The document discusses computer viruses, how they spread and affect systems. It describes how the first virus, called "Creeper, was created in 1970s and outlines common ways viruses enter systems like through email attachments. Different virus types are outlined like memory resident viruses, boot sector viruses and macro viruses that hide in various parts of the system. Symptoms of virus infection and basic prevention tips are provided.
Computer viruses are programs that replicate and spread like biological viruses. They can slow down systems, erase files, or crash computers by formatting disks. Viruses spread by attaching to other files and transferring via external drives or infected repair disks. There are several types of viruses like boot, polymorphic, macro, and worm viruses as well as Trojan horses. To prevent viruses, users should install antivirus software, regularly update it, be wary of email attachments, avoid unnecessary downloads, and only install registered software. Popular antivirus programs include Norton, McAfee, Avast, Quick Heal, and Panda.
This document defines a computer virus and discusses how viruses spread and the types of damage they can cause. It outlines symptoms of a virus infection and types of viruses like boot sector viruses, macro viruses, and script viruses. The document recommends installing antivirus software from reputable companies, backing up files regularly, being cautious of email attachments, and avoiding unknown programs as ways to prevent virus infections.
Computer virus is a harmful software program written intentionally to enter a computer without the user's permission or knowledge. There are different types of viruses which can be classified according to their origin, techniques, types of files they infect, where they hide, the kind of damage they cause, the type of operating system, or platform they attack.
http://computerdoctor-bg.com/
This document discusses different types of computer viruses and how to prevent and deal with viruses. It begins by defining what a computer virus is. It then describes 18 common types of viruses in detail, including resident, multipartite, direct action, overwrite, boot, macro, and polymorphic viruses. It also discusses worms, Trojans, and logic bombs. The document outlines general characteristics of viruses and how they can infect systems. It concludes by providing tips for preventing virus infections through antivirus software, replacing infected files, restarting from healthy disks, and reformatting disks if needed.
This document discusses various antiviral drugs used to treat viral eye infections caused by DNA and RNA viruses such as herpes simplex virus and cytomegalovirus. It describes first and second generation antiviral drugs such as trifluorothymidine, acyclovir, ganciclovir and foscarnet. It provides details on the mechanisms of action, indications, dosages and side effects of these drugs for treating ocular conditions.
The document provides information about computer viruses, including what they are, how they spread, notable early viruses, types of viruses, signs of infection, and how to detect and prevent viruses. It begins with acknowledging those who helped with the project. It defines a computer virus and explains how they replicate and cause harm. It discusses how viruses spread through various means like email attachments, networks, infected disks, and more. It notes that the first virus was Brain in 1986. It outlines different types of viruses like Trojans, spyware, worms, and more. It lists signs of infection like slow performance, apps not starting, and security programs being disabled. It concludes with tips for preventing viruses like using antivirus software, avoiding suspicious
The document discusses computer viruses, how they spread and affect systems. It describes how the first virus, called "Creeper, was created in 1970s and outlines common ways viruses enter systems like through email attachments. Different virus types are outlined like memory resident viruses, boot sector viruses and macro viruses that hide in various parts of the system. Symptoms of virus infection and basic prevention tips are provided.
Computer viruses are programs that replicate and spread like biological viruses. They can slow down systems, erase files, or crash computers by formatting disks. Viruses spread by attaching to other files and transferring via external drives or infected repair disks. There are several types of viruses like boot, polymorphic, macro, and worm viruses as well as Trojan horses. To prevent viruses, users should install antivirus software, regularly update it, be wary of email attachments, avoid unnecessary downloads, and only install registered software. Popular antivirus programs include Norton, McAfee, Avast, Quick Heal, and Panda.
This document defines a computer virus and discusses how viruses spread and the types of damage they can cause. It outlines symptoms of a virus infection and types of viruses like boot sector viruses, macro viruses, and script viruses. The document recommends installing antivirus software from reputable companies, backing up files regularly, being cautious of email attachments, and avoiding unknown programs as ways to prevent virus infections.
Computer virus is a harmful software program written intentionally to enter a computer without the user's permission or knowledge. There are different types of viruses which can be classified according to their origin, techniques, types of files they infect, where they hide, the kind of damage they cause, the type of operating system, or platform they attack.
http://computerdoctor-bg.com/
This document discusses different types of computer viruses and how to prevent and deal with viruses. It begins by defining what a computer virus is. It then describes 18 common types of viruses in detail, including resident, multipartite, direct action, overwrite, boot, macro, and polymorphic viruses. It also discusses worms, Trojans, and logic bombs. The document outlines general characteristics of viruses and how they can infect systems. It concludes by providing tips for preventing virus infections through antivirus software, replacing infected files, restarting from healthy disks, and reformatting disks if needed.
This document discusses various antiviral drugs used to treat viral eye infections caused by DNA and RNA viruses such as herpes simplex virus and cytomegalovirus. It describes first and second generation antiviral drugs such as trifluorothymidine, acyclovir, ganciclovir and foscarnet. It provides details on the mechanisms of action, indications, dosages and side effects of these drugs for treating ocular conditions.
The document provides information about computer viruses, including what they are, how they spread, notable early viruses, types of viruses, signs of infection, and how to detect and prevent viruses. It begins with acknowledging those who helped with the project. It defines a computer virus and explains how they replicate and cause harm. It discusses how viruses spread through various means like email attachments, networks, infected disks, and more. It notes that the first virus was Brain in 1986. It outlines different types of viruses like Trojans, spyware, worms, and more. It lists signs of infection like slow performance, apps not starting, and security programs being disabled. It concludes with tips for preventing viruses like using antivirus software, avoiding suspicious
This document summarizes a project on analyzing the thermal fatigue of steel plates. The project aims to design and fabricate a thermal fatigue setup, analyze the thermal fatigue life of steel plates, and investigate crack initiation, propagation, and blunting. The methodology involves building the experimental setup, testing steel plate samples through temperature cycles, and analyzing the resulting crack behavior and fatigue life. A literature review presented research on the thermal fatigue of various stainless steel materials tested through temperature cycles from 20°C to 600°C. The project schedule outlines phases from October 2016 to May 2017 for tasks like collecting data, experimental work, analyzing results, and completing a report.
This document contains information about a group project on differential equations. It lists the group members and covers topics like the invention of differential equations, types of ordinary and partial differential equations, applications, and examples. The group will discuss differential equations including the history, basic concepts of ODEs and PDEs, types like first and second order ODEs, linear and non-linear PDEs, and applications in fields like mechanics, physics, and engineering.
The document discusses induction motors. It explains that an induction motor works by electromagnetic induction, where the alternating current in the stator produces a rotating magnetic field that induces current in the rotor and causes it to turn. It describes the basic components of induction motors including the stator, rotor, and housing. It also discusses how varying the frequency of the alternating current supply can be used to control the motor's speed.
This document discusses the design and fabrication process. It likely outlines the steps involved in conceptualizing, planning, and physically creating a product or structure. The key aspects covered are coming up with a design concept, developing detailed plans and specifications, and then manufacturing or building the item according to the design.
This document discusses the four-stroke petrol engine. It provides an introduction to four-stroke engines and their basic components. It then describes the four strokes of the engine's cycle: the intake stroke, compression stroke, power stroke, and exhaust stroke. The document also discusses the thermodynamic process, advantages and disadvantages, applications, and lubrication of the four-stroke petrol engine. It was authored by four students - Muhammad Ali, Muhammad Akhtar, Muhammad Waseem, and Usman Sajid.
Wedding project management involves planning all aspects of a wedding within budget, schedule, and scope constraints. Key elements include finalizing vendor contracts, sending invitations, obtaining a marriage license, rehearsal, and reception logistics. A wedding scope statement outlines all deliverables such as guest list, travel, accommodations, flowers, favors, registry, rehearsal dinner, venue, attire, photography, and honeymoon. Careful management is needed to balance costs, timeline, and guest expectations for a successful wedding.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
This document summarizes a project on analyzing the thermal fatigue of steel plates. The project aims to design and fabricate a thermal fatigue setup, analyze the thermal fatigue life of steel plates, and investigate crack initiation, propagation, and blunting. The methodology involves building the experimental setup, testing steel plate samples through temperature cycles, and analyzing the resulting crack behavior and fatigue life. A literature review presented research on the thermal fatigue of various stainless steel materials tested through temperature cycles from 20°C to 600°C. The project schedule outlines phases from October 2016 to May 2017 for tasks like collecting data, experimental work, analyzing results, and completing a report.
This document contains information about a group project on differential equations. It lists the group members and covers topics like the invention of differential equations, types of ordinary and partial differential equations, applications, and examples. The group will discuss differential equations including the history, basic concepts of ODEs and PDEs, types like first and second order ODEs, linear and non-linear PDEs, and applications in fields like mechanics, physics, and engineering.
The document discusses induction motors. It explains that an induction motor works by electromagnetic induction, where the alternating current in the stator produces a rotating magnetic field that induces current in the rotor and causes it to turn. It describes the basic components of induction motors including the stator, rotor, and housing. It also discusses how varying the frequency of the alternating current supply can be used to control the motor's speed.
This document discusses the design and fabrication process. It likely outlines the steps involved in conceptualizing, planning, and physically creating a product or structure. The key aspects covered are coming up with a design concept, developing detailed plans and specifications, and then manufacturing or building the item according to the design.
This document discusses the four-stroke petrol engine. It provides an introduction to four-stroke engines and their basic components. It then describes the four strokes of the engine's cycle: the intake stroke, compression stroke, power stroke, and exhaust stroke. The document also discusses the thermodynamic process, advantages and disadvantages, applications, and lubrication of the four-stroke petrol engine. It was authored by four students - Muhammad Ali, Muhammad Akhtar, Muhammad Waseem, and Usman Sajid.
Wedding project management involves planning all aspects of a wedding within budget, schedule, and scope constraints. Key elements include finalizing vendor contracts, sending invitations, obtaining a marriage license, rehearsal, and reception logistics. A wedding scope statement outlines all deliverables such as guest list, travel, accommodations, flowers, favors, registry, rehearsal dinner, venue, attire, photography, and honeymoon. Careful management is needed to balance costs, timeline, and guest expectations for a successful wedding.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
HCL Notes and Domino License Cost Reduction in the World of DLAU
viruses and anti-viruses, computer battles
1.
2. 1. DEFINITION OF COMPUTER VIRUS
2. TYPES OF COMPUTER VIRUSES
3. EXPLANATION OF COMPUTER VIRUSES
4. DEFINITION OF COMPUTER ANTI-VIRUS
5. TYPES OF COMPUTER ANTI-VIRUSES
6. EXPLANATION OF ANTI-VIRUSES
7. TOP FIVE COMPUTER ANTI-VIRUSES
3. A computer virus has been defined as a set of
computer instructions that reproduces
itself and it may attach to other executable
code.
Usually this code is a short program that
may either embed in other code or stand on
it's own.
In essence, this computer program is
designed to infect some aspect of the host
computer and then copy itself as much and
as often as it has the chance.
5. BOOT VIRUS:
Viruses that aim at the boot sector of a hard drive are infecting
a very crucial component of the boot process.
Examples, Polyboot.B and AntiEXE.
FILE INFECTION VIRUS:
These infect executable program files, such as those with
extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and
.SYS (device driver).
Examples, Sunday and Cascade.
MULTIPARTITE VIRUS:
Viruses that are both a file virus and a boot sector virus. They
enter the computer via various sorts of media and then embed
themselves in the system memory. They then go into the hard
drive and infect the boot sector. Examples, Invader, Flip, and
6. NETWORK VIRUS:
A virus that is especially made for networks is uniquely created
to quickly spread throughout the local area network and
generally across the internet as well. Examples , Christmas
tree and wank worm.
EMAIL VIRUS:
A e-mail virus is one of those types of computer viruses that is
generally a macro virus and it will multiply itself by seeking out
the other contacts in a e-mail address book.
Examples , ILOVEYOU and Melissa.
MACRO VIRUS;
A macro virus is a new type of computer virus that infects the
macros within a document or template. When you open a word
processing or spread sheet document, the macro virus is
7. Antivirus software is used to
prevent, detect, and remove malware and
other computer viruses. Anti virus software
systems detections involve searching for
known malicious patterns in executable code.
It is possible for a user to be infected with
new viruses that have no sign or symptoms or
existence.
8.
9. CONVENTIONAL DISK SCANNERS:
This is the standard virus check program. It is run when the user
requests it, and it scans the contents of the disks, directories or
files that the user wants, for any boot sectors and/or files that
contain viruses that it recognizes, based on the virus description
information in its virus definition files.
MEMORY RESIDENT SCANNERS:
Some antivirus software now comes with a special program that
sits in the background while you use your PC and automatically
scans for viruses based on different triggers.
START UP SCANNERS:
Antivirus products often come with a special program that is
designed to be run every time the PC is booted up.
INOCULATION:
This is a totally different approach to virus detection. Instead of
looking for the viruses themselves, this technique looks for the
changes that the viruses make to files and boot sectors.