SlideShare a Scribd company logo
1 of 9
Dr. Mario’s
   VIRUS DETECTION AND
       PREVENTION
DLSPS - Graduate School of Business
           Prepared by:
           LOADING. . .
Table of Contents
•   Introduction
•   Computer Virus Types
•   Detecting Computer Viruses
•   “Catching” a Computer Virus
•   Detecting and Eliminating Computer Viruses
•   References
Introduction
• A computer virus is a computer program that can copy itself and
  infect a computer without permission or knowledge of the user.
  (www.wikipedia.com). The term comes from the term virus in
  biology. Similar to the way a biological virus works, a computer
  virus reproduces by making (possibly modified) copies of itself in
  the computer's memory, storage, or over a network.

                      •   Back to Table of Contents
Computer Type Viruses
• a) Computer System / Boot Record Viruses

   – Attack parts of your computer used to run programs

• b) Computer File Viruses
   – Clings to various programs files`
   – Sample files: .COM, .EXE, .DOC

• c) Common Computer Virus Names
   – Stoned, Love Bug,
   – Check “Data Fellows Computer Virus Information”
   – Check McAfee/Norton/TrendMicro website

                          •   Back to Table of Contents
How Do I Know I Have A Computer
  Virus?
•   Programs take longer to load than normal
•   Hard drive runs out of hard disk space
•   Files have strange names you don’t recognize
•   Conventional memory isles than it used to be
•   Programs run erratically

                 •   Back to Table of Contents
How Can You “Catch” A Computer
  Virus?
•   Flash disks
•   Internet
•   Email
•   Networks

                  •   Back to Table of Contents
How Do I Detect and Eliminate
       Computer Viruses?
• Use anti virus software
  – McAfee
  – Norton
• TrendMicro (online)
• Use firewall
  – Kerio
  – ZoneAlarm

                •   Back to Table of Contents
REFERENCES:  References
•   1. ^ Vesselin Bontchev. Macro Virus Identification Problems. FRISK Software International.
•   2. ^ Malware Evolution: MacOS X Vulnerabilities 2005 - 2006. Kaspersky Lab (July 24, 2006).


                       REFERENCES :
•   3. ^ McAfee. McAfee discovers first Linux virus. news article.
•




         REFERENCES :
    4. ^ Axel Boldt. Bliss, a Linux "virus". news article.


                               •   Back to Table of Contents




                       REFERENCES :
END WITH A BANG

More Related Content

What's hot (20)

Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and Antivirus
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 

Viewers also liked

Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and preventionCholo Legisma
 
Network virus
Network virusNetwork virus
Network virusA M
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Virus Detection System
Virus Detection SystemVirus Detection System
Virus Detection SystemAntiy Labs
 
Virus Detection Based on the Packet Flow
Virus Detection Based on the Packet FlowVirus Detection Based on the Packet Flow
Virus Detection Based on the Packet FlowAntiy Labs
 
Artificial Intelligence in Virus Detection & Recognition
Artificial Intelligence in Virus Detection & RecognitionArtificial Intelligence in Virus Detection & Recognition
Artificial Intelligence in Virus Detection & Recognitionahmadali999
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

Viewers also liked (10)

Virus detection and prevention
Virus detection and preventionVirus detection and prevention
Virus detection and prevention
 
Network virus
Network virusNetwork virus
Network virus
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Virus Detection System
Virus Detection SystemVirus Detection System
Virus Detection System
 
Virus Detection Based on the Packet Flow
Virus Detection Based on the Packet FlowVirus Detection Based on the Packet Flow
Virus Detection Based on the Packet Flow
 
Artificial Intelligence in Virus Detection & Recognition
Artificial Intelligence in Virus Detection & RecognitionArtificial Intelligence in Virus Detection & Recognition
Artificial Intelligence in Virus Detection & Recognition
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 

Similar to Virus detection and prevention

Similar to Virus detection and prevention (20)

Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Isas
IsasIsas
Isas
 
Introduction to Malware - Part 1
Introduction to Malware - Part 1 Introduction to Malware - Part 1
Introduction to Malware - Part 1
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Virus
VirusVirus
Virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
COMPUTER VIRUS
COMPUTER VIRUS COMPUTER VIRUS
COMPUTER VIRUS
 
Computer Malware Into
Computer Malware IntoComputer Malware Into
Computer Malware Into
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Virus detection and prevention

  • 1. Dr. Mario’s VIRUS DETECTION AND PREVENTION DLSPS - Graduate School of Business Prepared by: LOADING. . .
  • 2. Table of Contents • Introduction • Computer Virus Types • Detecting Computer Viruses • “Catching” a Computer Virus • Detecting and Eliminating Computer Viruses • References
  • 3. Introduction • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. (www.wikipedia.com). The term comes from the term virus in biology. Similar to the way a biological virus works, a computer virus reproduces by making (possibly modified) copies of itself in the computer's memory, storage, or over a network. • Back to Table of Contents
  • 4. Computer Type Viruses • a) Computer System / Boot Record Viruses – Attack parts of your computer used to run programs • b) Computer File Viruses – Clings to various programs files` – Sample files: .COM, .EXE, .DOC • c) Common Computer Virus Names – Stoned, Love Bug, – Check “Data Fellows Computer Virus Information” – Check McAfee/Norton/TrendMicro website • Back to Table of Contents
  • 5. How Do I Know I Have A Computer Virus? • Programs take longer to load than normal • Hard drive runs out of hard disk space • Files have strange names you don’t recognize • Conventional memory isles than it used to be • Programs run erratically • Back to Table of Contents
  • 6. How Can You “Catch” A Computer Virus? • Flash disks • Internet • Email • Networks • Back to Table of Contents
  • 7. How Do I Detect and Eliminate Computer Viruses? • Use anti virus software – McAfee – Norton • TrendMicro (online) • Use firewall – Kerio – ZoneAlarm • Back to Table of Contents
  • 8. REFERENCES: References • 1. ^ Vesselin Bontchev. Macro Virus Identification Problems. FRISK Software International. • 2. ^ Malware Evolution: MacOS X Vulnerabilities 2005 - 2006. Kaspersky Lab (July 24, 2006). REFERENCES : • 3. ^ McAfee. McAfee discovers first Linux virus. news article. • REFERENCES : 4. ^ Axel Boldt. Bliss, a Linux "virus". news article. • Back to Table of Contents REFERENCES :
  • 9. END WITH A BANG