SlideShare a Scribd company logo
Virus and antivirus
Prepared by Prem Sahu
Virus
Vital Information Recourse Under Siege is a program which is used to destroy or
damage or corrupt the computer system according to their functionality
Different Type of Virus
Program Virus
Boot Virus
Network Virus
Different Virus name
Trojan
Worm
Wdll32
Antivirus
It is program which is used to protect from Virus and their infection
It provides security to our system from malicious program and their infection.
Retrovirus
It is malicious program which corrupt or damage the
antivirus of system.
Antivirus Company
Norton
MacAfee
Quick heal
Kaspersky
AVG
Avast
Avira
Escan
K7

More Related Content

What's hot

Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
Khaleel Assadi
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus
Jayesh Naik
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 
Malware
MalwareMalware
Virus
VirusVirus
Virus
dddaou
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIROTakagi Kun
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
dilsherece
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
bozzerapide
 
Viruses
VirusesViruses
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesadni_shadah
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
Akshay Surve
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
Pratimesh Pathak
 
Ch19
Ch19Ch19
wiki 1(w)
wiki 1(w)wiki 1(w)
wiki 1(w)haswani
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
Enetfix (Pairsys, Inc.)
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paperJennifer Cataluña
 

What's hot (20)

Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Malware
MalwareMalware
Malware
 
Virus
VirusVirus
Virus
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIRO
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Viruses
VirusesViruses
Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
ANTI - VIRUS
ANTI - VIRUSANTI - VIRUS
ANTI - VIRUS
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
 
Ch19
Ch19Ch19
Ch19
 
wiki 1(w)
wiki 1(w)wiki 1(w)
wiki 1(w)
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 

Viewers also liked

แบบฝึดหัดเรื่องเซต
แบบฝึดหัดเรื่องเซตแบบฝึดหัดเรื่องเซต
แบบฝึดหัดเรื่องเซต
ชื่อ ขวัญ
 
Project organization module_10
Project organization module_10Project organization module_10
Project organization module_10
teacheronline3
 
What to do today
What to do todayWhat to do today
What to do today
teacheronline3
 
Ip address
Ip addressIp address
Ip address
Prem Sahu
 
Becoming current fall_2014
Becoming current fall_2014Becoming current fall_2014
Becoming current fall_2014
teacheronline3
 
Internet
InternetInternet
Internet
Prem Sahu
 
Software
SoftwareSoftware
Software
Prem Sahu
 
Important elements of saddle fit
Important elements of saddle fitImportant elements of saddle fit
Important elements of saddle fit
devinstrobe
 
Hardware
HardwareHardware
Hardware
Prem Sahu
 
Leiderschap in digitale transities
Leiderschap in digitale transitiesLeiderschap in digitale transities
Leiderschap in digitale transities
Barbara Belder
 
Power supply
Power supplyPower supply
Power supply
Prem Sahu
 
Format and partition
Format and partitionFormat and partition
Format and partition
Prem Sahu
 
Becoming current fall_2014
Becoming current fall_2014Becoming current fall_2014
Becoming current fall_2014
teacheronline3
 
File and folder setting
File and folder settingFile and folder setting
File and folder setting
Prem Sahu
 
IVT Kalmar & Oskarshamn – Sveriges tryggaste värmepumpar och varmvattenberedare
IVT Kalmar & Oskarshamn – Sveriges tryggaste värmepumpar och varmvattenberedareIVT Kalmar & Oskarshamn – Sveriges tryggaste värmepumpar och varmvattenberedare
IVT Kalmar & Oskarshamn – Sveriges tryggaste värmepumpar och varmvattenberedare
IVT Center Värme & Kylteknik i Vassmolösa
 
The importance of open accessibility data
The importance of open accessibility dataThe importance of open accessibility data
The importance of open accessibility data
Dennie Declercq
 
A fresh look at vascularized flexor tendon transfers
A fresh look at vascularized flexor tendon transfersA fresh look at vascularized flexor tendon transfers
A fresh look at vascularized flexor tendon transfersOTTO
 
Ram
RamRam
проценко денис
проценко дениспроценко денис
проценко денис
777den777den
 

Viewers also liked (20)

แบบฝึดหัดเรื่องเซต
แบบฝึดหัดเรื่องเซตแบบฝึดหัดเรื่องเซต
แบบฝึดหัดเรื่องเซต
 
Project organization module_10
Project organization module_10Project organization module_10
Project organization module_10
 
What to do today
What to do todayWhat to do today
What to do today
 
Ip address
Ip addressIp address
Ip address
 
Becoming current fall_2014
Becoming current fall_2014Becoming current fall_2014
Becoming current fall_2014
 
Internet
InternetInternet
Internet
 
Software
SoftwareSoftware
Software
 
Visual Kit GreenLab
Visual Kit GreenLabVisual Kit GreenLab
Visual Kit GreenLab
 
Important elements of saddle fit
Important elements of saddle fitImportant elements of saddle fit
Important elements of saddle fit
 
Hardware
HardwareHardware
Hardware
 
Leiderschap in digitale transities
Leiderschap in digitale transitiesLeiderschap in digitale transities
Leiderschap in digitale transities
 
Power supply
Power supplyPower supply
Power supply
 
Format and partition
Format and partitionFormat and partition
Format and partition
 
Becoming current fall_2014
Becoming current fall_2014Becoming current fall_2014
Becoming current fall_2014
 
File and folder setting
File and folder settingFile and folder setting
File and folder setting
 
IVT Kalmar & Oskarshamn – Sveriges tryggaste värmepumpar och varmvattenberedare
IVT Kalmar & Oskarshamn – Sveriges tryggaste värmepumpar och varmvattenberedareIVT Kalmar & Oskarshamn – Sveriges tryggaste värmepumpar och varmvattenberedare
IVT Kalmar & Oskarshamn – Sveriges tryggaste värmepumpar och varmvattenberedare
 
The importance of open accessibility data
The importance of open accessibility dataThe importance of open accessibility data
The importance of open accessibility data
 
A fresh look at vascularized flexor tendon transfers
A fresh look at vascularized flexor tendon transfersA fresh look at vascularized flexor tendon transfers
A fresh look at vascularized flexor tendon transfers
 
Ram
RamRam
Ram
 
проценко денис
проценко дениспроценко денис
проценко денис
 

More from Prem Sahu

Bioscmos, post, boot
Bioscmos, post, bootBioscmos, post, boot
Bioscmos, post, boot
Prem Sahu
 
Harddisk
HarddiskHarddisk
Harddisk
Prem Sahu
 
Control panel
Control panelControl panel
Control panel
Prem Sahu
 
Msdos
MsdosMsdos
Msdos
Prem Sahu
 
System utility
System utilitySystem utility
System utility
Prem Sahu
 
Slow system troubleshooting
Slow system troubleshootingSlow system troubleshooting
Slow system troubleshooting
Prem Sahu
 
Protocol
ProtocolProtocol
Protocol
Prem Sahu
 
Operating system
Operating systemOperating system
Operating system
Prem Sahu
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
Prem Sahu
 
Networking device
Networking deviceNetworking device
Networking device
Prem Sahu
 
Networking
NetworkingNetworking
Networking
Prem Sahu
 
Motherboard
MotherboardMotherboard
Motherboard
Prem Sahu
 
Windows xp installation
Windows xp installationWindows xp installation
Windows xp installation
Prem Sahu
 

More from Prem Sahu (13)

Bioscmos, post, boot
Bioscmos, post, bootBioscmos, post, boot
Bioscmos, post, boot
 
Harddisk
HarddiskHarddisk
Harddisk
 
Control panel
Control panelControl panel
Control panel
 
Msdos
MsdosMsdos
Msdos
 
System utility
System utilitySystem utility
System utility
 
Slow system troubleshooting
Slow system troubleshootingSlow system troubleshooting
Slow system troubleshooting
 
Protocol
ProtocolProtocol
Protocol
 
Operating system
Operating systemOperating system
Operating system
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
Networking device
Networking deviceNetworking device
Networking device
 
Networking
NetworkingNetworking
Networking
 
Motherboard
MotherboardMotherboard
Motherboard
 
Windows xp installation
Windows xp installationWindows xp installation
Windows xp installation
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Virus and antivirus