Viruses By Maryah Rahmat
Introduction A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs too, and it has the chance to reproduce by attaching itself to programs or wreak havoc.   Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. It can be disguised as attachments of funny images, greeting cards, or audio and video files.
Types Of Viruses Viruses corrupts many files on the computer system and create many sorts of problems. Many types of viruses can be categorized as follows: Worms Trojan Horses Bomb Port Scanner
The Worm Viruses A worm is a computer program that has the ability to copy itself from machine to machine. Worms use up computer time and network bandwidth when they are replicating, and they often have some sort of evil intent. Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand from a single copy incredibly quickly.
The Trojan Horses A Trojan horse differs from a virus in that a Trojan horse does not insert its code into other computer files and appears harmless until executed. The term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed.
To Avoid Viruses In The Near Future To avoid your computer from viruses, the main solution is to have your own anti-virus software. Anti-virus software can be installed onto the computer system to protect it from having virus attacks. Anti-virus software are available in computer shops and online shopping. But, always try to get genuine versions so that the software can be easily updated automatically.
Many different websites were used to create and complete this slideshow. I would like to thank the following: www.google.com www.en.wikipedia.org www.howstuffworks.com www.microsoft.com The rest of the World Wide Web is also appreciated in finishing the slideshow. For that, I thank the World Wide Web for existing.  Thank you… Hope you have enjoyed this…

Viruses

  • 1.
  • 2.
    Introduction A virusis a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs too, and it has the chance to reproduce by attaching itself to programs or wreak havoc. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. It can be disguised as attachments of funny images, greeting cards, or audio and video files.
  • 3.
    Types Of VirusesViruses corrupts many files on the computer system and create many sorts of problems. Many types of viruses can be categorized as follows: Worms Trojan Horses Bomb Port Scanner
  • 4.
    The Worm VirusesA worm is a computer program that has the ability to copy itself from machine to machine. Worms use up computer time and network bandwidth when they are replicating, and they often have some sort of evil intent. Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand from a single copy incredibly quickly.
  • 5.
    The Trojan HorsesA Trojan horse differs from a virus in that a Trojan horse does not insert its code into other computer files and appears harmless until executed. The term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed.
  • 6.
    To Avoid VirusesIn The Near Future To avoid your computer from viruses, the main solution is to have your own anti-virus software. Anti-virus software can be installed onto the computer system to protect it from having virus attacks. Anti-virus software are available in computer shops and online shopping. But, always try to get genuine versions so that the software can be easily updated automatically.
  • 7.
    Many different websiteswere used to create and complete this slideshow. I would like to thank the following: www.google.com www.en.wikipedia.org www.howstuffworks.com www.microsoft.com The rest of the World Wide Web is also appreciated in finishing the slideshow. For that, I thank the World Wide Web for existing. Thank you… Hope you have enjoyed this…