SlideShare a Scribd company logo
A computer virus is a computer
   program that can copy itself and
infect a computer without permission
  or knowledge of the user. The term
 "virus" is also commonly used, albeit
erroneously, to refer to many different
     types of malware and adware
   programs. The original virus may
 modify the copies, or the copies may
   modify themselves, as occurs in a
           metamorphic virus.
   A virus can only spread from one computer to
    another when its host is taken to the
    uninfected computer, for instance by a user
    sending it over a network or the Internet, or
    by carrying it on a removable medium such
    as a floppy disk, CD, or USB drive.
   A virus is a small piece of software that
    piggybacks on real programs. For example, a
    virus might attach itself to a program such as
    a spreadsheet program. Each time the
    spreadsheet program runs, the virus runs,
    too, and it has the chance to reproduce (by
    attaching to other programs)
   An e-mail virus travels as an attachment to
    e-mail messages, and usually replicates itself
    by automatically mailing itself to dozens of
    people in the victim's e-mail address book.
    Some e-mail viruses don't even require a
    double-click -- they launch when you view
    the infected message in the preview pane of
    your e-mail software
   A Trojan horse is simply a computer program.
    The program claims to do one thing (it may
    claim to be a game) but instead does damage
    when you run it (it may erase your hard disk).
    Trojan horses have no way to replicate
    automatically.
   A worm is a small piece of software that uses
    computer networks and security holes to
    replicate itself. A copy of the worm scans the
    network for another machine that has a
    specific security hole. It copies itself to the
    new machine using the security hole, and
    then starts replicating from there, as well.
The first ever computer virus was developed in
    1986 by two Pakistani brothers in Lahore
                    Pakistan.
  It was named “Brain” and was designed by
 Amjad Farooq Alvi and Basit Farooq Alvi with
  the intention of discouraging the piracy of a
            software written by them.

More Related Content

What's hot

Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
Amna
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
NehaRohtagi1
 
Ransomware
RansomwareRansomware
Ransomware
G Prachi
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
Deepak Upadhyay
 

What's hot (20)

Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Ransomware
RansomwareRansomware
Ransomware
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Ransomware
RansomwareRansomware
Ransomware
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Computer virus
Computer virusComputer virus
Computer virus
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 

Viewers also liked

Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
Phương Anh Pađi
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Ali Al Sarraf
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
San Diego Continuing Education
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
Rohit Kashyap
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
Mohak Jain
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 

Viewers also liked (19)

Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Spray painting
Spray paintingSpray painting
Spray painting
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Zakat
ZakatZakat
Zakat
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Hacking
HackingHacking
Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Virus ppt
Virus pptVirus ppt
Virus ppt
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similar to Viruses And Hacking

Virus
VirusVirus
Virus
dddaou
 
Virus
VirusVirus
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
Computer Virus
Computer Virus Computer Virus
Computer Virus bebo
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
vipinkumar940
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesadni_shadah
 
Demonstration Presentation
Demonstration PresentationDemonstration Presentation
Demonstration PresentationJerry Reyes
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Computer Virus
Computer VirusComputer Virus
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarnnimmi_abes
 

Similar to Viruses And Hacking (20)

Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Demonstration Presentation
Demonstration PresentationDemonstration Presentation
Demonstration Presentation
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Virus
VirusVirus
Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 

More from Muhammad Fahd Un-Nabi Khan (11)

Robotics
Robotics Robotics
Robotics
 
Wimax
WimaxWimax
Wimax
 
Dengue fever
Dengue feverDengue fever
Dengue fever
 
Hajj
Hajj Hajj
Hajj
 
History and Importance of Ahadith
History and Importance of AhadithHistory and Importance of Ahadith
History and Importance of Ahadith
 
Makkah
MakkahMakkah
Makkah
 
Companions of Holy Prophet (pbuh)
Companions of Holy Prophet (pbuh)Companions of Holy Prophet (pbuh)
Companions of Holy Prophet (pbuh)
 
Elements, compounds and mixtures
Elements, compounds and mixturesElements, compounds and mixtures
Elements, compounds and mixtures
 
Converging lenses
Converging lensesConverging lenses
Converging lenses
 
Bonding and Structure
Bonding and StructureBonding and Structure
Bonding and Structure
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 

Viruses And Hacking

  • 1.
  • 2. A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, to refer to many different types of malware and adware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus.
  • 3. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 4.
  • 5. A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs)
  • 6. An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software
  • 7. A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
  • 8. A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
  • 9. The first ever computer virus was developed in 1986 by two Pakistani brothers in Lahore Pakistan. It was named “Brain” and was designed by Amjad Farooq Alvi and Basit Farooq Alvi with the intention of discouraging the piracy of a software written by them.