SlideShare a Scribd company logo
VIRUSES
AND
ANTI- VIRUSES
SUBMITTED BY : RISHABH BHARADWAJ
VIRUS
1. DEFINITION- WHAT EXACTLY IS A VIRUS?
2. TYPES OF VIRUSES :
1. FILE OR PROGRAM VIRUSES
2. BOOT SECTOR VIRUSES
3. MULTIPARTITE VIRUSES
4. STEALTH VIRUSES
5. POLYMORPHIC VIRUSES
6. MACRO VIRUSES
TOP 5 DESTRUCTIVE AND DANGEROUS VIRUSES
1. I LOVE YOU VIRUS (2000)
2. CODE RED VIRUS (2001)
3. SAPPHIRE (2003)
4. SASSER AND NETSKY (PRESENT)
5. STORMWORM NUWAR VIRUS (SINCE 2007 TO PRESENT)
FUNCTIONAL ELEMENTS OF A VIRUS
TWO BASIC PARTS :
1.SEARCH ROUTINE
2. “.COM” AND “.EXE” FILES
TOOLS NEEDED FOR WRITING VIRUS
ASSEMBLY LANGUAGE
VIRUSES - IN DETAIL
1. FILE OR PROGRAM VIRUSES
2. SIMPLE COM FILE INFECTOR
3. AN OUTLINE FOR A VIRUS – ITS TYPES :
1. AN EXECUTABLE VIRUS
2. BOOT SECTOR VIRUS
3. MULTIPARTITE VIRUSES
4. STEALTH VIRUSES
5. POLYMORPHIC VIRUSES
6. MACRO VIRUSES
ANTIVIRUS
1. DEFINITION
2. SIGNATURE BASED DETECTION
3. HEURISTICS ANALYSIS
4. ROOTKIT DETECTION
5. REALTIME PROTECTION
EFFECTIVENESS OF ANTIVIRUSES
1. STUDIES IN DECEMBER 2007
2. MAJOR VIRUS SCANNERS
3. NETWORK FIREWALL
4. SPECIALIST TOOLS
5. USAGE AND RISKS
DRAWBACKS
1. IMPAIRS COMPUTER’S PERFORMANCE
2. LULLED INTO A FALSE SENSE OF SECURITY
3. ON EMPLOYING HEURISTIC APPROACH, IT MUST BE
FINE TUNED
4. RUNS AT THE HIGHLY TRUSTED KERNEL LEVEL, THUS
CREATING A POTENTIAL AVENUE OF ATTACK
5. VARIOUS METHODS TO IDENTIFY MALWARE
NEW VIRUSES
1. ANTIVIRUS ARE NOT ALWAYS EFFECTIVE.
2. ARE PRETESTED BY THE VIRUS DESIGNERS
3. RANSOMWARE – USE POLYMORPHIC CODE TO AVOID
DETECTION
4. RESULT IN DAMAGED FILES.
5. FIRMWARE ISSUES – REQUIRE THE BIOS CHIP.
PROBLEMS CAUSED BY FALSE POSITIVE
1. DEFINATION OF "FALSE POSITIVE“.
2. A FALSE POSITIVE HAS ADVERSE EFFECT ON OPERATING
SYSTEM.
3. BAD CONDITION OCCUR FROM FAULTY VIRUSES IN PAST
YEAR.
4. PROBLEMS GENERATED DUE TO CONSCIENTIOUS ANTIVIRUS
IN YEAR 2010.
5. WINDOWS 7 DAMAGED DUE TO FAULTY UPDATE.
CONCLUSION
1. COMPUTER VIRUSES ARE NOT EVIL AND THAT PROGRAMMERS
HAVE A RIGHT TO CREATE THEM.
2. CARE SHOULD BE TAKEN ON CREATING A VIRUS, ELSE ONE CAN
WIPE OUT ONE’S OWN SYSTEM.
3. IT IS NECESSARY TO HAVE A DEEP KNOWLEDGE OF THE WAY IN
WHICH DIFFERENT VIRUSES EXPLOITS OUR SYSTEMS WEAKNESS.
4. IT IS ALSO IMPOSSIBLE TO CREATE ANTIVIRUS AGAINST A
PARTICULAR VIRUS.
THANKYOU…!!

More Related Content

Viewers also liked

Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
Prakriti Sharma
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
Lee Ray
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
Natasha Murashev
 

Viewers also liked (7)

Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to Virus and Antivirus

Advanced polymorphic techniques
Advanced polymorphic techniquesAdvanced polymorphic techniques
Advanced polymorphic techniquesUltraUploader
 
Advanced metamorphic techniques in computer viruses
Advanced metamorphic techniques in computer virusesAdvanced metamorphic techniques in computer viruses
Advanced metamorphic techniques in computer virusesUltraUploader
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Ali Al Sarraf
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
Mohit Jaiswal
 
Virus
VirusVirus
Virus
Protik Roy
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alishba ijaz Muhammad Ijaz
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
Utkarsh Srivastava
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptx
SiddeshGowda8
 
Computer viruses
Computer virusesComputer viruses
Computer virusesImran Khan
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Mahesh Prajapati
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
Computer virus
Computer virusComputer virus
Computer virus
BGS Model Public School
 
Virus
Virus Virus
Malware
MalwareMalware
Malware
Tuhin_Das
 
Automatic extraction of computer virus signatures
Automatic extraction of computer virus signaturesAutomatic extraction of computer virus signatures
Automatic extraction of computer virus signaturesUltraUploader
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special virusesUltraUploader
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
Pratimesh Pathak
 
Computer viruses
Computer virusesComputer viruses
Computer virusesshopnil786
 

Similar to Virus and Antivirus (20)

Advanced polymorphic techniques
Advanced polymorphic techniquesAdvanced polymorphic techniques
Advanced polymorphic techniques
 
Advanced metamorphic techniques in computer viruses
Advanced metamorphic techniques in computer virusesAdvanced metamorphic techniques in computer viruses
Advanced metamorphic techniques in computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Virus
Virus Virus
Virus
 
Malware
MalwareMalware
Malware
 
Automatic extraction of computer virus signatures
Automatic extraction of computer virus signaturesAutomatic extraction of computer virus signatures
Automatic extraction of computer virus signatures
 
radhika.pdf
radhika.pdfradhika.pdf
radhika.pdf
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special viruses
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 

Virus and Antivirus

  • 2. VIRUS 1. DEFINITION- WHAT EXACTLY IS A VIRUS? 2. TYPES OF VIRUSES : 1. FILE OR PROGRAM VIRUSES 2. BOOT SECTOR VIRUSES 3. MULTIPARTITE VIRUSES 4. STEALTH VIRUSES 5. POLYMORPHIC VIRUSES 6. MACRO VIRUSES
  • 3. TOP 5 DESTRUCTIVE AND DANGEROUS VIRUSES 1. I LOVE YOU VIRUS (2000) 2. CODE RED VIRUS (2001) 3. SAPPHIRE (2003) 4. SASSER AND NETSKY (PRESENT) 5. STORMWORM NUWAR VIRUS (SINCE 2007 TO PRESENT)
  • 4. FUNCTIONAL ELEMENTS OF A VIRUS TWO BASIC PARTS : 1.SEARCH ROUTINE 2. “.COM” AND “.EXE” FILES TOOLS NEEDED FOR WRITING VIRUS ASSEMBLY LANGUAGE
  • 5. VIRUSES - IN DETAIL 1. FILE OR PROGRAM VIRUSES 2. SIMPLE COM FILE INFECTOR 3. AN OUTLINE FOR A VIRUS – ITS TYPES : 1. AN EXECUTABLE VIRUS 2. BOOT SECTOR VIRUS 3. MULTIPARTITE VIRUSES 4. STEALTH VIRUSES 5. POLYMORPHIC VIRUSES 6. MACRO VIRUSES
  • 6. ANTIVIRUS 1. DEFINITION 2. SIGNATURE BASED DETECTION 3. HEURISTICS ANALYSIS 4. ROOTKIT DETECTION 5. REALTIME PROTECTION
  • 7. EFFECTIVENESS OF ANTIVIRUSES 1. STUDIES IN DECEMBER 2007 2. MAJOR VIRUS SCANNERS 3. NETWORK FIREWALL 4. SPECIALIST TOOLS 5. USAGE AND RISKS
  • 8. DRAWBACKS 1. IMPAIRS COMPUTER’S PERFORMANCE 2. LULLED INTO A FALSE SENSE OF SECURITY 3. ON EMPLOYING HEURISTIC APPROACH, IT MUST BE FINE TUNED 4. RUNS AT THE HIGHLY TRUSTED KERNEL LEVEL, THUS CREATING A POTENTIAL AVENUE OF ATTACK 5. VARIOUS METHODS TO IDENTIFY MALWARE
  • 9. NEW VIRUSES 1. ANTIVIRUS ARE NOT ALWAYS EFFECTIVE. 2. ARE PRETESTED BY THE VIRUS DESIGNERS 3. RANSOMWARE – USE POLYMORPHIC CODE TO AVOID DETECTION 4. RESULT IN DAMAGED FILES. 5. FIRMWARE ISSUES – REQUIRE THE BIOS CHIP.
  • 10. PROBLEMS CAUSED BY FALSE POSITIVE 1. DEFINATION OF "FALSE POSITIVE“. 2. A FALSE POSITIVE HAS ADVERSE EFFECT ON OPERATING SYSTEM. 3. BAD CONDITION OCCUR FROM FAULTY VIRUSES IN PAST YEAR. 4. PROBLEMS GENERATED DUE TO CONSCIENTIOUS ANTIVIRUS IN YEAR 2010. 5. WINDOWS 7 DAMAGED DUE TO FAULTY UPDATE.
  • 11. CONCLUSION 1. COMPUTER VIRUSES ARE NOT EVIL AND THAT PROGRAMMERS HAVE A RIGHT TO CREATE THEM. 2. CARE SHOULD BE TAKEN ON CREATING A VIRUS, ELSE ONE CAN WIPE OUT ONE’S OWN SYSTEM. 3. IT IS NECESSARY TO HAVE A DEEP KNOWLEDGE OF THE WAY IN WHICH DIFFERENT VIRUSES EXPLOITS OUR SYSTEMS WEAKNESS. 4. IT IS ALSO IMPOSSIBLE TO CREATE ANTIVIRUS AGAINST A PARTICULAR VIRUS.