SlideShare a Scribd company logo
1 of 11
COMPUTER VIRUS 
INFORMATION AND COMMUNICATION TECHNOLOGY 
BY 
M.MOHAMED SHIRAJ 
LECTURER IN IT 
DEPARTMENT OF MANAGEMENT 
FACULTY OF MANAGEMENT AND COMMERCE 
GROUP 
PRESENTATION
WHAT IS A COMPUTER VIRUS 
A computer virus is a program designed to spread 
itself by first infecting executable files or the system 
areas of hard disks and then making copies of itself. 
Viruses usually operate without the knowledge or 
desire of the computer user. 
1 | P a g e 
Types of computer virus 
 Boot sector virus 
 Multipartite virus 
 Worm virus 
 E-mail virus 
 Macro virus 
 Script virus 
 Trojan Horse
Boot sector virus 
A boot sector virus infects boot sector of 
computers. During system boot, 
Boot sector virus is loaded into main memory and 
destroys data stored in hard disk. 
Multipartite virus 
The Multipartite virus are the types of computer 
viruses that are both a file virus and a boot sector 
virus they enter the computer via various sorts of 
media and then embed themselves in the system 
memory they then go into the hard drive and 
infect the boot sector once installed in the boot 
sector these types of computer viruses infect 
executable files and spread themselves in the 
system 
Worm virus 
A Worm virus is also a destructive program that 
files a computer system with self-replicating 
information clogging the system so that its 
operations are slowed down or stopped. 
2 | P a g e
E-mail virus 
An E-mail virus moves around in e-mail messages 
and usually replicates itself by automatically 
mailing itself to dozens of people in the victim’s e-mail 
3 | P a g e 
address book. 
Macro virus 
A Macro virus is associated with application 
software like word and excel when opening the 
infected document Macro virus is loaded into main 
memory and destroys the data stored in hard disk. 
Script virus 
Commonly found Script virus are written using the 
visual basic scripting edition (VBS) and the java 
script programming languages. 
Trojan Horse 
Trojan Horse is a destructive program it usually 
pretends as computer games or 
application software if executed computer system 
will be damaged.
4 | P a g e 
How Viruses are born 
Unlike biological viruses computer viruses do 
not simply evolve by themselves. 
Deliberately created by programmers or by 
people who use virus creation software. 
Viruses are written us, 
Research projects pranks vandalism 
To attack the product of specific companies 
To distribute political messages 
Spyware and crypto viral extortion 
Virus languages 
ANSI COBOL 
C++ 
Pascal 
VBA 
Unix Shell Scripts 
Java Script
5 | P a g e 
 Melissa virus (March 1999) 
Melissa virus spread in Microsoft word 
documents sent via e-mail 
How it works? 
Created the virus as word document 
Uploaded to an internet news group 
Anyone who download the document and 
opened it would trigger the virus 
Send friendly email messages to first 50 
people in person’s address book 
 I love you virus (2000) 
Contained a piece of code as an attachment 
Double click on the attachment triggered the 
code 
Sent copies of itself to everyone in the victim’s 
address book 
Started corrupting files on the victim’s 
machine
6 | P a g e 
 Code red (2001) 
Code red made huge headlines in 2001 
It slowed down internet traffic when it began 
to replicate itself 
Each copy of the virus scanned the internet 
for windows NT or windows 2000 that don’t 
have security patch installed 
Each time it found an unsecured server the 
virus copied itself to that server 
 Morto (2011) 
The Morto virus emerged in the summer of 
2011 
It attempts to propagate itself to additional 
computers via the Remote Desktop Protocol 
(RDP) 
Morto spreads by forcing infected systems to 
scan for servers allowing RDP login 
Once morto finds an RDP-accessible systems it 
attempts to log in to a domain or local system
account named administrator using a number 
of common passwords 
7 | P a g e 
How to clean virus? 
The steps to reinstall the whole system 
 Reboot the PC using a clean startup disk 
 Type in MBR to rewrite the Master Boot 
Record 
 Format DOS partitions 
 Reinstall windows XP or other OS and other 
applications 
 Install Antivirus Software and apply the 
latest virus definition data 
Best practices 
Regular Backup 
Install Anti-virus software 
Daily virus scan 
Check downloaded files and e-mail attachment 
Be careful when use new software and files 
Be alert for virus activities
8 | P a g e 
Antivirus software 
Antivirus software is used to prevent detect and 
remove malware and other computer viruses 
Antivirus software systems detections involve 
searching for known malicious patterns in 
executable code it is possible for a user to be 
infected with new viruses that have no sign or 
symptoms or existence 
Top ten Anti-virus in 2014 
Bit defender antivirus plus 
Kaspersky antivirus 
Norton antivirus 
F-secure antivirus 
AVG antivirus 
Bull guard antivirus 
G data antivirus 
Panda antivirus pro 
Avast pro antivirus 
McAfee antivirus plus
9 | P a g e 
GROUP MEMBERS 
 AHAMED .MMMS SEU/IS/12/MG/076 
 RATHNAYAKE .RMLGIM SEU/IS/12/MG/071 
 ARIYARATHNA .WGGJ SEU/IS/12/MG/072 
 CHATHURANGE .KBS SEU/IS/12/MG/073 
 FERNANDO .MS SEU/IS/12/MG/074 
 PIYASA .AM SEU/IS/12/MG/075 
 MUTHEEFA .MMF SEU/IS/12/MG/077 
 RIHANA .AL SEU/IS/12/MG/078 
 SASNA .RF SEU/IS/12/MG/079 
 RIFANA .YF SEU/IS/12/MG/080
10 | P a g e 
CONTENTS 
 WHAT IS A COMPUTER VIRUS 
 Types of computer virus 
 How Viruses are born 
 Virus languages 
 How to clean virus? 
 Antivirus software

More Related Content

What's hot (20)

Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus
virusvirus
virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked

Virus informaticos
Virus informaticosVirus informaticos
Virus informaticosmelusa24
 
Malware, botnet y y cibercrimen
Malware, botnet y y cibercrimenMalware, botnet y y cibercrimen
Malware, botnet y y cibercrimenCristian Borghello
 
Немного о киберпреступности. Вячеслав Федоров
Немного о киберпреступности. Вячеслав ФедоровНемного о киберпреступности. Вячеслав Федоров
Немного о киберпреступности. Вячеслав ФедоровBranchMarketing
 
Storm Worm & Botnet
Storm Worm & BotnetStorm Worm & Botnet
Storm Worm & BotnetKendiv
 
The 5 worst viruses of all time
The 5 worst viruses of all timeThe 5 worst viruses of all time
The 5 worst viruses of all timekanika sharma
 

Viewers also liked (7)

Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Virus informaticos
Virus informaticosVirus informaticos
Virus informaticos
 
Malware, botnet y y cibercrimen
Malware, botnet y y cibercrimenMalware, botnet y y cibercrimen
Malware, botnet y y cibercrimen
 
Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
 
Немного о киберпреступности. Вячеслав Федоров
Немного о киберпреступности. Вячеслав ФедоровНемного о киберпреступности. Вячеслав Федоров
Немного о киберпреступности. Вячеслав Федоров
 
Storm Worm & Botnet
Storm Worm & BotnetStorm Worm & Botnet
Storm Worm & Botnet
 
The 5 worst viruses of all time
The 5 worst viruses of all timeThe 5 worst viruses of all time
The 5 worst viruses of all time
 

Similar to What is a computer virus (20)

DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Viruses
VirusesViruses
Viruses
 

Recently uploaded

Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

What is a computer virus

  • 1. COMPUTER VIRUS INFORMATION AND COMMUNICATION TECHNOLOGY BY M.MOHAMED SHIRAJ LECTURER IN IT DEPARTMENT OF MANAGEMENT FACULTY OF MANAGEMENT AND COMMERCE GROUP PRESENTATION
  • 2. WHAT IS A COMPUTER VIRUS A computer virus is a program designed to spread itself by first infecting executable files or the system areas of hard disks and then making copies of itself. Viruses usually operate without the knowledge or desire of the computer user. 1 | P a g e Types of computer virus  Boot sector virus  Multipartite virus  Worm virus  E-mail virus  Macro virus  Script virus  Trojan Horse
  • 3. Boot sector virus A boot sector virus infects boot sector of computers. During system boot, Boot sector virus is loaded into main memory and destroys data stored in hard disk. Multipartite virus The Multipartite virus are the types of computer viruses that are both a file virus and a boot sector virus they enter the computer via various sorts of media and then embed themselves in the system memory they then go into the hard drive and infect the boot sector once installed in the boot sector these types of computer viruses infect executable files and spread themselves in the system Worm virus A Worm virus is also a destructive program that files a computer system with self-replicating information clogging the system so that its operations are slowed down or stopped. 2 | P a g e
  • 4. E-mail virus An E-mail virus moves around in e-mail messages and usually replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail 3 | P a g e address book. Macro virus A Macro virus is associated with application software like word and excel when opening the infected document Macro virus is loaded into main memory and destroys the data stored in hard disk. Script virus Commonly found Script virus are written using the visual basic scripting edition (VBS) and the java script programming languages. Trojan Horse Trojan Horse is a destructive program it usually pretends as computer games or application software if executed computer system will be damaged.
  • 5. 4 | P a g e How Viruses are born Unlike biological viruses computer viruses do not simply evolve by themselves. Deliberately created by programmers or by people who use virus creation software. Viruses are written us, Research projects pranks vandalism To attack the product of specific companies To distribute political messages Spyware and crypto viral extortion Virus languages ANSI COBOL C++ Pascal VBA Unix Shell Scripts Java Script
  • 6. 5 | P a g e  Melissa virus (March 1999) Melissa virus spread in Microsoft word documents sent via e-mail How it works? Created the virus as word document Uploaded to an internet news group Anyone who download the document and opened it would trigger the virus Send friendly email messages to first 50 people in person’s address book  I love you virus (2000) Contained a piece of code as an attachment Double click on the attachment triggered the code Sent copies of itself to everyone in the victim’s address book Started corrupting files on the victim’s machine
  • 7. 6 | P a g e  Code red (2001) Code red made huge headlines in 2001 It slowed down internet traffic when it began to replicate itself Each copy of the virus scanned the internet for windows NT or windows 2000 that don’t have security patch installed Each time it found an unsecured server the virus copied itself to that server  Morto (2011) The Morto virus emerged in the summer of 2011 It attempts to propagate itself to additional computers via the Remote Desktop Protocol (RDP) Morto spreads by forcing infected systems to scan for servers allowing RDP login Once morto finds an RDP-accessible systems it attempts to log in to a domain or local system
  • 8. account named administrator using a number of common passwords 7 | P a g e How to clean virus? The steps to reinstall the whole system  Reboot the PC using a clean startup disk  Type in MBR to rewrite the Master Boot Record  Format DOS partitions  Reinstall windows XP or other OS and other applications  Install Antivirus Software and apply the latest virus definition data Best practices Regular Backup Install Anti-virus software Daily virus scan Check downloaded files and e-mail attachment Be careful when use new software and files Be alert for virus activities
  • 9. 8 | P a g e Antivirus software Antivirus software is used to prevent detect and remove malware and other computer viruses Antivirus software systems detections involve searching for known malicious patterns in executable code it is possible for a user to be infected with new viruses that have no sign or symptoms or existence Top ten Anti-virus in 2014 Bit defender antivirus plus Kaspersky antivirus Norton antivirus F-secure antivirus AVG antivirus Bull guard antivirus G data antivirus Panda antivirus pro Avast pro antivirus McAfee antivirus plus
  • 10. 9 | P a g e GROUP MEMBERS  AHAMED .MMMS SEU/IS/12/MG/076  RATHNAYAKE .RMLGIM SEU/IS/12/MG/071  ARIYARATHNA .WGGJ SEU/IS/12/MG/072  CHATHURANGE .KBS SEU/IS/12/MG/073  FERNANDO .MS SEU/IS/12/MG/074  PIYASA .AM SEU/IS/12/MG/075  MUTHEEFA .MMF SEU/IS/12/MG/077  RIHANA .AL SEU/IS/12/MG/078  SASNA .RF SEU/IS/12/MG/079  RIFANA .YF SEU/IS/12/MG/080
  • 11. 10 | P a g e CONTENTS  WHAT IS A COMPUTER VIRUS  Types of computer virus  How Viruses are born  Virus languages  How to clean virus?  Antivirus software