SlideShare a Scribd company logo
A program or piece of code that is loaded onto your computer without
your knowledge and runs against your wishes.
A computer virus is a computer program that can copy itself and infect a
computer. The term "virus" is also commonly but erroneously used to
refer to other types of malware, adware, and spyware programs that do
not have the reproductive ability. A true virus can only spread from one
computer to another (in some form of executable code) when its host is
taken to the target computer.
The major difference between a computer virus and spyware is that
spyware does not replicate itself. A computer virus will gain entry onto
your computer using only one file and replicate its code many times onto
other files in your computer. Spyware is generally contained to one file
and can easily be deleted to rid your system of the problem.
 Computer viruses can not infect write protected disks or infect written
documents.
 Viruses do not infect compressed files, unless the file was infected prior
to the compression. [Compressed files are programs or files with its
common characters, etc. removed to take up less space on a disk.]
 Viruses do not infect computer hardware, such as monitors or computer
chips; they only infect software.
 In addition, Macintosh viruses do not infect DOS / Window computer
software and vice versa. For example, the Melissa virus incident of late
1998 and the ILOVEYOU virus of 2000 worked only on Window based
machines and could not operate on Macintosh computers
WHAT VIRUSES CAN DO
An annoying message appearing on the computer screen.
Reduced memory or disk space.
Modification of data.
Files overwritten or damaged.
Hard drive erased.
Viruses begin to work and spread when you start up the program or
application of which the virus is present. For example, a word processing
program that contains a virus will place the virus in memory every time
the word processing program is run.
Once in memory, one of a number of things can happen. The virus may be
programmed to attach to other applications, disks or folders. It may infect
a network if given the opportunity.
Viruses behave in different ways. Some viruses stay active only when the
application it is part of is running. Turn the computer off and the virus is
inactive. Other viruses will operate every time you turn on your computer
after infecting a system file or network.
1. Macro Viruses:
Macro Viruses are one of the most commonly seen computer viruses. These are
platform independent viruses and hence they are seen in applications. They will be
making the application malfunctioning and thus we won’t be getting the desired
results out of it. These viruses are ported directly into the desired applications for
which it has been written. But don’t think that they won’t be doing any harm to other
parts of your system. They will surely be harming the whole performance of your
computer.
Examples: DMV, Nuclear, Word Concept.
2. Boot viruses:
These viruses infect floppy disk boot records or master boot records in hard disks.
They replace the boot record program (which is responsible for loading the operating
system in memory) copying it elsewhere on the disk or overwriting it. Boot viruses
load into memory if the computer tries to read the disk while it is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone virus
3. Polymorphic viruses:
A virus that can encrypt its code in different ways so that it appears differently in
each infection. These viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
4. Trojan Horse:
Strictly speaking, a Trojan horse is NOT a virus because it does not replicate like
ordinary viruses do. A Trojan horse is an unfriendly program which will appear to be
something other than what it is, for example a program that is disguised as a
legitimate software program. The Trojan virus once on your computer, doesn't
reproduce, but instead makes your computer susceptible to malicious intruders by
allowing them to access and read your files. Making this type of virus extremely
dangerous to your computer's security and your personal privacy. Therefore, you
should avoid downloading programs or files from sites if you're not 100 percent
positive of what the file or program does. Below are some common Trojans:
Back Orifice 2000 : BO2K allows outsiders to access and modify any information on
a Windows 95, 98 and NT machines through an invisible server program installed by
the program. It also allows outsiders to spy on what user is doing. BO2K is expected
to be released on 10/7/1999.
5. Program viruses:
These infect executable program files, such as those with extensions like .BIN, .COM,
.EXE, .OVL, .DRV (driver) and .SYS (device driver). These programs are loaded in
memory during execution, taking the virus with them. The virus becomes active in
memory, making copies of itself and infecting files on disk.
Examples: Sunday, Cascade
6. Stealth viruses:
These viruses use certain techniques to avoid detection. They may either redirect the
disk head to read another sector instead of the one in which they reside or they may
alter the reading of the infected file’s size shown in the directory listing. A stealth
virus actively hides the changes it has made to the hard disk so that it appears that it
has not infected the system.
For example, a file infector might stay memory resident and misreport the size of
infected files so they don't appear to be infected. Boot sector viruses can trap attempts
to read the boot sector and return forged data that makes them appear to be "clean".
For instance, the Whale virus adds 9216 bytes to an infected file; then the virus
subtracts the same number of bytes (9216) from the size given in the directory.
Examples: Frodo, Joshi, Whale
7. WORM:
A Worm is a virus program that copies and multiplies itself by using computer networks and
security flaws. Worms are more complex than Trojan viruses, and usually attack multi-user
systems such as Unix environments and can spread over corporate networks via the
circulation of emails. Once multiplied, the copied worms scan the network for further
loopholes and flaws in the network. A classic example of a worm is the ILOVEYOU virus.
The best way you can protect yourself from worms is by updating your security patches.
Operating systems and application vendors normally provide these patches. In addition, you
should avoid opening email attachments from unknown senders.
Antivirus (or anti-virus) software is used to prevent, detect, and remove
malware, including computer viruses, worms, and Trojan horses.. Such
programs may also prevent and remove adware, spyware and other forms
of malware(malicious software)
A software utility that searches a hard disk for viruses and removes any
that are found. Most antivirus programs include an auto-update feature
that enables the program to download profiles of new viruses so that it can
check for the new viruses as soon as they are discovered.
These programs scan the code of every file on your computer for traces of
viruses and spyware, and if found, the file is quarantined until the code
can be removed or the file deleted.
Protection
Antivirus software can provide real-time protection, meaning it can prevent unwanted
processes from accessing your computer while you surf the Internet.
Cleanup
Antivirus software allows you to scan your computer for viruses and other unwanted
programs, and provides you with the tools to get rid of them.
Alerts
Antivirus programs can alert you when something is trying to access your computer,
or when something in your computer is trying to access something on the Internet.
Updates
Antivirus programs can update themselves, keeping your computer's protection up to
date without you having to manually update it.
Further Protection
If an antivirus software finds an infected file that cannot be deleted, it can quarantine
the file so that it cannot infect other files or programs on your computer.
Conventional
disk scanners
Memory
resident
scanners
Start up
scanners
inoculation
Conventional disk scanners:
This is the standard virus check program. It is run when the user requests it, and it scans the
contents of the disks, directories or files that the user wants, for any boot sectors and/or files
that contain viruses that it recognizes, based on the virus description information in its virus
definition files. Usually run manually by the user either as a preventive maintenance activity
or when a virus is suspected, scanning can also be automated through the use of a program
scheduler. This is the most common type of virus scanning program
Memory resident scanners:
Some antivirus software now comes with a special program that sits in the background while
you use your PC and automatically scans for viruses based on different triggers. These
programs typically can be configured to automatically scan programs as they are run or scan
floppy disks when you issue a shutdown command to the operating system.
Start up scanners:
Antivirus products often come with a special program that is designed to be run every time
the PC is booted up. It does a quick scan of the disk's boot sectors and critical system files
(instead of a full disk scan which takes a long time). The idea is to catch critical viruses,
especially boot sector viruses, before the PC boots up (which can give the virus a chance to
spread).
Inoculation:
This is a totally different approach to virus detection. Instead of looking for the
viruses themselves, this technique looks for the changes that the viruses make to files
and boot sectors. Starting with a clean system, the software "inoculates" each boot
sector and program file by storing a snapshot of information about it based on its
content and size. Then, periodically, it re-examines these files to see if anything has
changed. If it has, then the utility will inform you; if you haven't made the change, a
virus may have.
However, no matter how useful antivirus software is, it can sometimes
have drawbacks.
Antivirus software can degrade computer performance if it is not
designed efficiently.
Inexperienced users may have trouble understanding the prompts and
decisions that antivirus software presents them with. An incorrect
decision may lead to a security breach.
One study found that the detection success of major antivirus software
dropped over a one-year period.

More Related Content

What's hot

How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
Rohit Kashyap
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Annies Minu
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Computer virus
Computer virusComputer virus
Computer virus
Aarya Khanal
 
Computer Virus
Computer VirusComputer Virus
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 

What's hot (20)

How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Malicious
MaliciousMalicious
Malicious
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 

Similar to Viruses notes

Virus
VirusVirus
Virus
dddaou
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
Yastee Shah
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & MalwareT.J. Schiel
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarnnimmi_abes
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 

Similar to Viruses notes (20)

Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus
VirusVirus
Virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Virus project
Virus projectVirus project
Virus project
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from Dara Corporates

Role of radio in swat war
Role of radio in swat warRole of radio in swat war
Role of radio in swat war
Dara Corporates
 
Chap003
Chap003Chap003
Radio broadcasting history
Radio broadcasting historyRadio broadcasting history
Radio broadcasting history
Dara Corporates
 
Lecture five years plans
Lecture five years plansLecture five years plans
Lecture five years plans
Dara Corporates
 
Communication skills
Communication skillsCommunication skills
Communication skills
Dara Corporates
 
Cv writing
Cv writingCv writing
Cv writing
Dara Corporates
 
Conglomerate presentation & cnn
Conglomerate presentation & cnnConglomerate presentation & cnn
Conglomerate presentation & cnn
Dara Corporates
 
Bbc
BbcBbc
Voa
VoaVoa
Psy 101 lec4
Psy 101 lec4Psy 101 lec4
Psy 101 lec4
Dara Corporates
 
Psy 101 lec5
Psy 101 lec5Psy 101 lec5
Psy 101 lec5
Dara Corporates
 
Psy 101 lec3
Psy 101 lec3Psy 101 lec3
Psy 101 lec3
Dara Corporates
 
Psy 101 lec2
Psy 101 lec2Psy 101 lec2
Psy 101 lec2
Dara Corporates
 
Psy 101 lec1
Psy 101 lec1Psy 101 lec1
Psy 101 lec1
Dara Corporates
 
Barriers to communication
Barriers to communicationBarriers to communication
Barriers to communication
Dara Corporates
 
Organization of the government
Organization of the  governmentOrganization of the  government
Organization of the government
Dara Corporates
 
Legitimicy1
Legitimicy1Legitimicy1
Legitimicy1
Dara Corporates
 
Lectur=1
Lectur=1Lectur=1
Lectur=1
Dara Corporates
 
Lec 4
Lec 4Lec 4

More from Dara Corporates (20)

Role of radio in swat war
Role of radio in swat warRole of radio in swat war
Role of radio in swat war
 
Chap003
Chap003Chap003
Chap003
 
Radio broadcasting history
Radio broadcasting historyRadio broadcasting history
Radio broadcasting history
 
Lecture five years plans
Lecture five years plansLecture five years plans
Lecture five years plans
 
Communication skills
Communication skillsCommunication skills
Communication skills
 
Cv writing
Cv writingCv writing
Cv writing
 
Conglomerate presentation & cnn
Conglomerate presentation & cnnConglomerate presentation & cnn
Conglomerate presentation & cnn
 
Bbc
BbcBbc
Bbc
 
Voa
VoaVoa
Voa
 
Psy 101 lec4
Psy 101 lec4Psy 101 lec4
Psy 101 lec4
 
Psy 101 lec5
Psy 101 lec5Psy 101 lec5
Psy 101 lec5
 
Psy 101 lec3
Psy 101 lec3Psy 101 lec3
Psy 101 lec3
 
Psy 101 lec2
Psy 101 lec2Psy 101 lec2
Psy 101 lec2
 
Psy 101 lec1
Psy 101 lec1Psy 101 lec1
Psy 101 lec1
 
Barriers to communication
Barriers to communicationBarriers to communication
Barriers to communication
 
Communication
CommunicationCommunication
Communication
 
Organization of the government
Organization of the  governmentOrganization of the  government
Organization of the government
 
Legitimicy1
Legitimicy1Legitimicy1
Legitimicy1
 
Lectur=1
Lectur=1Lectur=1
Lectur=1
 
Lec 4
Lec 4Lec 4
Lec 4
 

Recently uploaded

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

Viruses notes

  • 1. A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer. The major difference between a computer virus and spyware is that spyware does not replicate itself. A computer virus will gain entry onto your computer using only one file and replicate its code many times onto other files in your computer. Spyware is generally contained to one file and can easily be deleted to rid your system of the problem.
  • 2.  Computer viruses can not infect write protected disks or infect written documents.  Viruses do not infect compressed files, unless the file was infected prior to the compression. [Compressed files are programs or files with its common characters, etc. removed to take up less space on a disk.]  Viruses do not infect computer hardware, such as monitors or computer chips; they only infect software.  In addition, Macintosh viruses do not infect DOS / Window computer software and vice versa. For example, the Melissa virus incident of late 1998 and the ILOVEYOU virus of 2000 worked only on Window based machines and could not operate on Macintosh computers WHAT VIRUSES CAN DO An annoying message appearing on the computer screen. Reduced memory or disk space. Modification of data. Files overwritten or damaged. Hard drive erased.
  • 3. Viruses begin to work and spread when you start up the program or application of which the virus is present. For example, a word processing program that contains a virus will place the virus in memory every time the word processing program is run. Once in memory, one of a number of things can happen. The virus may be programmed to attach to other applications, disks or folders. It may infect a network if given the opportunity. Viruses behave in different ways. Some viruses stay active only when the application it is part of is running. Turn the computer off and the virus is inactive. Other viruses will operate every time you turn on your computer after infecting a system file or network.
  • 4. 1. Macro Viruses: Macro Viruses are one of the most commonly seen computer viruses. These are platform independent viruses and hence they are seen in applications. They will be making the application malfunctioning and thus we won’t be getting the desired results out of it. These viruses are ported directly into the desired applications for which it has been written. But don’t think that they won’t be doing any harm to other parts of your system. They will surely be harming the whole performance of your computer. Examples: DMV, Nuclear, Word Concept. 2. Boot viruses: These viruses infect floppy disk boot records or master boot records in hard disks. They replace the boot record program (which is responsible for loading the operating system in memory) copying it elsewhere on the disk or overwriting it. Boot viruses load into memory if the computer tries to read the disk while it is booting. Examples: Form, Disk Killer, Michelangelo, and Stone virus 3. Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect. Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
  • 5. 4. Trojan Horse: Strictly speaking, a Trojan horse is NOT a virus because it does not replicate like ordinary viruses do. A Trojan horse is an unfriendly program which will appear to be something other than what it is, for example a program that is disguised as a legitimate software program. The Trojan virus once on your computer, doesn't reproduce, but instead makes your computer susceptible to malicious intruders by allowing them to access and read your files. Making this type of virus extremely dangerous to your computer's security and your personal privacy. Therefore, you should avoid downloading programs or files from sites if you're not 100 percent positive of what the file or program does. Below are some common Trojans: Back Orifice 2000 : BO2K allows outsiders to access and modify any information on a Windows 95, 98 and NT machines through an invisible server program installed by the program. It also allows outsiders to spy on what user is doing. BO2K is expected to be released on 10/7/1999. 5. Program viruses: These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk. Examples: Sunday, Cascade
  • 6. 6. Stealth viruses: These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. A stealth virus actively hides the changes it has made to the hard disk so that it appears that it has not infected the system. For example, a file infector might stay memory resident and misreport the size of infected files so they don't appear to be infected. Boot sector viruses can trap attempts to read the boot sector and return forged data that makes them appear to be "clean". For instance, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory. Examples: Frodo, Joshi, Whale 7. WORM: A Worm is a virus program that copies and multiplies itself by using computer networks and security flaws. Worms are more complex than Trojan viruses, and usually attack multi-user systems such as Unix environments and can spread over corporate networks via the circulation of emails. Once multiplied, the copied worms scan the network for further loopholes and flaws in the network. A classic example of a worm is the ILOVEYOU virus. The best way you can protect yourself from worms is by updating your security patches. Operating systems and application vendors normally provide these patches. In addition, you should avoid opening email attachments from unknown senders.
  • 7. Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses.. Such programs may also prevent and remove adware, spyware and other forms of malware(malicious software) A software utility that searches a hard disk for viruses and removes any that are found. Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered. These programs scan the code of every file on your computer for traces of viruses and spyware, and if found, the file is quarantined until the code can be removed or the file deleted.
  • 8. Protection Antivirus software can provide real-time protection, meaning it can prevent unwanted processes from accessing your computer while you surf the Internet. Cleanup Antivirus software allows you to scan your computer for viruses and other unwanted programs, and provides you with the tools to get rid of them. Alerts Antivirus programs can alert you when something is trying to access your computer, or when something in your computer is trying to access something on the Internet. Updates Antivirus programs can update themselves, keeping your computer's protection up to date without you having to manually update it. Further Protection If an antivirus software finds an infected file that cannot be deleted, it can quarantine the file so that it cannot infect other files or programs on your computer.
  • 10. Conventional disk scanners: This is the standard virus check program. It is run when the user requests it, and it scans the contents of the disks, directories or files that the user wants, for any boot sectors and/or files that contain viruses that it recognizes, based on the virus description information in its virus definition files. Usually run manually by the user either as a preventive maintenance activity or when a virus is suspected, scanning can also be automated through the use of a program scheduler. This is the most common type of virus scanning program Memory resident scanners: Some antivirus software now comes with a special program that sits in the background while you use your PC and automatically scans for viruses based on different triggers. These programs typically can be configured to automatically scan programs as they are run or scan floppy disks when you issue a shutdown command to the operating system. Start up scanners: Antivirus products often come with a special program that is designed to be run every time the PC is booted up. It does a quick scan of the disk's boot sectors and critical system files (instead of a full disk scan which takes a long time). The idea is to catch critical viruses, especially boot sector viruses, before the PC boots up (which can give the virus a chance to spread). Inoculation: This is a totally different approach to virus detection. Instead of looking for the viruses themselves, this technique looks for the changes that the viruses make to files and boot sectors. Starting with a clean system, the software "inoculates" each boot sector and program file by storing a snapshot of information about it based on its content and size. Then, periodically, it re-examines these files to see if anything has changed. If it has, then the utility will inform you; if you haven't made the change, a virus may have.
  • 11. However, no matter how useful antivirus software is, it can sometimes have drawbacks. Antivirus software can degrade computer performance if it is not designed efficiently. Inexperienced users may have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. One study found that the detection success of major antivirus software dropped over a one-year period.