SlideShare a Scribd company logo
1. DEFINITION OF COMPUTER VIRUS
2. TYPES OF COMPUTER VIRUSES
3. EXPLANATION OF COMPUTER VIRUSES
4. DEFINITION OF COMPUTER ANTI-VIRUS
5. TYPES OF COMPUTER ANTI-VIRUSES
6. EXPLANATION OF ANTI-VIRUSES
7. TOP FIVE COMPUTER ANTI-VIRUSES
A computer virus has been defined as a set of
computer instructions that reproduces
itself and it may attach to other executable
code.
Usually this code is a short program that
may either embed in other code or stand on
it's own.
In essence, this computer program is
designed to infect some aspect of the host
computer and then copy itself as much and
as often as it has the chance.
COMPUTER
VIRUSES
BOOT
SECTO
R
VIRUS

FILE
INFECTIO
N VIRUS

MULTIPART
EMAI
NETWORK
ITE
L
VIRUS
VIRUS
VIRUS

MACR
O
VIRUS
BOOT VIRUS:
Viruses that aim at the boot sector of a hard drive are infecting
a very crucial component of the boot process.
Examples, Polyboot.B and AntiEXE.
FILE INFECTION VIRUS:
These infect executable program files, such as those with
extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and
.SYS (device driver).
Examples, Sunday and Cascade.
MULTIPARTITE VIRUS:
Viruses that are both a file virus and a boot sector virus. They
enter the computer via various sorts of media and then embed
themselves in the system memory. They then go into the hard
drive and infect the boot sector. Examples, Invader, Flip, and
NETWORK VIRUS:
A virus that is especially made for networks is uniquely created
to quickly spread throughout the local area network and
generally across the internet as well. Examples , Christmas
tree and wank worm.

EMAIL VIRUS:
A e-mail virus is one of those types of computer viruses that is
generally a macro virus and it will multiply itself by seeking out
the other contacts in a e-mail address book.
Examples , ILOVEYOU and Melissa.
MACRO VIRUS;
A macro virus is a new type of computer virus that infects the
macros within a document or template. When you open a word
processing or spread sheet document, the macro virus is
Antivirus software is used to
prevent, detect, and remove malware and
other computer viruses. Anti virus software
systems detections involve searching for
known malicious patterns in executable code.
It is possible for a user to be infected with
new viruses that have no sign or symptoms or
existence.
CONVENTIONAL DISK SCANNERS:
This is the standard virus check program. It is run when the user
requests it, and it scans the contents of the disks, directories or
files that the user wants, for any boot sectors and/or files that
contain viruses that it recognizes, based on the virus description
information in its virus definition files.

MEMORY RESIDENT SCANNERS:
Some antivirus software now comes with a special program that
sits in the background while you use your PC and automatically
scans for viruses based on different triggers.

START UP SCANNERS:
Antivirus products often come with a special program that is
designed to be run every time the PC is booted up.

INOCULATION:
This is a totally different approach to virus detection. Instead of
looking for the viruses themselves, this technique looks for the
changes that the viruses make to files and boot sectors.
1.
2.
3.
4.
5.

AVG.
McAFEE.
NORTON (SYMANTEC).
KASPERSKY.
AD AWARE.
viruses and anti-viruses, computer battles

More Related Content

More from Muhammad Ali Bhalli Zada

Thermal Fatigue Analysis of steel plate
Thermal Fatigue Analysis of steel plateThermal Fatigue Analysis of steel plate
Thermal Fatigue Analysis of steel plate
Muhammad Ali Bhalli Zada
 
Differential equations
Differential equationsDifferential equations
Differential equations
Muhammad Ali Bhalli Zada
 
Induction motor
Induction motorInduction motor
Induction motor
Muhammad Ali Bhalli Zada
 
Design and fabrication of hydraulic lift
Design and fabrication of hydraulic liftDesign and fabrication of hydraulic lift
Design and fabrication of hydraulic lift
Muhammad Ali Bhalli Zada
 
Four stroke petrol engine
Four stroke petrol engineFour stroke petrol engine
Four stroke petrol engine
Muhammad Ali Bhalli Zada
 
Wedding project management
Wedding project managementWedding project management
Wedding project management
Muhammad Ali Bhalli Zada
 

More from Muhammad Ali Bhalli Zada (6)

Thermal Fatigue Analysis of steel plate
Thermal Fatigue Analysis of steel plateThermal Fatigue Analysis of steel plate
Thermal Fatigue Analysis of steel plate
 
Differential equations
Differential equationsDifferential equations
Differential equations
 
Induction motor
Induction motorInduction motor
Induction motor
 
Design and fabrication of hydraulic lift
Design and fabrication of hydraulic liftDesign and fabrication of hydraulic lift
Design and fabrication of hydraulic lift
 
Four stroke petrol engine
Four stroke petrol engineFour stroke petrol engine
Four stroke petrol engine
 
Wedding project management
Wedding project managementWedding project management
Wedding project management
 

Recently uploaded

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

viruses and anti-viruses, computer battles

  • 1.
  • 2. 1. DEFINITION OF COMPUTER VIRUS 2. TYPES OF COMPUTER VIRUSES 3. EXPLANATION OF COMPUTER VIRUSES 4. DEFINITION OF COMPUTER ANTI-VIRUS 5. TYPES OF COMPUTER ANTI-VIRUSES 6. EXPLANATION OF ANTI-VIRUSES 7. TOP FIVE COMPUTER ANTI-VIRUSES
  • 3. A computer virus has been defined as a set of computer instructions that reproduces itself and it may attach to other executable code. Usually this code is a short program that may either embed in other code or stand on it's own. In essence, this computer program is designed to infect some aspect of the host computer and then copy itself as much and as often as it has the chance.
  • 5. BOOT VIRUS: Viruses that aim at the boot sector of a hard drive are infecting a very crucial component of the boot process. Examples, Polyboot.B and AntiEXE. FILE INFECTION VIRUS: These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). Examples, Sunday and Cascade. MULTIPARTITE VIRUS: Viruses that are both a file virus and a boot sector virus. They enter the computer via various sorts of media and then embed themselves in the system memory. They then go into the hard drive and infect the boot sector. Examples, Invader, Flip, and
  • 6. NETWORK VIRUS: A virus that is especially made for networks is uniquely created to quickly spread throughout the local area network and generally across the internet as well. Examples , Christmas tree and wank worm. EMAIL VIRUS: A e-mail virus is one of those types of computer viruses that is generally a macro virus and it will multiply itself by seeking out the other contacts in a e-mail address book. Examples , ILOVEYOU and Melissa. MACRO VIRUS; A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spread sheet document, the macro virus is
  • 7. Antivirus software is used to prevent, detect, and remove malware and other computer viruses. Anti virus software systems detections involve searching for known malicious patterns in executable code. It is possible for a user to be infected with new viruses that have no sign or symptoms or existence.
  • 8.
  • 9. CONVENTIONAL DISK SCANNERS: This is the standard virus check program. It is run when the user requests it, and it scans the contents of the disks, directories or files that the user wants, for any boot sectors and/or files that contain viruses that it recognizes, based on the virus description information in its virus definition files. MEMORY RESIDENT SCANNERS: Some antivirus software now comes with a special program that sits in the background while you use your PC and automatically scans for viruses based on different triggers. START UP SCANNERS: Antivirus products often come with a special program that is designed to be run every time the PC is booted up. INOCULATION: This is a totally different approach to virus detection. Instead of looking for the viruses themselves, this technique looks for the changes that the viruses make to files and boot sectors.