SlideShare a Scribd company logo
1 of 6
 INTRODUCTION               TO VIRUSES

     SOME    HARMFUL VIRUSES

 HOW DO   VIRUSES ENTER COMPUTER?

    PREVENTION FROM              VIRUSES
                                                        1


                                             2/5/2013
             COMPUTER VIRUSES
 A computer virus is a computer program that
     can replicate itself and spread from one
  computer to another. The term "virus" is also
   commonly, but erroneously, used to refer to
    other types of malware, including but not
limited to adware and spyware programs that do
         not have a reproductive ability.



                                                   2

                                        2/5/2013
               COMPUTER VIRUSES
  The Morris worm
     The Concept virus
           CIH
 The Anna Kournikova worm
       ILOVEYOU
     The Melissa virus
    The Blaster Worm
    Net sky and Sasser
   OSX/RS Plug Trojan
       Storm worm                      3


                             2/5/2013
     COMPUTER VIRUSES
    Viruses may be sent by opening email attachments, clicking
     on spam, visiting corrupt websites and links online, opening
      spreadsheets or even the original method—infected disks.

       Some aggressive viruses—such as the Melissa virus—
    automatically duplicate copies of itself to the first 50 people in
     your computer email address book. A frightening prospect—
     opening an email from someone you trust to be greeted by a
                                virus.

   Even by downloading and uploading on internet things like:-
                   audio , video , images ,etc
                                                                     4


                                                          2/5/2013
                       COMPUTER VIRUSES
   Make sure that your operating system is up-to-date.

   Make sure to install the latest antivirus software and be sure to
                download updates when they emerge.

    It also is a good idea to install a firewall for extra security and
                                 protection.

   Instant Messenger can carry viruses, Trojan horses, and worms.
    Don’t send files over IM and don’t open attachments or click on
              Web links sent by someone you don’t know.
                                                                         5


                                                              2/5/2013
                        COMPUTER VIRUSES
HOPE YOU LIKE THE
  PRESENTATION



     THE END           2/5/2013
                                  6




    COMPUTER VIRUSES

More Related Content

What's hot

Code Red Worm
Code Red WormCode Red Worm
Code Red WormRaDe0N
 
wiki 1 spyware
wiki 1 spywarewiki 1 spyware
wiki 1 spywarenuramirah
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security LandscapePeter Wood
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIROTakagi Kun
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 
The 5 worst viruses of all time
The 5 worst viruses of all timeThe 5 worst viruses of all time
The 5 worst viruses of all timekanika sharma
 
Spreading virus
Spreading virusSpreading virus
Spreading virusdixitas
 
Nimda Worm
Nimda WormNimda Worm
Nimda WormGoaway96
 
Computer virus
Computer virusComputer virus
Computer virusomroyal
 
Computer viruses
Computer virusesComputer viruses
Computer virusesqwertyf
 
Computer virus presenatation
Computer virus presenatationComputer virus presenatation
Computer virus presenatationrarediamond_2012
 
computer virus
computer viruscomputer virus
computer virusMitesh04
 
My Doom Worm
My Doom WormMy Doom Worm
My Doom WormJeradeB
 

What's hot (20)

Code Red Worm
Code Red WormCode Red Worm
Code Red Worm
 
wiki 1 spyware
wiki 1 spywarewiki 1 spyware
wiki 1 spyware
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security Landscape
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIRO
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
The 5 worst viruses of all time
The 5 worst viruses of all timeThe 5 worst viruses of all time
The 5 worst viruses of all time
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 
Nimda Worm
Nimda WormNimda Worm
Nimda Worm
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus presenatation
Computer virus presenatationComputer virus presenatation
Computer virus presenatation
 
Senior seminar virus
Senior seminar virusSenior seminar virus
Senior seminar virus
 
Virus
VirusVirus
Virus
 
computer virus
computer viruscomputer virus
computer virus
 
Malware
MalwareMalware
Malware
 
Melissa Virus
Melissa VirusMelissa Virus
Melissa Virus
 
What is a 0 day exploit?
What is a 0 day exploit?What is a 0 day exploit?
What is a 0 day exploit?
 
My Doom Worm
My Doom WormMy Doom Worm
My Doom Worm
 

Similar to Viruses

Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesadni_shadah
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Social impacts of it
Social impacts of it Social impacts of it
Social impacts of it Amit Jaglan
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2ianpoblete13
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingmentcheauyih
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 

Similar to Viruses (20)

COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Social impacts of it
Social impacts of it Social impacts of it
Social impacts of it
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Viruses

  • 1.  INTRODUCTION TO VIRUSES  SOME HARMFUL VIRUSES  HOW DO VIRUSES ENTER COMPUTER?  PREVENTION FROM VIRUSES 1 2/5/2013 COMPUTER VIRUSES
  • 2.  A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. 2 2/5/2013 COMPUTER VIRUSES
  • 3.  The Morris worm  The Concept virus  CIH  The Anna Kournikova worm  ILOVEYOU  The Melissa virus  The Blaster Worm  Net sky and Sasser  OSX/RS Plug Trojan  Storm worm 3 2/5/2013 COMPUTER VIRUSES
  • 4. Viruses may be sent by opening email attachments, clicking on spam, visiting corrupt websites and links online, opening spreadsheets or even the original method—infected disks.  Some aggressive viruses—such as the Melissa virus— automatically duplicate copies of itself to the first 50 people in your computer email address book. A frightening prospect— opening an email from someone you trust to be greeted by a virus.  Even by downloading and uploading on internet things like:- audio , video , images ,etc 4 2/5/2013 COMPUTER VIRUSES
  • 5. Make sure that your operating system is up-to-date.  Make sure to install the latest antivirus software and be sure to download updates when they emerge.  It also is a good idea to install a firewall for extra security and protection.  Instant Messenger can carry viruses, Trojan horses, and worms. Don’t send files over IM and don’t open attachments or click on Web links sent by someone you don’t know. 5 2/5/2013 COMPUTER VIRUSES
  • 6. HOPE YOU LIKE THE PRESENTATION THE END 2/5/2013 6 COMPUTER VIRUSES