SlideShare a Scribd company logo
1 of 13
Download to read offline
SORAN UNIVERSITY
Faculty of Science And Engineering
School of Engineering
Department of Chemical Engineering
Names Group Partners : Abdulsamad Abdulhamed , Shkofa Kawa , Rezhin
Muhsin , Zhela Fakher
Name of Presentation : Virus
Instructor Name : Dr.Muhammedamen , Mr.Aras Masod
Date : 11/5/2014
The purpose of Presentation :
The purpose of this presentation is to know the details of the virus where the
components and its impact and how it is prevention and treatment of computer
from viruses.
Computer viruses are a type of software program that, abiological virus, reproduces
and spreads itself . Some virus may display only a message on the screen, others
may slow down the Pc. They can also erase files or even format your floppy or hard
Disk and crash the system.
INTRODUCTION :
Computer virus is characterized as :Computer virus is characterized as :
Computer virus is characterized as :
1) Program is capable of reincarnation Replication and spread.
The virus binds himself another program called custodial host.2)
Can not arise virus from the same.3)
4) Can be transmitted from an infected computer to another uninfected.
Components of the virus :
1) Mechanism Reincarnation The Replication Mechanism, the part that allows the
virus to reproduce itself
2) Mechanism stealthy The Protection Mechanism, the part that hides the virus for
discovery.
3) Mechanism of activation The trigger Mechanism, the part that allows the virus to
spread before it knew its such as using the timing of hour in a computer
4) Implementation Mechanism The Payload Mechanism which is implemented by
the virus when it is activated.
:Symptoms
1) Letters looks like they are falling to the bottom of the screen.
2) The computer system becomes slow .
3) The size of available free memory reduces .
4) The hard disk runs out of space .
.The computer does not boot5)
:How does it spread
1) Computer viruses spread by attaching themselves to other computer program
files.
2) When you exchange a file or pen drive with a virus, the virus spreads from one
Computer to the another.
3) Viruses also spreads when a Computer Engineer comes to repair your system and
diagnostics disks in your PC.his/herputs
Types of computer viruses :
1) Boot viruses:- The boot virus copies the virus code in the boot sector.
2) Polymorphic viruses:- They are coded in such a way that they infect a system and
change their signature.
3) Macro viruses:- Macros are blocks of code written to automate frequently
performed tasks and embedded in a program file.
4) Worms:- Worms are program that replicate and spread to other system.
5) Trojans:- A Trojan is a program file that claims to do something but it actually
dose something that is not required.
Preservation and cure :
1) Install an Antivirus software.
2) Regularly update the program.
files, or the3) Open email attachment files only if you are expecting the attached
sender is known and has confirmed sending the file.
4) Try to avoid downloading and installing software from the Internet.
5) Install only registered copies of software on the system.
Antivirus Software :
1) Norton Anti-Virus.
2) MaCfee.
3) Avast.
4) Quick Heal.
5) Panda.
6) Command Software.
7) Finjan Software.
8) Proland Software.
9) Central Command.
10) Alwil Software.
File types that can infect the virus :
1)EXE ,COM.
2)Microsoft word and Microsoft Excel.
3)PDF.
4)RAR, ZIP.
5)Files MP3 .
:Languages that writes by virus
is AssembleOf the most important languages ​​in which it writes by the virus code
language For easy access to computer hardware and there are also language high-
end such as visual basic.
Conclusion :
be installed and beFor better and safe computation anti-virus software should
helpfull for global network system freely.

More Related Content

What's hot

The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spreadwenxin
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer viruses
Computer virusesComputer viruses
Computer virusesImran Khan
 
Computer virus
Computer virusComputer virus
Computer viruskiran_a_c
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Virusesmartingarcia300
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarnnimmi_abes
 

What's hot (20)

The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Virus
Virus  Virus
Virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 

Viewers also liked

Different music institutions
Different music institutionsDifferent music institutions
Different music institutionsmaddybrown
 
Итоговое сочинение по литературе. Категория времени.
Итоговое сочинение по литературе. Категория времени.Итоговое сочинение по литературе. Категория времени.
Итоговое сочинение по литературе. Категория времени.Елена Павлова
 
Market research
Market researchMarket research
Market researchToni Lough
 
ทฤษฎีการเรียนรู้ที่เป็นที่นิยมในปัจจุบัน
ทฤษฎีการเรียนรู้ที่เป็นที่นิยมในปัจจุบันทฤษฎีการเรียนรู้ที่เป็นที่นิยมในปัจจุบัน
ทฤษฎีการเรียนรู้ที่เป็นที่นิยมในปัจจุบันZalarung Auai
 
Regulatory impact on small and midsize banks
Regulatory impact on small and midsize banksRegulatory impact on small and midsize banks
Regulatory impact on small and midsize banksHEXANIKA
 
Food-For-Thought---Winter-2014
Food-For-Thought---Winter-2014Food-For-Thought---Winter-2014
Food-For-Thought---Winter-2014Carrie Spero-Usher
 

Viewers also liked (7)

Different music institutions
Different music institutionsDifferent music institutions
Different music institutions
 
Итоговое сочинение по литературе. Категория времени.
Итоговое сочинение по литературе. Категория времени.Итоговое сочинение по литературе. Категория времени.
Итоговое сочинение по литературе. Категория времени.
 
Market research
Market researchMarket research
Market research
 
Research Publication-1
Research Publication-1Research Publication-1
Research Publication-1
 
ทฤษฎีการเรียนรู้ที่เป็นที่นิยมในปัจจุบัน
ทฤษฎีการเรียนรู้ที่เป็นที่นิยมในปัจจุบันทฤษฎีการเรียนรู้ที่เป็นที่นิยมในปัจจุบัน
ทฤษฎีการเรียนรู้ที่เป็นที่นิยมในปัจจุบัน
 
Regulatory impact on small and midsize banks
Regulatory impact on small and midsize banksRegulatory impact on small and midsize banks
Regulatory impact on small and midsize banks
 
Food-For-Thought---Winter-2014
Food-For-Thought---Winter-2014Food-For-Thought---Winter-2014
Food-For-Thought---Winter-2014
 

Similar to Virus

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti virusesMohit Jaiswal
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Analysis of virus algorithms
Analysis of virus algorithmsAnalysis of virus algorithms
Analysis of virus algorithmsUltraUploader
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
 
Computer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyDipayan Sarkar
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 

Similar to Virus (20)

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Virus
VirusVirus
Virus
 
Ch19
Ch19Ch19
Ch19
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Analysis of virus algorithms
Analysis of virus algorithmsAnalysis of virus algorithms
Analysis of virus algorithms
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Virus project
Virus projectVirus project
Virus project
 
Computer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan Chakravarthy
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 

More from abdulsamad alhamawande (13)

Water treatment
Water treatmentWater treatment
Water treatment
 
applications of ellipses & Hyperbolas
applications of ellipses & Hyperbolasapplications of ellipses & Hyperbolas
applications of ellipses & Hyperbolas
 
Chemical Engineer
Chemical EngineerChemical Engineer
Chemical Engineer
 
Heat transfer applications in oil and gas industry
Heat transfer applications in oil and gas industry Heat transfer applications in oil and gas industry
Heat transfer applications in oil and gas industry
 
Lubricating oil
Lubricating oilLubricating oil
Lubricating oil
 
Characterization of some kurdistan crude oils based on data analysis of astm ...
Characterization of some kurdistan crude oils based on data analysis of astm ...Characterization of some kurdistan crude oils based on data analysis of astm ...
Characterization of some kurdistan crude oils based on data analysis of astm ...
 
Power supply and (sata and pata)
Power supply and (sata and pata)Power supply and (sata and pata)
Power supply and (sata and pata)
 
Stealth Technology
Stealth Technology Stealth Technology
Stealth Technology
 
Radial heat conduction
Radial heat conductionRadial heat conduction
Radial heat conduction
 
Nuclear energy
Nuclear energyNuclear energy
Nuclear energy
 
The ozone layer
The ozone layerThe ozone layer
The ozone layer
 
CPU
CPUCPU
CPU
 
Panel data analysis
Panel data analysisPanel data analysis
Panel data analysis
 

Recently uploaded

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Recently uploaded (20)

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 

Virus

  • 1. SORAN UNIVERSITY Faculty of Science And Engineering School of Engineering Department of Chemical Engineering Names Group Partners : Abdulsamad Abdulhamed , Shkofa Kawa , Rezhin Muhsin , Zhela Fakher Name of Presentation : Virus Instructor Name : Dr.Muhammedamen , Mr.Aras Masod Date : 11/5/2014
  • 2. The purpose of Presentation : The purpose of this presentation is to know the details of the virus where the components and its impact and how it is prevention and treatment of computer from viruses.
  • 3. Computer viruses are a type of software program that, abiological virus, reproduces and spreads itself . Some virus may display only a message on the screen, others may slow down the Pc. They can also erase files or even format your floppy or hard Disk and crash the system. INTRODUCTION :
  • 4. Computer virus is characterized as :Computer virus is characterized as : Computer virus is characterized as : 1) Program is capable of reincarnation Replication and spread. The virus binds himself another program called custodial host.2) Can not arise virus from the same.3) 4) Can be transmitted from an infected computer to another uninfected.
  • 5. Components of the virus : 1) Mechanism Reincarnation The Replication Mechanism, the part that allows the virus to reproduce itself 2) Mechanism stealthy The Protection Mechanism, the part that hides the virus for discovery. 3) Mechanism of activation The trigger Mechanism, the part that allows the virus to spread before it knew its such as using the timing of hour in a computer 4) Implementation Mechanism The Payload Mechanism which is implemented by the virus when it is activated.
  • 6. :Symptoms 1) Letters looks like they are falling to the bottom of the screen. 2) The computer system becomes slow . 3) The size of available free memory reduces . 4) The hard disk runs out of space . .The computer does not boot5)
  • 7. :How does it spread 1) Computer viruses spread by attaching themselves to other computer program files. 2) When you exchange a file or pen drive with a virus, the virus spreads from one Computer to the another. 3) Viruses also spreads when a Computer Engineer comes to repair your system and diagnostics disks in your PC.his/herputs
  • 8. Types of computer viruses : 1) Boot viruses:- The boot virus copies the virus code in the boot sector. 2) Polymorphic viruses:- They are coded in such a way that they infect a system and change their signature. 3) Macro viruses:- Macros are blocks of code written to automate frequently performed tasks and embedded in a program file. 4) Worms:- Worms are program that replicate and spread to other system. 5) Trojans:- A Trojan is a program file that claims to do something but it actually dose something that is not required.
  • 9. Preservation and cure : 1) Install an Antivirus software. 2) Regularly update the program. files, or the3) Open email attachment files only if you are expecting the attached sender is known and has confirmed sending the file. 4) Try to avoid downloading and installing software from the Internet. 5) Install only registered copies of software on the system.
  • 10. Antivirus Software : 1) Norton Anti-Virus. 2) MaCfee. 3) Avast. 4) Quick Heal. 5) Panda. 6) Command Software. 7) Finjan Software. 8) Proland Software. 9) Central Command. 10) Alwil Software.
  • 11. File types that can infect the virus : 1)EXE ,COM. 2)Microsoft word and Microsoft Excel. 3)PDF. 4)RAR, ZIP. 5)Files MP3 .
  • 12. :Languages that writes by virus is AssembleOf the most important languages ​​in which it writes by the virus code language For easy access to computer hardware and there are also language high- end such as visual basic.
  • 13. Conclusion : be installed and beFor better and safe computation anti-virus software should helpfull for global network system freely.