruses summaryViruses summary
Viruses summary
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your Network
 
Computer network
Computer network Computer network
Computer network
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security IT
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Window architecture
Window architecture Window architecture
Window architecture
 
Collaboration diagram- UML diagram
Collaboration diagram- UML diagram Collaboration diagram- UML diagram
Collaboration diagram- UML diagram
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecture
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 
Societal Impact Of IT
Societal Impact Of IT Societal Impact Of IT
Societal Impact Of IT
 
Collaboration Diagram
Collaboration DiagramCollaboration Diagram
Collaboration Diagram
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 

Similar to Virus (20)

Sowmya
SowmyaSowmya
Sowmya
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Virus
VirusVirus
Virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
Virus
VirusVirus
Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus
VirusVirus
Virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 

More from Mukul Kumar

Some Medicinal plants & Their Uses
Some Medicinal plants & Their UsesSome Medicinal plants & Their Uses
Some Medicinal plants & Their UsesMukul Kumar
 
History of computers
History of computersHistory of computers
History of computersMukul Kumar
 
Computer communication
Computer communicationComputer communication
Computer communicationMukul Kumar
 
General principles and processes of isolation of elements
General principles and processes of isolation of elementsGeneral principles and processes of isolation of elements
General principles and processes of isolation of elementsMukul Kumar
 
Wireless computing
Wireless computingWireless computing
Wireless computingMukul Kumar
 
Microsoft office word 2007
Microsoft office word 2007Microsoft office word 2007
Microsoft office word 2007Mukul Kumar
 
Computer generations
Computer generationsComputer generations
Computer generationsMukul Kumar
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addictionMukul Kumar
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addictionMukul Kumar
 
Getting started with paint
Getting started with paintGetting started with paint
Getting started with paintMukul Kumar
 
Parts of computer
Parts of computerParts of computer
Parts of computerMukul Kumar
 
Golden Temple Picture Collection
Golden Temple Picture CollectionGolden Temple Picture Collection
Golden Temple Picture CollectionMukul Kumar
 
Introducing power point 2007
Introducing power point 2007 Introducing power point 2007
Introducing power point 2007 Mukul Kumar
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?Mukul Kumar
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?Mukul Kumar
 
Shri harmandir sahib (Golden Temple) By Sahabad Gurbani Keertan
Shri harmandir sahib  (Golden Temple) By Sahabad Gurbani KeertanShri harmandir sahib  (Golden Temple) By Sahabad Gurbani Keertan
Shri harmandir sahib (Golden Temple) By Sahabad Gurbani KeertanMukul Kumar
 

More from Mukul Kumar (20)

Some Medicinal plants & Their Uses
Some Medicinal plants & Their UsesSome Medicinal plants & Their Uses
Some Medicinal plants & Their Uses
 
The solid state
The solid stateThe solid state
The solid state
 
Printers
PrintersPrinters
Printers
 
History of computers
History of computersHistory of computers
History of computers
 
Computer communication
Computer communicationComputer communication
Computer communication
 
General principles and processes of isolation of elements
General principles and processes of isolation of elementsGeneral principles and processes of isolation of elements
General principles and processes of isolation of elements
 
Wireless computing
Wireless computingWireless computing
Wireless computing
 
Microsoft office word 2007
Microsoft office word 2007Microsoft office word 2007
Microsoft office word 2007
 
Computer generations
Computer generationsComputer generations
Computer generations
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addiction
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addiction
 
Getting started with paint
Getting started with paintGetting started with paint
Getting started with paint
 
Parts of computer
Parts of computerParts of computer
Parts of computer
 
E‑mail
E‑mailE‑mail
E‑mail
 
Golden Temple Picture Collection
Golden Temple Picture CollectionGolden Temple Picture Collection
Golden Temple Picture Collection
 
Introducing power point 2007
Introducing power point 2007 Introducing power point 2007
Introducing power point 2007
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?
 
Shri harmandir sahib (Golden Temple) By Sahabad Gurbani Keertan
Shri harmandir sahib  (Golden Temple) By Sahabad Gurbani KeertanShri harmandir sahib  (Golden Temple) By Sahabad Gurbani Keertan
Shri harmandir sahib (Golden Temple) By Sahabad Gurbani Keertan
 

Recently uploaded

Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 

Recently uploaded (20)

Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 

Virus

  • 1. Virus Virus, Worm, Trojan Horse & Blended Threat
  • 2. What is a virus? A virus is a program that replicates itself. It spreads by making copies of itself on a computer or by inserting computer code into program or operating system files. Viruses don't always damage files or computers, but they usually affect a computer's performance and stability. For a virus to infect a computer or to spread, you usually have to do something, such as open an infected e mail attachment.‑
  • 3. Are all viruses harmful? Yes, to varying degrees. Virus damage can range from slowing computer performance to a loss of information and programs. In the worst case, viruses delete or modify information and programs on your computer. Some e mail viruses send‑ confidential information in messages when spreading. Even when a virus is not directly damaging information, the process of replication can slow your computer and Internet connection.
  • 4. What is a worm? A worm is computer code that spreads without user interaction. Most worms begin as e mail attachments‑ that infect a computer when they're opened. The worm scans the infected computer for files, such as address books, or temporary webpages, that contain e mail‑ addresses. The worm uses the addresses to send infected e mail, and often mimics (or spoofs) the "From"‑ addresses in subsequent e mail messages so that those‑ infected messages appear to be from someone you know. Worms then spread automatically through e mail,‑ networks, or operating system vulnerabilities, often overwhelming those systems before the cause is known. Worms aren't always destructive to computers, but they usually cause computer and network performance and stability problems.
  • 5. What is a Trojan horse? A Trojan horse is a malicious software program that hides inside other programs. It enters a computer hidden inside a legitimate program, such as a screen saver. It then puts code into the operating system, which enables a hacker to access the infected computer. Trojan horses do not usually spread by themselves; they are spread by viruses, worms, or downloaded software.
  • 6. What is a blended threat? A blended threat is a combination of some or all of the malicious programs discussed in the sections above. Blended threats often begin when someone interacts with a virus (such as opening an unsafe e mail‑ attachment). The virus automatically propagates using worm behavior, and then installs a Trojan horse on the infected computer.
  • 7. How do I prevent viruses? Protecting your computer from viruses and other threats isn't difficult, but you have to be diligent. Install an antivirus program. Installing an antivirus program and keeping it up-to-date can help defend your computer against viruses. Antivirus programs scan for viruses trying to get into your e mail, operating system, or files. New‑ viruses appear daily, so check the antivirus manufacturer's website frequently for updates. Most antivirus programs are sold with annual subscriptions, that can be renewed as needed. To find an antivirus scanner, visit the Windows Security software providers webpage.
  • 8. How do I prevent viruses?
  • 9. How do I prevent viruses?  Do not open e - mail attachments. Many viruses are attached to e - mail messages and will spread as soon as you open the e - mail attachment. It's best not to open any attachment unless it is something you are expecting. Microsoft Outlook and Windows Mail help block potentially dangerous attachments.  Keep Windows updated. Periodically, Microsoft releases special security updates that can help protect your computer. These updates can help prevent viruses and other computer attacks by closing possible security holes. Make sure that Windows receives these updates by turning on Windows automatic updating. To learn how, see Turn automatic updating on or off.  Use a firewall.‌ Windows Firewall or any other firewall program can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer.
  • 10. How do I know if your computer has a virus? If you can answer "yes" to any of the following questions, your computer might have a virus.  Is your computer running very slowly? A common symptom of a virus is much slower than normal computer performance. However, there can be other reasons for slow performance, including a hard disk that needs defragmenting, a computer that needs more memory (RAM), or the existence of spyware or adware. For more information about spyware, see How to tell if your computer is infected with spyware.
  • 11. if your computer has a virus scan through Anti Virus Programe
  • 12. How do I know if your computer has a virus?  Are you getting unexpected messages, or are programs starting automatically? Some viruses can cause damage to Windows or some of your programs. The results of this damage might include messages appearing unexpectedly, programs starting or closing automatically, or Windows shutting down suddenly.  Is your modem or hard disk working overtime? An e -mail virus works by sending many copies of itself by e - mail. One indicator of this is that the activity light on your broadband or external modem is constantly lit; another is the sound of your computer's hard disk continually working. These are not always symptoms of a computer virus, but when combined with other problems, can indicate a virus infection.
  • 13. How do I check for and remove viruses? • Here are a few things you can try to remove a computer virus:  Keep your antivirus program up to date. If you have already installed an antivirus program on your computer, it's important that you keep it up to date. Because new viruses are being written all the time, most antivirus programs are updated frequently. Check your antivirus program's documentation or visit their website to learn how to receive updates. Be aware that some viruses block common antivirus websites, making it so you cannot go to the website to download antivirus updates. If this happens, check with your antivirus vendor to see if they have a disc you can use to install the latest updates. It might be possible for you to create this disc on a computer that is not infected (for example, on a friend's computer).
  • 14. Keep your antivirus program up to date
  • 15.  Use an online scanner. If you don't have antivirus software installed, visit the Windows Security Software website for more information about security and virus prevention. Some of the sites offer free online scanners which will search your computer for the latest viruses. These scanners will not protect you from getting a virus, but they can help find and remove viruses your computer already has.  Use the Malicious Software Removal Tool. Microsoft offers the Malicious Software Removal Tool, which is updated once a month. The tool scans your computer for most new viruses and malicious software. After you run the tool, you will get a report that describes any malicious software found on your computer and lists all the viruses it scanned for. How do I check for and remove viruses?
  • 16. Stop a runaway virus. Viruses are often created specifically to take control of your computer and send copies of themselves from your computer to other computers. You can usually tell this is happening if your computer is performing slowly and accessing the network more frequently than normal. If this is happening, you should disconnect from the Internet and network (if you're on one). If you are connected to the Internet through a physical connection, disconnect the network or phone cable from your computer. If you're connected to the Internet through a wireless connection on a laptop, turn off the wireless adapter on the computer (either by turning off a switch or removing your wireless adapter card). Once your computer is disconnected from the Internet, run your antivirus software (from a disc or software on your computer) to remove the virus. How do I check for and remove viruses?
  • 17. How do I check for and remove viruses? Manually remove viruses. Sometimes a virus must be removed manually. This is often a technical process and should only be attempted by computer users who have experience with the Windows registry and who know how to view and delete system and program files in Windows. The first step is to identify the virus. Run your antivirus software to identify the name of the virus. If you don't have an antivirus program, or if your program does not detect the virus, you can still identify the virus by looking for clues about how it behaves. Write down the text in any messages displayed by the virus or, if you received the virus in e mail, write down the subject line or name of the file attached to‑ the message. Search the antivirus vendor's website for references to those specific things you wrote down to try to find the name of the virus and instructions for how to remove it.
  • 18. What is Data Execution Prevention?  Data Execution Prevention (DEP) is a security feature that can help prevent damage to your computer from viruses and other security threats. Harmful programs can try to attack Windows by attempting to run (also known as execute) code from your computer's memory reserved for Windows and other authorized programs. These types of attacks can harm your programs and files.  DEP can help protect your computer by monitoring your programs to make sure that they use computer memory safely. If DEP notices a program on your computer using memory incorrectly, it closes the program and notifies you.
  • 19. Thank You Presented by MUKUL Source : Microsoft Windows