SlideShare a Scribd company logo
Virus
BOHAIR NASEER
13 BS ( IT )
A virus is a small piece of software that
piggybacks on real programs in order to get
executed
Once it’s running, it spreads by inserting
copies of itself into other executable code or
documents
Definition of Virus
Computer Virus Timeline
• 1949
Theories for self-replicating programs are first developed.
• 1981
Apple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the
public domain. Found on the Apple II operating system, the viruses spread
through Texas A&M via pirated computer games.
• 1983
Fred Cohen, while working on his dissertation, formally defines a computer
virus as “a computer program that can affect other computer programs by
modifying them in such a way as to include a (possibly evolved) copy of
itself.”
• 1986
Two programmers named Basit and Amjad replace the executable code in
the boot sector of a floppy disk with their own code designed to infect each
360kb floppy accessed on any drive. Infected floppies had “© Brain” for a
volume label.
• 1987
The Lehigh virus, one of the first file viruses, infects command.com files.
• 1988
One of the most common viruses, Jerusalem, is unleashed. Activated every
Friday the 13th, the virus affects both .exe and .com files and deletes any
programs run on that day.
MacMag and the Scores virus cause the first major Macintosh outbreaks.
Types of Computer Virus
Time Bomb
Logical Bomb
Worm
Boot Sector Virus
Macros Virus
Trojan Horse
Script Virus
Time Bomb
A time bomb is a virus program
that performs an activity on a
particular date
Logical Bomb
A logical bomb is a destructive
program that performs an activity
when a certain action has occurred.
Worm Virus
A worm is also a destructive
program that fills a computer
system with self-replicating
information, clogging the system so
that its operations are slowed
down or stopped
Boot Sector Virus
A boot sector virus infects boot
sector of computers. During system
boot, boot sector virus is loaded
into main memory and destroys
data stored in hard disk
Macro Virus
A macro virus is associated with
application software like word and
excel. When opening the infected
document, macro virus is loaded
into main memory and destroys the
data stored in hard disk
Script Virus
Commonly found script viruses are
written using the Visual Basic
Scripting edition (VBS) and the
JavaScript programming languages
Trojan Horse
Trojan Horse is a destructive
program. It usually pretends as
computer games or application
software. If executed, computer
system will be damaged.
Trojan Horse
Trojan Horse usually comes with
monitoring tools and key loggers
Actions to prevent virus infection
Always update your anti-virus
software at least weekly.
Back up your important files and
ensure that they can be restored.
Change the computer's boot
sequence to always start the PC
from its hard drive
Actions to prevent virus infection
Don't share Drive C: without a
password and without read-only
restrictions.
Empty floppy drives of diskettes
before turning on computers,
especially laptops.
Actions to prevent virus infection
Forget opening unexpected e-mail
attachments, even if they're from
friends
Get trained on your computer's
anti-virus software and use it.
Have multiple backups of
important files. This lowers the
chance that all are infected.
Actions to prevent virus infection
Install security updates for your
operating system and programs as
soon as possible.
Jump at the chance to learn more
about your computer. This will help
you spot viruses.
Reference
• http://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gif
• http://www.factmonster.com/ipka/A0872842.html
http://www.faqs.org/faqs/computer-virus/new-users/
• http://www.mines.edu/academic/computer/viri-sysadmin.htm
Virus

More Related Content

What's hot

What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
sameer1993
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
 

What's hot (19)

Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses and its History
Viruses and its HistoryViruses and its History
Viruses and its History
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
History of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurHistory of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpur
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Virus
VirusVirus
Virus
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 

Viewers also liked

Immune Response2
Immune Response2Immune Response2
Immune Response2
guestcc8709
 
Biology 16 2 evolution as genetic change[1]
Biology 16 2 evolution as genetic change[1]Biology 16 2 evolution as genetic change[1]
Biology 16 2 evolution as genetic change[1]
Tamara
 
Dendritic Vaccine Laboratory Optimization and Dendritic Cell Maturation
Dendritic Vaccine Laboratory Optimization and Dendritic Cell Maturation Dendritic Vaccine Laboratory Optimization and Dendritic Cell Maturation
Dendritic Vaccine Laboratory Optimization and Dendritic Cell Maturation
NeuroAcademy
 
Biology 151 lecture 4 2012 2013 (part 1- cmi)
Biology 151 lecture 4 2012 2013 (part 1- cmi)Biology 151 lecture 4 2012 2013 (part 1- cmi)
Biology 151 lecture 4 2012 2013 (part 1- cmi)
Marilen Parungao
 

Viewers also liked (20)

112 macrophage uptake of cns1 1 d
112 macrophage uptake of cns1 1 d112 macrophage uptake of cns1 1 d
112 macrophage uptake of cns1 1 d
 
Immune Response2
Immune Response2Immune Response2
Immune Response2
 
Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and Antivirus
 
Global Medical Cures™ | CANCER- Biological Therapy
Global Medical Cures™ | CANCER- Biological TherapyGlobal Medical Cures™ | CANCER- Biological Therapy
Global Medical Cures™ | CANCER- Biological Therapy
 
GKA deel 2 college 7
GKA deel 2 college 7GKA deel 2 college 7
GKA deel 2 college 7
 
Adaptive Immune Response to Viral Infections
Adaptive Immune Response to Viral InfectionsAdaptive Immune Response to Viral Infections
Adaptive Immune Response to Viral Infections
 
Chapter 4 Immunologic System
Chapter 4  Immunologic SystemChapter 4  Immunologic System
Chapter 4 Immunologic System
 
Biology 16 2 evolution as genetic change[1]
Biology 16 2 evolution as genetic change[1]Biology 16 2 evolution as genetic change[1]
Biology 16 2 evolution as genetic change[1]
 
Immune Response to HIV
Immune Response to HIVImmune Response to HIV
Immune Response to HIV
 
Monocytes macrophages in human cancer
Monocytes macrophages in human cancerMonocytes macrophages in human cancer
Monocytes macrophages in human cancer
 
Dendritic Vaccine Laboratory Optimization and Dendritic Cell Maturation
Dendritic Vaccine Laboratory Optimization and Dendritic Cell Maturation Dendritic Vaccine Laboratory Optimization and Dendritic Cell Maturation
Dendritic Vaccine Laboratory Optimization and Dendritic Cell Maturation
 
Biology 151 lecture 4 2012 2013 (part 1- cmi)
Biology 151 lecture 4 2012 2013 (part 1- cmi)Biology 151 lecture 4 2012 2013 (part 1- cmi)
Biology 151 lecture 4 2012 2013 (part 1- cmi)
 
Research
ResearchResearch
Research
 
Maths project work
Maths project workMaths project work
Maths project work
 
Immune response to hiv infection
Immune response to hiv infectionImmune response to hiv infection
Immune response to hiv infection
 
Lymphocytes : Structure & immunological Function
Lymphocytes : Structure & immunological Function Lymphocytes : Structure & immunological Function
Lymphocytes : Structure & immunological Function
 
Macrophages & dendritic cells in viral infection
Macrophages & dendritic cells in viral infectionMacrophages & dendritic cells in viral infection
Macrophages & dendritic cells in viral infection
 
Macrophages
MacrophagesMacrophages
Macrophages
 
Dendritic cells
Dendritic cellsDendritic cells
Dendritic cells
 
Cell-mediated immune responses
Cell-mediated immune responsesCell-mediated immune responses
Cell-mediated immune responses
 

Similar to Virus

Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
jnnj
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
DEEP TIWARI
 

Similar to Virus (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 

Virus

  • 2. A virus is a small piece of software that piggybacks on real programs in order to get executed Once it’s running, it spreads by inserting copies of itself into other executable code or documents Definition of Virus
  • 3. Computer Virus Timeline • 1949 Theories for self-replicating programs are first developed. • 1981 Apple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found on the Apple II operating system, the viruses spread through Texas A&M via pirated computer games. • 1983 Fred Cohen, while working on his dissertation, formally defines a computer virus as “a computer program that can affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself.” • 1986 Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had “© Brain” for a volume label. • 1987 The Lehigh virus, one of the first file viruses, infects command.com files. • 1988 One of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virus affects both .exe and .com files and deletes any programs run on that day. MacMag and the Scores virus cause the first major Macintosh outbreaks.
  • 4. Types of Computer Virus Time Bomb Logical Bomb Worm Boot Sector Virus Macros Virus Trojan Horse Script Virus
  • 5. Time Bomb A time bomb is a virus program that performs an activity on a particular date
  • 6. Logical Bomb A logical bomb is a destructive program that performs an activity when a certain action has occurred.
  • 7. Worm Virus A worm is also a destructive program that fills a computer system with self-replicating information, clogging the system so that its operations are slowed down or stopped
  • 8. Boot Sector Virus A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk
  • 9. Macro Virus A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk
  • 10. Script Virus Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages
  • 11. Trojan Horse Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.
  • 12. Trojan Horse Trojan Horse usually comes with monitoring tools and key loggers
  • 13. Actions to prevent virus infection Always update your anti-virus software at least weekly. Back up your important files and ensure that they can be restored. Change the computer's boot sequence to always start the PC from its hard drive
  • 14. Actions to prevent virus infection Don't share Drive C: without a password and without read-only restrictions. Empty floppy drives of diskettes before turning on computers, especially laptops.
  • 15. Actions to prevent virus infection Forget opening unexpected e-mail attachments, even if they're from friends Get trained on your computer's anti-virus software and use it. Have multiple backups of important files. This lowers the chance that all are infected.
  • 16. Actions to prevent virus infection Install security updates for your operating system and programs as soon as possible. Jump at the chance to learn more about your computer. This will help you spot viruses.