SlideShare a Scribd company logo
1 of 39
Presented By : Shehrevar Davierwala
Contact : shehrevar@live.com
 Computer virus
 Actions of virus
 Types of virus
 Difference between computer virus, worms and Trojans Horse
 Anti virus software
 Symptoms of infected computer
 What to do on suspecting virus attack
 Types of antivirus
 Antivirus software factors
 Actions of antivirus
 General precautions
VIRUS
VIRUS (Vital Information Resource Under Seize)
 It is a software use to infect a computer. After virus code is written it is
integrated with in an essential programmed.
 Once the programmed is executed the virus code is activated and attacks
copies of itself to other programmers.
 A common type virus is a boot virus which is stored in the boot sector of disk
if the disk is left in the drive when the machine is infected with FLOPPY, CD,
hard disk expecting to the find the operating there once the machine is effected
the boot virus may replicate it self on to all the floppies.
 A virus current be attach data it must attack to be removable programmed
that is down loaded into or installed in the computer, the virus attacked
programmed most be executed in order to active the virus.
What is computer virus?
Computer virus is nothing but a computer program that can
infect a computer without the knowledge of the person using the
system.
 virus can spread from one system to another when a infected
file is copied or transfer from host to target system.
There are many ways by
which a virus can spread to
other system..
 1.When an infected file
is copied through network.
 2.When virus file is
downloaded from internet.
3. When an infected file is copied
from floppy disk, USB, DVD,
etc.
 computer virus as name
suggests can infect personal
computer / laptop etc. It enters
the system through infected pen
drives, floppy, DVD etc. It can
enter through internet virus
affects files & data can be lost.
Action of virus on Computer
 Any unwanted activity on the computer is treated as virus/worm. In actual
these are programs and codes written by some computer.
Virus can cause on computer such as
 1.It may take space on Hard Disk.
 2.Opening some programs.
 3.Generating some messages.
 4.Slow down the computer.
 5.Delete your valuable data.
 6.Unwanted activity over screen.
 7.Crash the Hard Disk.
 8.Unable to boot.
Types of viruses
1. Direct
Action
Virus
The main
purpose of this
virus is to
replicate and
take action
when it is
executed.
2. Resident
Viruses
This type of virus is a
permanent which dwells in
the RAM memory.
3.Overwrite Virus
Virus of this kind is characterized by
the fact that it deletes the information
contained in the files that it infects,
rendering them partially or totally
useless once they have been infected.
 The only way to clean a file infected by
an overwrite virus is to delete the file
completely, thus losing the original
content.
The object
oriented analysis
and design is
divided into two
phases – OOA
(Object Oriented
Analysis) and
OOD (Object
Oriented Design)
Original file
My computer/c/folder/file
Infected file
My computer/d/new folder..
4. Directory
Virus
Difference Between a Computer Virus, Worm and Trojan
Horse
1. Computer Virus-1. Computer Virus-
A computer virus attaches itself to a program or file enabling it to
spread from one computer to another, leaving infections as it travels
like a human virus. 1. It effects while
others can damage your hardware, software or files. Almost all viruses
are attached to an executable file, which means the virus may exist on
your computer but it actually cannot infect your computer unless you
run or open the infected program. 2. It is important
to note that a virus cannot be spread without a human action, (such as
running an infected program) to keep it going. 
3. People continue the spread of a computer virus,
mostly unknowingly, by sharing infecting files or sending e-mails with
viruses as attachments in the e-mail.
2.Worm-
A worm is similar to a virus and considered to be a sub-class of a
virus. Worms spread from computer to computer, but unlike a
virus, it has the capability to travel without any human action.
The biggest danger with a worm is its capability to replicate itself
on your system, so rather than your computer sending out a single
worm, it could send out hundreds or thousands of copies of itself,
creating a huge devastating effect. 
Due to the copying nature of a worm and its capability to travel
across networks the end result in most cases is that the worm
consumes too much system memory (or network bandwidth),
causing Web servers, network servers and individual computers to
stop responding.
3.Trojan Horse-
When a Trojan is activated on your computer, the results can vary.
Some Trojans are designed to be more annoying than malicious
(like changing your desktop, adding silly active desktop icons) or
they can cause serious damage by deleting files and destroying
information on your system.
Trojans are also known to create a backdoor on your computer that
gives malicious users access to your system, possibly allowing
confidential or personal information to be compromised.
 Unlike viruses and worms, Trojans do not reproduce by infecting
other files nor do they self-replicate.
Antivirus software
An antivirus is a computer program that identify and remove
computer viruses and other malicious software like worms
and Trojans from an infected computer. Not only this,
antivirus software also protects the computer from further
virus attacks.
Symptoms of infected computer
●In My Computer, autoplay option appears instead of open in every
drive you enter i.e. when you click drive letters(C,D,E etc) a
window opens to select any one program to select any one
program to open with.
●Computer becomes slow & there is noticeable delay in characters
to appear on screen when you press in keyboard
● command prompts doesn't open, if it does
close suddenly.
● You cannot open system utilities like Task
Manager, Regedit, Msconfig it opens and
suddenly closes.
What to do on Suspecting virus attack
●Disconnect the suspected computer system from the internet
as well as from the local network.
●Start the system in safe mode or from the windows boot disk,
if it displays any problem in starting.
●Take backup of all data to an external drive.
 Install antivirus software if you do not have it installed.
 Now, download the latest virus definition updates from the
internet (do it on a separate computer)
 Perform a full system scan.
Top Anti-Virus Software
 Shield Deluxe - Antivirus &
Antispyware.
 Spyware Doctor & Antivirus
 F Pront Antivirus
 Bit Defender Antivirus Plus
 Ashampo Antivirus
1. Shield Deluxe - Antivirus &
AntiSpyware.
The Shield Deluxe 2009, powered by BitDefender award
winning Antivirus engine. It
provides advanced proactive protection against viruses,
spyware, attacks and identity theft.
Stay one step ahead of the latest e-Threats while
maintaining superior performance that keeps your PC
running smoothly. The Shield
Deluxe is simple to install and set up, while offering
advanced users a range of versatile settings for fine-tuning
the program.
$29.99 to register  
2. Spyware Doctor & Antivirus-
Award-winning spyware and virus protection to
secure your PC.
Spyware Doctor with AntiVirus is a top-rated
malware, spyware & virus removal utility that
detects, removes and protects your PC from
thousands of potential spyware, adware, trojans,
viruses, keyloggers, spybots and tracking threats.
3. F Pront Antivirus
Tired of clunky AV programs that slow down your
computer and constantly interfere with your work or
when you send email? F-PROT Antivirus for Windowsis
legendary for their high security, streamlined efficiency
and very low resource consumption. F-PROT for
Windows runs as good on Win XP Pro as it does on
Win98. Many millions have chosen F-PROT worldwide.
F-PROT will keep your computer secure and keep out of
your way.
4.BitDefender Antivirus Plus
NEW Bit Defender Antivirus Plus v10 integrates
ANTIVIRUS, ANTISPYWARE, FIREWALL and
ANTISPAM modules into one comprehensive
security package that protects your personal
computer.
5.Ashampo Antivirus
Ashampoo AntiVirus gives you comprehensive
protection against viruses, worms, Trojans and
dialers, but it`s so efficient you won`t even
notice it`s there. And its so easy to use that it
won`t waste any of your valuable time. Just set
it and forget it and get on with more important
things.
Antivirus software factors
1. How frequently are virus definitions update?
Virus definitions can be considered as rules which the antivirus
software will use to determine whether a program is
malicious or not.
The latest virus definitions are the better chance of detection.
2. Is automatic update of virus definitions available?
Having the virus definitions updated automatically not only
ensures that your software is up to date but it eliminates the
possibility of you forgetting to manually update them.
3. Does the software has the option to set up routine scanning of
the computer?
The best way to ensure your computer really has no viruses is to
have an antivirus program which can be set up to perform
automatic scans of the system on a regular basis.
4. How much resource it consumes while performing a scan?
It is really a headache working on other applications while an
antivirus program is scanning the computer, specially when your
computer has low memory.
When an antivirus program consume considerable amount of
CPU & memory.
Anti-Virus Action
1.Attempt to
repair the file
by removing
the virus itself
from the file.
• 2.Quarantine the
file (such that the
file remains
inaccessible to other
programs & it’s
virus can no longer
spread)
I want to
spread..
3. The anti-Virus
software examines
each & every file in a
computer & examines
the contain with the
virus definitions if
threat is found then
delete the infected file
Virus found
General precautions
When inserting removable media (floppy, CD, flash drive etc)
scan the whole device with the antivirus software before opening
it.
If you have internet access, make sure you use internet security
software.
Get window updates.
From time to time, update your installed software to their latest
version. e.g. (MS office, java, flash player etc)
You should have an updated antivirus guarding your PC all time.
THANK YOU !

More Related Content

What's hot

Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virusKriti kohli
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 

What's hot (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Viewers also liked

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)cdebraj16101991
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Ebola virus disease [ bio project ]
Ebola virus disease [ bio project ] Ebola virus disease [ bio project ]
Ebola virus disease [ bio project ] Abhishek Nayak
 
Signature based virus detection and protection system
Signature based virus detection and protection systemSignature based virus detection and protection system
Signature based virus detection and protection systemMd. Hasan Basri (Angel)
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولSaadDongus
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great InfographicsSlideShare
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShareKapost
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareEmpowered Presentations
 

Viewers also liked (20)

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Ebola virus disease [ bio project ]
Ebola virus disease [ bio project ] Ebola virus disease [ bio project ]
Ebola virus disease [ bio project ]
 
Signature based virus detection and protection system
Signature based virus detection and protection systemSignature based virus detection and protection system
Signature based virus detection and protection system
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلول
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Virus ppt
Virus pptVirus ppt
Virus ppt
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 

Similar to Virus project (20)

Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Virus
VirusVirus
Virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
viruses
virusesviruses
viruses
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

More from Shehrevar Davierwala

More from Shehrevar Davierwala (20)

Introduction_Swift
Introduction_SwiftIntroduction_Swift
Introduction_Swift
 
PsudoCode.pptx
PsudoCode.pptxPsudoCode.pptx
PsudoCode.pptx
 
Number System.pptx
Number System.pptxNumber System.pptx
Number System.pptx
 
Java Script (Module 1).pptx
Java Script (Module 1).pptxJava Script (Module 1).pptx
Java Script (Module 1).pptx
 
Website in Clicks Day 2
Website in Clicks Day 2Website in Clicks Day 2
Website in Clicks Day 2
 
Develop Website in Clicks
Develop Website in ClicksDevelop Website in Clicks
Develop Website in Clicks
 
Build Virtual Assistant Using AI
Build Virtual Assistant Using AI Build Virtual Assistant Using AI
Build Virtual Assistant Using AI
 
Build brand reputation using facebook
Build brand reputation using facebookBuild brand reputation using facebook
Build brand reputation using facebook
 
Digital Marketing Session 2
Digital Marketing Session 2Digital Marketing Session 2
Digital Marketing Session 2
 
Learn Digital Marketing : 0 to Hero Day 1
Learn Digital Marketing :  0 to Hero Day 1 Learn Digital Marketing :  0 to Hero Day 1
Learn Digital Marketing : 0 to Hero Day 1
 
Standard template
Standard templateStandard template
Standard template
 
Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective  Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective
 
Developing stunning website in clicks - 2
Developing stunning website in clicks - 2Developing stunning website in clicks - 2
Developing stunning website in clicks - 2
 
Developing stunning website in clicks
Developing stunning website in clicksDeveloping stunning website in clicks
Developing stunning website in clicks
 
Google forms for data analysis
Google forms for data analysisGoogle forms for data analysis
Google forms for data analysis
 
Webdesign session1
Webdesign session1Webdesign session1
Webdesign session1
 
Tech talk webtech
Tech talk webtechTech talk webtech
Tech talk webtech
 
Tech talk php_cms
Tech talk php_cmsTech talk php_cms
Tech talk php_cms
 
Ph pbasics
Ph pbasicsPh pbasics
Ph pbasics
 
Php mysql
Php mysqlPhp mysql
Php mysql
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Virus project

  • 1. Presented By : Shehrevar Davierwala Contact : shehrevar@live.com
  • 2.  Computer virus  Actions of virus  Types of virus  Difference between computer virus, worms and Trojans Horse  Anti virus software  Symptoms of infected computer  What to do on suspecting virus attack  Types of antivirus  Antivirus software factors  Actions of antivirus  General precautions
  • 3. VIRUS VIRUS (Vital Information Resource Under Seize)  It is a software use to infect a computer. After virus code is written it is integrated with in an essential programmed.  Once the programmed is executed the virus code is activated and attacks copies of itself to other programmers.  A common type virus is a boot virus which is stored in the boot sector of disk if the disk is left in the drive when the machine is infected with FLOPPY, CD, hard disk expecting to the find the operating there once the machine is effected the boot virus may replicate it self on to all the floppies.  A virus current be attach data it must attack to be removable programmed that is down loaded into or installed in the computer, the virus attacked programmed most be executed in order to active the virus.
  • 4. What is computer virus? Computer virus is nothing but a computer program that can infect a computer without the knowledge of the person using the system.  virus can spread from one system to another when a infected file is copied or transfer from host to target system.
  • 5. There are many ways by which a virus can spread to other system..  1.When an infected file is copied through network.  2.When virus file is downloaded from internet.
  • 6. 3. When an infected file is copied from floppy disk, USB, DVD, etc.  computer virus as name suggests can infect personal computer / laptop etc. It enters the system through infected pen drives, floppy, DVD etc. It can enter through internet virus affects files & data can be lost.
  • 7. Action of virus on Computer  Any unwanted activity on the computer is treated as virus/worm. In actual these are programs and codes written by some computer. Virus can cause on computer such as  1.It may take space on Hard Disk.  2.Opening some programs.  3.Generating some messages.  4.Slow down the computer.  5.Delete your valuable data.  6.Unwanted activity over screen.  7.Crash the Hard Disk.  8.Unable to boot.
  • 8.
  • 9. Types of viruses 1. Direct Action Virus The main purpose of this virus is to replicate and take action when it is executed.
  • 10. 2. Resident Viruses This type of virus is a permanent which dwells in the RAM memory.
  • 11. 3.Overwrite Virus Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.  The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content. The object oriented analysis and design is divided into two phases – OOA (Object Oriented Analysis) and OOD (Object Oriented Design)
  • 12. Original file My computer/c/folder/file Infected file My computer/d/new folder.. 4. Directory Virus
  • 13. Difference Between a Computer Virus, Worm and Trojan Horse 1. Computer Virus-1. Computer Virus- A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels like a human virus. 1. It effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the infected program. 2. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.  3. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.
  • 14.
  • 15. 2.Worm- A worm is similar to a virus and considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.  Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding.
  • 16.
  • 17. 3.Trojan Horse- When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised.  Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
  • 18.
  • 19. Antivirus software An antivirus is a computer program that identify and remove computer viruses and other malicious software like worms and Trojans from an infected computer. Not only this, antivirus software also protects the computer from further virus attacks.
  • 20. Symptoms of infected computer ●In My Computer, autoplay option appears instead of open in every drive you enter i.e. when you click drive letters(C,D,E etc) a window opens to select any one program to select any one program to open with. ●Computer becomes slow & there is noticeable delay in characters to appear on screen when you press in keyboard
  • 21. ● command prompts doesn't open, if it does close suddenly. ● You cannot open system utilities like Task Manager, Regedit, Msconfig it opens and suddenly closes.
  • 22. What to do on Suspecting virus attack ●Disconnect the suspected computer system from the internet as well as from the local network. ●Start the system in safe mode or from the windows boot disk, if it displays any problem in starting. ●Take backup of all data to an external drive.
  • 23.  Install antivirus software if you do not have it installed.  Now, download the latest virus definition updates from the internet (do it on a separate computer)  Perform a full system scan.
  • 24. Top Anti-Virus Software  Shield Deluxe - Antivirus & Antispyware.  Spyware Doctor & Antivirus  F Pront Antivirus  Bit Defender Antivirus Plus  Ashampo Antivirus
  • 25. 1. Shield Deluxe - Antivirus & AntiSpyware. The Shield Deluxe 2009, powered by BitDefender award winning Antivirus engine. It provides advanced proactive protection against viruses, spyware, attacks and identity theft. Stay one step ahead of the latest e-Threats while maintaining superior performance that keeps your PC running smoothly. The Shield Deluxe is simple to install and set up, while offering advanced users a range of versatile settings for fine-tuning the program. $29.99 to register  
  • 26. 2. Spyware Doctor & Antivirus- Award-winning spyware and virus protection to secure your PC. Spyware Doctor with AntiVirus is a top-rated malware, spyware & virus removal utility that detects, removes and protects your PC from thousands of potential spyware, adware, trojans, viruses, keyloggers, spybots and tracking threats.
  • 27. 3. F Pront Antivirus Tired of clunky AV programs that slow down your computer and constantly interfere with your work or when you send email? F-PROT Antivirus for Windowsis legendary for their high security, streamlined efficiency and very low resource consumption. F-PROT for Windows runs as good on Win XP Pro as it does on Win98. Many millions have chosen F-PROT worldwide. F-PROT will keep your computer secure and keep out of your way.
  • 28. 4.BitDefender Antivirus Plus NEW Bit Defender Antivirus Plus v10 integrates ANTIVIRUS, ANTISPYWARE, FIREWALL and ANTISPAM modules into one comprehensive security package that protects your personal computer.
  • 29. 5.Ashampo Antivirus Ashampoo AntiVirus gives you comprehensive protection against viruses, worms, Trojans and dialers, but it`s so efficient you won`t even notice it`s there. And its so easy to use that it won`t waste any of your valuable time. Just set it and forget it and get on with more important things.
  • 30. Antivirus software factors 1. How frequently are virus definitions update? Virus definitions can be considered as rules which the antivirus software will use to determine whether a program is malicious or not. The latest virus definitions are the better chance of detection.
  • 31. 2. Is automatic update of virus definitions available? Having the virus definitions updated automatically not only ensures that your software is up to date but it eliminates the possibility of you forgetting to manually update them.
  • 32. 3. Does the software has the option to set up routine scanning of the computer? The best way to ensure your computer really has no viruses is to have an antivirus program which can be set up to perform automatic scans of the system on a regular basis.
  • 33. 4. How much resource it consumes while performing a scan? It is really a headache working on other applications while an antivirus program is scanning the computer, specially when your computer has low memory. When an antivirus program consume considerable amount of CPU & memory.
  • 34. Anti-Virus Action 1.Attempt to repair the file by removing the virus itself from the file.
  • 35. • 2.Quarantine the file (such that the file remains inaccessible to other programs & it’s virus can no longer spread) I want to spread..
  • 36. 3. The anti-Virus software examines each & every file in a computer & examines the contain with the virus definitions if threat is found then delete the infected file Virus found
  • 37. General precautions When inserting removable media (floppy, CD, flash drive etc) scan the whole device with the antivirus software before opening it. If you have internet access, make sure you use internet security software.
  • 38. Get window updates. From time to time, update your installed software to their latest version. e.g. (MS office, java, flash player etc) You should have an updated antivirus guarding your PC all time.