SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Presented by:
Maximino E. Santos Jr.
Computer Teacher-PNHS
COMPUTER VIRUS
What is a Computer Viruses
Computer Viruses are small software
programs that are designed to spread
from one computer to another and to
interfere with computer operation.
Why people create computer viruses
• Computer viruses do not come into existence
spontaneously. They are deliberately created by
programmers, or by people who use virus creation
software.
• Virus writers can have various reasons for creating and
spreading malware. Viruses have been written as
research projects, pranks, to attack the products of
specific companies, to distribute political messages, and
financial gain from identity theft, spyware, and
cryptoviral extortion. Some virus writers consider their
creations to be works of art, and see virus writing as a
creative hobby.
Ways of computer viruses enter your
computer
Viruses are most easily spread by attachments in e-mail
messages or instant messaging messages. That is
why it is essential that you never open e-mail
attachments unless you know who it's from and you
are expecting it. Viruses can be disguised as
attachments of funny images, greeting cards, or
audio and video files. Viruses also spread through
downloads on the Internet. They can be hidden in
illicit software or other files or programs you might
download.
How to detect virus?
Some Symptoms
•Program takes longer to load.
•The program size keeps changing.
•The drive light keeps flashing when you are
not doing anything.
•User created files have strange names.
•The computer doesn't remember CMOS
settings.
Examples of computer viruses
Trojan Horse:
A destructive program that masquerades as a
benign application. Unlike viruses, Trojan
horses do not replicate themselves but they
can be just as destructive. One of the most
insidious types of Trojan horse is a program
that claims to rid your computer of viruses but
instead introduces viruses onto your
computer.
Worm:
A worm is similar to a virus by its design, and
is considered to be a sub-class of a virus.
Worms spread from computer to computer,
but unlike a virus, it has the capability to
travel without any help from a person. A
worm takes advantage of file or information
transport features on your system, which
allows it to travel unaided. The biggest danger
with a worm is its capability to replicate itself
on your system, so rather than your computer
sending out a single worm, it could send out
hundreds or thousands of copies of itself,
creating a huge devastating effect.
Bootsector Virus :
A virus which attaches itself to the first part of the
hard disk that is read by the computer upon boot up.
These are normally spread by floppy disks.
Macro Virus:
Macro viruses are viruses that use another
application's macro programming language to
distribute themselves. They infect documents such
as MS Word or MS Excel and are typically spread to
other similar documents.
Memory Resident Viruses:
Memory Resident Viruses reside in a computers
volitale memory (RAM). They are initiated from a
virus which runs on the computer and they stay in
memory after it's initiating program closes.
Spy ware
• Spyware, on the other hand, is generally not
designed to damage your computer. Spyware is
broadly defined as any program that gets into
your computer without permission and hides in
the background while it makes unwanted
changes to your user experience.
• most spyware targets only the Windows
operating system. Some of the more notorious
spyware companies include Gator, Bonzi Buddy,
180 Solutions, DirectRevenue, Cydoor,
CoolWebSearch, Xupiter, XXXDial and
Euniverse.
How Did it Get on Your Computer?
• Spyware usually gets onto your machine
because of something you do, like clicking
a button on a pop-up window, installing a
software package or agreeing to add
functionality to your Web browser
How Did it Get on Your Computer?
• Drive-by download - This is when a Web site or
pop-up window automatically tries to download
and install spyware on your machine
• Browser add-ons - These are pieces of software
that add enhancements to your Web browser, like
a toolbar, animated pal or additional search box.
• browser hijackers -- these embed themselves
deeply in your machine and take quite a bit of
work to get rid of.
Steps to avoid virus
• Don’t open e-mail that you are not sure.
• All thumbdrive need to scan by anti-virus
software.
• Always scan your PC with anti-virus software.
How to protect your computer from
computer viruses
• Only open e-mail attachments received from
sources you trust and that you are expecting.
• Back up your hard drive files frequently and
maintain multiple backup sets.
• If you are experiencing unusually slow
performance, apparent file loss or damage, or
other abnormalities, immediately check your
hard drives and diskettes for infection.
•Delete chain emails and junk email. Do not
forward or reply to any to them. These types of
email are considered spam, which is
unsolicited, intrusive mail that clogs up the
network.
•Download software only from sites you are
familiar with, and immediately check it with
your anti-virus software.
•Don't spread hoaxes and rumors.
TOP 10 ANTIVIRUS OF 2010
1. BitDefender Antivirus
2. Kaspersky Anti-Virus
3. Webroot AntiVirus with SpySweeper
4. Norton AntiVirus
5. ESET Nod32 Antivirus
6. AVG Anti-Virus
7. F-Secure Anti-Virus
8. G DATA AntiVirus
9. Avira AntiVir
10.Trend Micro
End
References
• http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
- The Difference Between a Virus, Worm, and Trojan Horse.
• http://en.wikipedia.org/wiki/Computer_virus - Computer
Virus
• http://www.microsoft.com/protect/computer/basics/virus.mspx
- What is Computer Viruses
• http://www.soe.umich.edu/computingnetwork/howto/avoidviruse
- How To Avoid Computer Viruses

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 

Was ist angesagt? (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
computer virus
computer viruscomputer virus
computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 

Andere mochten auch

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Computer technology power point
Computer technology power pointComputer technology power point
Computer technology power pointoacore2
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer systemlistergc
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 

Andere mochten auch (9)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer technology power point
Computer technology power pointComputer technology power point
Computer technology power point
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 

Ähnlich wie Computer virus (20)

Computer virus
Computer virusComputer virus
Computer virus
 
anti_virus
anti_virusanti_virus
anti_virus
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Sowmya
SowmyaSowmya
Sowmya
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
information about virus
information about virusinformation about virus
information about virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 

Mehr von Maxie Santos

Conditional statement
Conditional statementConditional statement
Conditional statementMaxie Santos
 
Tutorial 9 multimedia web page
Tutorial 9 multimedia web pageTutorial 9 multimedia web page
Tutorial 9 multimedia web pageMaxie Santos
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs insetMaxie Santos
 

Mehr von Maxie Santos (7)

Conditional statement
Conditional statementConditional statement
Conditional statement
 
Html tutorial 5
Html tutorial 5Html tutorial 5
Html tutorial 5
 
Tut 06 (forms)
Tut 06 (forms)Tut 06 (forms)
Tut 06 (forms)
 
Html tutorial 5
Html tutorial 5Html tutorial 5
Html tutorial 5
 
Html tut 04
Html tut 04Html tut 04
Html tut 04
 
Tutorial 9 multimedia web page
Tutorial 9 multimedia web pageTutorial 9 multimedia web page
Tutorial 9 multimedia web page
 
Basic internet pnhs inset
Basic internet   pnhs insetBasic internet   pnhs inset
Basic internet pnhs inset
 

Kürzlich hochgeladen

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Kürzlich hochgeladen (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Computer virus

  • 1. Presented by: Maximino E. Santos Jr. Computer Teacher-PNHS COMPUTER VIRUS
  • 2. What is a Computer Viruses Computer Viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
  • 3. Why people create computer viruses • Computer viruses do not come into existence spontaneously. They are deliberately created by programmers, or by people who use virus creation software. • Virus writers can have various reasons for creating and spreading malware. Viruses have been written as research projects, pranks, to attack the products of specific companies, to distribute political messages, and financial gain from identity theft, spyware, and cryptoviral extortion. Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby.
  • 4. Ways of computer viruses enter your computer Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
  • 5. How to detect virus? Some Symptoms •Program takes longer to load. •The program size keeps changing. •The drive light keeps flashing when you are not doing anything. •User created files have strange names. •The computer doesn't remember CMOS settings.
  • 6. Examples of computer viruses Trojan Horse: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
  • 7. Worm: A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.
  • 8. Bootsector Virus : A virus which attaches itself to the first part of the hard disk that is read by the computer upon boot up. These are normally spread by floppy disks. Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.
  • 9. Spy ware • Spyware, on the other hand, is generally not designed to damage your computer. Spyware is broadly defined as any program that gets into your computer without permission and hides in the background while it makes unwanted changes to your user experience. • most spyware targets only the Windows operating system. Some of the more notorious spyware companies include Gator, Bonzi Buddy, 180 Solutions, DirectRevenue, Cydoor, CoolWebSearch, Xupiter, XXXDial and Euniverse.
  • 10. How Did it Get on Your Computer? • Spyware usually gets onto your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser
  • 11. How Did it Get on Your Computer? • Drive-by download - This is when a Web site or pop-up window automatically tries to download and install spyware on your machine • Browser add-ons - These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box. • browser hijackers -- these embed themselves deeply in your machine and take quite a bit of work to get rid of.
  • 12. Steps to avoid virus • Don’t open e-mail that you are not sure. • All thumbdrive need to scan by anti-virus software. • Always scan your PC with anti-virus software.
  • 13. How to protect your computer from computer viruses • Only open e-mail attachments received from sources you trust and that you are expecting. • Back up your hard drive files frequently and maintain multiple backup sets. • If you are experiencing unusually slow performance, apparent file loss or damage, or other abnormalities, immediately check your hard drives and diskettes for infection.
  • 14. •Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network. •Download software only from sites you are familiar with, and immediately check it with your anti-virus software. •Don't spread hoaxes and rumors.
  • 15. TOP 10 ANTIVIRUS OF 2010 1. BitDefender Antivirus 2. Kaspersky Anti-Virus 3. Webroot AntiVirus with SpySweeper 4. Norton AntiVirus 5. ESET Nod32 Antivirus 6. AVG Anti-Virus 7. F-Secure Anti-Virus 8. G DATA AntiVirus 9. Avira AntiVir 10.Trend Micro
  • 16. End
  • 17. References • http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp - The Difference Between a Virus, Worm, and Trojan Horse. • http://en.wikipedia.org/wiki/Computer_virus - Computer Virus • http://www.microsoft.com/protect/computer/basics/virus.mspx - What is Computer Viruses • http://www.soe.umich.edu/computingnetwork/howto/avoidviruse - How To Avoid Computer Viruses