SlideShare a Scribd company logo
1 of 30
Computer  Virus
A computer virus is a computer programe that can copy itself and infect a computer.  A  program or piece of code  that is loaded onto your computer without your knowledge and runs against your wishes.  The term "virus" is also commonly but used to refer to other types of malware, adware and spyware programs that do not have the reproductive ability.
Signs of a Computer Infection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What They Infect ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Nature of Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of viruses Boot viruses:   These viruses infect floppy disk boot records or  master boot records in hard disks. They replace  the boot record program (which is responsible for  loading the operating system in memory) copying it  elsewhere on the disk or overwriting it.  Program viruses:   This type of viruses infect executable program  files, such as .BIN, .COM, .EXE, .DRV and  .SYS. These programs are loaded  in memory  during execution, taking the virus with them. The  virus becomes active in memory, making copies  of itself and infecting files on disk.
Types of Viruses Multipartite viruses:   This type of viruses are a combination of Boot and  Program viruses. They infect program files when  the infected program is executed, then viruses  infect the boot record.  Stealth viruses:   These viruses use certain techniques to avoid  detection. They may either redirect the disk head  to read another sector instead of the one in which  they reside or they may misguide the infected file’s size and other information.
Types of Viruses Polymorphic viruses:   A virus that can encrypt its code in different ways  so that it appears differently in each infection.  These viruses are more difficult to detect. Macro Viruses:   A macro virus is a new type of computer virus  that  infects the macros ( series of program  commands or instructions  ) within a document  or template. When you open a word processing or  spreadsheet document.
Types of Viruses Active X and Java Control Viruses:  Some users do not know how to manage and  control their web browser to allow or prohibit  certain functions to work, such as enabling or  disabling sound, pop ups, and so on. Leaving your  computer in danger of being targeted by unwanted  software or adware floating in cyberspace.  
Tunneling Viruses ,[object Object],[object Object],[object Object],[object Object]
Camouflage Viruses ,[object Object],[object Object],[object Object]
Metamorphic Viruses ,[object Object],[object Object],[object Object],[object Object]
Types of Viruses Network Viruses:  Network viruses rapidly spreads through a  Local Network Area (LAN), and sometimes  throughout  the internet.  Generally, network viruses multiply through  shared resources, i.e., shared drives and  folders. When the virus infects a computer,  it searches through the network to  attack its new  host, when the virus finishes infecting that  computer, it moves on to the next and the  cycle repeats itself.
Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virus All computer viruses are manmade,  A simple virus can be dangerous  because it will quickly use all available  memory and bring the system to a halt.  A true virus bypassing security  systems and spread from one  computer to another (in form of  executable code) over a network,  Internet, removable medium such  as a floppy disk, CD, DVD or USB  drive and.
Worm A computer worm is a program  which copies itself across a network. Computer worm differs from a computer virus, because computer worm can run itself.  A virus needs a host program to run, and the virus code runs as part of the host program.  A computer worm can spread without a host program, although some modern computer worms also use files to hide inside.
Trojan horse This is a type of virus that attempts to make  the user think that it is a beneficial application. A Trojan Horse virus works by hiding within a  set of seemingly useful software programs.  Once executed or installed it will start infecting  other files in the computer.  A Trojan Horse Virus is also usually capable of  stealing important information from the user's  computer then send this information to Internet  servers designated by the developer of the  virus.  The best way to be save from Trojan Horse  Virus,  never open email attachments or files  that have been sent by unknown senders.
Logic Bombs The logic bomb virus is a piece of  code that reside  into a software  programe and when a certain  and  specific condition is meet,  such as clicking on an Internet  browser or  opening a particular file,  the logic bomb virus start their  work. Many programmers set the logic  bombs virus with reference to  certain day or date such as April  Fools Day or Friday the 13th.
Spyware Spyware are programs, cookies, or  registry entries that track your activity  and send your data to someone who  collects this data for their own  purposes.  Spyware is usually installed quietly, or  even secretly, when you install  shareware applications. spyware programs can slow down your  Internet connection by filling their traffic  information. They can also slow down your computer  by using up available RAM and CPU  cycles.
Adware Adware is a close relative of spyware.  Adware is  software that is installed  on your computer to show you  advertisements. Adware can also slow your Internet  Connection by using bandwidth to  retrieve advertisements.  It can waste huge amounts of your  time by popping unwanted ads onto  your screen.
Spam Spam is unsolicited e-mail which is sent in  massive quantities to Internet email users. Most spam tries to sell products and  services such  as mortgage, Financing,  memberships and drugs. A more dangerous category of spam tries  to convince the recipient to share their  bank account numbers, credit card  numbers, or logins & passwords to their  online banking systems in shap of eBay  and PayPal  services. Spam is almost impossible to stop  completely, but it can be reduced to a less  level through spam filters.  E-mail administrators typically install  spam filtering  software on mail servers  and reduce the number of spam.
Popups Virus This type of viruses are basically a  program that is permanently  resident in memory and “pops up”  onto the screen at the touch  of a key.  The number of such viruses  increased when computer  dependent  on GUI, where any program can be  made to “pop up”.  Popup viruses are the pop up ads,,  casino ads, drugs ads, antivirus solution  ads that influence user to install a  programe on your system.
Anti Virus  Antivirus software is used detects, repairs,  cleans, or removes virus-infected files from  computer to prevent and remove computer  viruses, including worms and trojan horses. It also identify & remove viruses, but make  computer healthy from other types of  harmful computer softwares.
Virus Detection There are two common methods that an anti-virus  software application uses to detect viruses.  The first, virus detection is using a list of virus  signature definitions. This works by examining the content of the  computer's memory, boot sectors, removable  drives, hard drives, and comparing those files  against a database of known virus signatures.  The second method is  Heuristic Algorithm,  it is  used to find viruses common behaviors.
Recovery methods   System Restore:  One possibility on method is to used  System Restore, feature of OS which restores the  registry and critical system files to a previous  checkpoint.  Some viruses, however, disable system  restore  and other important tools such as Task Manager  and Command Prompt.
Recovery methods Operating system reinstallation Reinstalling the operating system is another  approach to virus removal. It involves simply  reformatting the OS partition and installing the OS  from its original media, or image the partition with  a clean backup image using Ghost.
Recovery methods ,[object Object],[object Object]
Recovery methods Routers and Firewalls: A Router acts as the best kind of firewall, a  hardware firewall. It protects you from all kinds of  viruses and keeps your information safe.  Hackers who want to gain access to your  computer who may try to port scan your computer.  High end routers may be able to completely block  these scans or at least slow the hacker down.
Anti virus Softwares ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Computer virus
Computer virusComputer virus
Computer virushrithikjha
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virusFaisal Hassan
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
 

What's hot (20)

Virus
VirusVirus
Virus
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Malware
MalwareMalware
Malware
 
Antivirus
AntivirusAntivirus
Antivirus
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 

Similar to Computer virus 18

Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 

Similar to Computer virus 18 (20)

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus
VirusVirus
Virus
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus
VirusVirus
Virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 

More from Muhammad Ramzan (16)

Typing skill
Typing skillTyping skill
Typing skill
 
Word pad
Word padWord pad
Word pad
 
Inpage presentation
Inpage presentationInpage presentation
Inpage presentation
 
Internet explorer 06
Internet explorer 06Internet explorer 06
Internet explorer 06
 
Inpage
InpageInpage
Inpage
 
History of computer 08
History of computer 08History of computer 08
History of computer 08
 
Dos 16
Dos 16Dos 16
Dos 16
 
Desktop 03
Desktop 03Desktop 03
Desktop 03
 
Computer languages 11
Computer languages 11Computer languages 11
Computer languages 11
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
Comp generations 09
Comp generations 09Comp generations 09
Comp generations 09
 
Classification 10
Classification 10Classification 10
Classification 10
 
Basic computer
Basic computerBasic computer
Basic computer
 
Cpu
CpuCpu
Cpu
 
Control panel 07
Control panel 07Control panel 07
Control panel 07
 
Ms.paint
Ms.paintMs.paint
Ms.paint
 

Computer virus 18

  • 2. A computer virus is a computer programe that can copy itself and infect a computer. A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. The term "virus" is also commonly but used to refer to other types of malware, adware and spyware programs that do not have the reproductive ability.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Types of viruses Boot viruses: These viruses infect floppy disk boot records or master boot records in hard disks. They replace the boot record program (which is responsible for loading the operating system in memory) copying it elsewhere on the disk or overwriting it. Program viruses: This type of viruses infect executable program files, such as .BIN, .COM, .EXE, .DRV and .SYS. These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk.
  • 8. Types of Viruses Multipartite viruses: This type of viruses are a combination of Boot and Program viruses. They infect program files when the infected program is executed, then viruses infect the boot record. Stealth viruses: These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may misguide the infected file’s size and other information.
  • 9. Types of Viruses Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect. Macro Viruses: A macro virus is a new type of computer virus that infects the macros ( series of program commands or instructions ) within a document or template. When you open a word processing or spreadsheet document.
  • 10. Types of Viruses Active X and Java Control Viruses: Some users do not know how to manage and control their web browser to allow or prohibit certain functions to work, such as enabling or disabling sound, pop ups, and so on. Leaving your computer in danger of being targeted by unwanted software or adware floating in cyberspace.  
  • 11.
  • 12.
  • 13.
  • 14. Types of Viruses Network Viruses: Network viruses rapidly spreads through a Local Network Area (LAN), and sometimes throughout the internet. Generally, network viruses multiply through shared resources, i.e., shared drives and folders. When the virus infects a computer, it searches through the network to attack its new host, when the virus finishes infecting that computer, it moves on to the next and the cycle repeats itself.
  • 15.
  • 16. Virus All computer viruses are manmade, A simple virus can be dangerous because it will quickly use all available memory and bring the system to a halt. A true virus bypassing security systems and spread from one computer to another (in form of executable code) over a network, Internet, removable medium such as a floppy disk, CD, DVD or USB drive and.
  • 17. Worm A computer worm is a program which copies itself across a network. Computer worm differs from a computer virus, because computer worm can run itself. A virus needs a host program to run, and the virus code runs as part of the host program. A computer worm can spread without a host program, although some modern computer worms also use files to hide inside.
  • 18. Trojan horse This is a type of virus that attempts to make the user think that it is a beneficial application. A Trojan Horse virus works by hiding within a set of seemingly useful software programs. Once executed or installed it will start infecting other files in the computer. A Trojan Horse Virus is also usually capable of stealing important information from the user's computer then send this information to Internet servers designated by the developer of the virus. The best way to be save from Trojan Horse Virus, never open email attachments or files that have been sent by unknown senders.
  • 19. Logic Bombs The logic bomb virus is a piece of code that reside into a software programe and when a certain and specific condition is meet, such as clicking on an Internet browser or opening a particular file, the logic bomb virus start their work. Many programmers set the logic bombs virus with reference to certain day or date such as April Fools Day or Friday the 13th.
  • 20. Spyware Spyware are programs, cookies, or registry entries that track your activity and send your data to someone who collects this data for their own purposes. Spyware is usually installed quietly, or even secretly, when you install shareware applications. spyware programs can slow down your Internet connection by filling their traffic information. They can also slow down your computer by using up available RAM and CPU cycles.
  • 21. Adware Adware is a close relative of spyware. Adware is software that is installed on your computer to show you advertisements. Adware can also slow your Internet Connection by using bandwidth to retrieve advertisements. It can waste huge amounts of your time by popping unwanted ads onto your screen.
  • 22. Spam Spam is unsolicited e-mail which is sent in massive quantities to Internet email users. Most spam tries to sell products and services such as mortgage, Financing, memberships and drugs. A more dangerous category of spam tries to convince the recipient to share their bank account numbers, credit card numbers, or logins & passwords to their online banking systems in shap of eBay and PayPal services. Spam is almost impossible to stop completely, but it can be reduced to a less level through spam filters. E-mail administrators typically install spam filtering software on mail servers and reduce the number of spam.
  • 23. Popups Virus This type of viruses are basically a program that is permanently resident in memory and “pops up” onto the screen at the touch of a key. The number of such viruses increased when computer dependent on GUI, where any program can be made to “pop up”. Popup viruses are the pop up ads,, casino ads, drugs ads, antivirus solution ads that influence user to install a programe on your system.
  • 24. Anti Virus Antivirus software is used detects, repairs, cleans, or removes virus-infected files from computer to prevent and remove computer viruses, including worms and trojan horses. It also identify & remove viruses, but make computer healthy from other types of harmful computer softwares.
  • 25. Virus Detection There are two common methods that an anti-virus software application uses to detect viruses. The first, virus detection is using a list of virus signature definitions. This works by examining the content of the computer's memory, boot sectors, removable drives, hard drives, and comparing those files against a database of known virus signatures. The second method is Heuristic Algorithm, it is used to find viruses common behaviors.
  • 26. Recovery methods System Restore: One possibility on method is to used System Restore, feature of OS which restores the registry and critical system files to a previous checkpoint. Some viruses, however, disable system restore and other important tools such as Task Manager and Command Prompt.
  • 27. Recovery methods Operating system reinstallation Reinstalling the operating system is another approach to virus removal. It involves simply reformatting the OS partition and installing the OS from its original media, or image the partition with a clean backup image using Ghost.
  • 28.
  • 29. Recovery methods Routers and Firewalls: A Router acts as the best kind of firewall, a hardware firewall. It protects you from all kinds of viruses and keeps your information safe. Hackers who want to gain access to your computer who may try to port scan your computer. High end routers may be able to completely block these scans or at least slow the hacker down.
  • 30.