SlideShare a Scribd company logo
1 of 19
VIRUS stands for ”Vital Information Resource Under Siege ”.
A computer virus is a computer program that can replicate
itself and spread from one computer to another. A computer
program loaded to your computer with-out your knowledge or
permission and runs against your wishes. All computer viruses
are manmade.
 Even such a simple virus is dangerous because it will use all
the available memory and bring the system to the holt.
The virus stays active in the background and infect new
hosts those files are accessed by other program or the
operating system itself.
The computer runs slower than usual.
The computer crashes, and then it restarts every
few minutes.
Applications on the computer do not work correctly.
Disks or disk drives are inaccessible.
You see unusual error messages.
An antivirus program cannot be installed on the
computer, or the antivirus program will not run.
New icons appear on the desktop that you did not
put
Increases the use of disk space and growth in file
size as virus gets attached itself to many files.
Viruses can be divided into two types based on their behavior
when they are executed.
Resident
Nonresident
Resident Virus:- Resident viruses do not search for
hosts when they are started. Instead, a resident
virus loads itself into memory on execution and
transfers control to the host program.
Non-Resident Virus:- Nonresident viruses
immediately search for other hosts that can be
infected, infect those targets, and finally transfer
control to the application program they infected.
There are different types of computer
virus.
Trojan Horses are actually normal computer program.
This is different from a regular virus because it does
not attempt to reproduce itself. Trojan Horses do not
affect a great number of people because they are
discover quickly.
It has been made copy itself from one computer
to another over network. It is very harmful
virus because it has reproduce nature.
Marco virus spread much more than other
type of viruses as people frequently share
data files, it spread round the word in two
hours effecting tens of millions of
computer
A block of code which attaches itself to
another program and it can copy itself in to
subsequent applications that you run.
On downloading files from the Internet.
On opening an e-mail attachment.
On copying programs or files from any other
infected computer.
Most viruses have two phases to their existence,
the “infection phase” and the “attack phase”.
All viruses have an infection phase, but not all
have an attack phase.
During the infection phase, the virus spreads
itself.
"Your friend gives you a game on a disk. The
game has an infected file that you don't know
about. Each time you play the game, the virus
copies itself into another program without you
knowing. Now, whenever either of the programs
are executed, the virus is copied. This continues
as the virus infects the rest of the computer. If
any of the files are transferred to a floppy disk
or e-mail attachment, and they are put on
another computer, the process starts again"
The attack phase is set off by a trigger,
such as a time or date. The attack phase is
when the virus causes damage or other
unwanted system behavior. In order to make
sure it has spread, viruses often delay the
attack phase, sometimes for years.
Here are some tips that can help prevent a
computer virus from attacking your system.
Your first line of defense is to install anti-virus
software. . This software can scan all your drives
for viruses and neutralize them.
Install updated and good quality Anti-Virus
software that provides complete protection from
spyware, adware and malware too.
Schedule a complete system scan at least once
a week to keep your system clean.
Schedule a complete system scan at least once
a week to keep your system clean
Kasper Sky Anti Virus
Bit Defender Anti Virus
Trend Micro
Norton Anti Virus Internet Security
McAfee Antivirus
Panda Anti Virus Pro 2009
Zone Alarm Anti Virus
F-Secure Anti Virus
AVG Anti Virus
ESET NOD32 Anti Virus
Virus ......................... Khatarn
Virus ......................... Khatarn

More Related Content

What's hot

The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spreadwenxin
 
Computer virus
Computer virusComputer virus
Computer virushrithikjha
 
Computer viruses
Computer virusesComputer viruses
Computer virusesImran Khan
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingmentcheauyih
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Virusesmartingarcia300
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all timeAlefyaM
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked

Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
computer past present future
computer past present futurecomputer past present future
computer past present futuredheva B
 
Technology past, present and future
Technology past, present and futureTechnology past, present and future
Technology past, present and futureCWomble
 
Evolution of computer
Evolution of computerEvolution of computer
Evolution of computerAnkit Yadav
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
EVOLUTION OF COMPUTER
EVOLUTION OF COMPUTEREVOLUTION OF COMPUTER
EVOLUTION OF COMPUTERfhemrosacia
 
History Of Computer
History Of ComputerHistory Of Computer
History Of Computerguest420b9d
 
Generations of computer
Generations of computerGenerations of computer
Generations of computerJatin Jindal
 
The evolution of computers
The evolution of computersThe evolution of computers
The evolution of computersSharat Chandu
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 

Viewers also liked (13)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer past present future
computer past present futurecomputer past present future
computer past present future
 
Technology past, present and future
Technology past, present and futureTechnology past, present and future
Technology past, present and future
 
Evolution of computer
Evolution of computerEvolution of computer
Evolution of computer
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
EVOLUTION OF COMPUTER
EVOLUTION OF COMPUTEREVOLUTION OF COMPUTER
EVOLUTION OF COMPUTER
 
History Of Computer
History Of ComputerHistory Of Computer
History Of Computer
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
The evolution of computers
The evolution of computersThe evolution of computers
The evolution of computers
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
GENERATION OF COMPUTERS.
GENERATION OF COMPUTERS.GENERATION OF COMPUTERS.
GENERATION OF COMPUTERS.
 

Similar to Virus ......................... Khatarn

Similar to Virus ......................... Khatarn (20)

Virus
VirusVirus
Virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Virus project
Virus projectVirus project
Virus project
 

Virus ......................... Khatarn

  • 1.
  • 2. VIRUS stands for ”Vital Information Resource Under Siege ”. A computer virus is a computer program that can replicate itself and spread from one computer to another. A computer program loaded to your computer with-out your knowledge or permission and runs against your wishes. All computer viruses are manmade.  Even such a simple virus is dangerous because it will use all the available memory and bring the system to the holt. The virus stays active in the background and infect new hosts those files are accessed by other program or the operating system itself.
  • 3. The computer runs slower than usual. The computer crashes, and then it restarts every few minutes. Applications on the computer do not work correctly. Disks or disk drives are inaccessible. You see unusual error messages. An antivirus program cannot be installed on the computer, or the antivirus program will not run. New icons appear on the desktop that you did not put Increases the use of disk space and growth in file size as virus gets attached itself to many files.
  • 4. Viruses can be divided into two types based on their behavior when they are executed. Resident Nonresident Resident Virus:- Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. Non-Resident Virus:- Nonresident viruses immediately search for other hosts that can be infected, infect those targets, and finally transfer control to the application program they infected.
  • 5. There are different types of computer virus.
  • 6. Trojan Horses are actually normal computer program. This is different from a regular virus because it does not attempt to reproduce itself. Trojan Horses do not affect a great number of people because they are discover quickly.
  • 7. It has been made copy itself from one computer to another over network. It is very harmful virus because it has reproduce nature. Marco virus spread much more than other type of viruses as people frequently share data files, it spread round the word in two hours effecting tens of millions of computer
  • 8. A block of code which attaches itself to another program and it can copy itself in to subsequent applications that you run.
  • 9. On downloading files from the Internet. On opening an e-mail attachment. On copying programs or files from any other infected computer.
  • 10.
  • 11.
  • 12. Most viruses have two phases to their existence, the “infection phase” and the “attack phase”. All viruses have an infection phase, but not all have an attack phase. During the infection phase, the virus spreads itself.
  • 13. "Your friend gives you a game on a disk. The game has an infected file that you don't know about. Each time you play the game, the virus copies itself into another program without you knowing. Now, whenever either of the programs are executed, the virus is copied. This continues as the virus infects the rest of the computer. If any of the files are transferred to a floppy disk or e-mail attachment, and they are put on another computer, the process starts again"
  • 14. The attack phase is set off by a trigger, such as a time or date. The attack phase is when the virus causes damage or other unwanted system behavior. In order to make sure it has spread, viruses often delay the attack phase, sometimes for years.
  • 15. Here are some tips that can help prevent a computer virus from attacking your system. Your first line of defense is to install anti-virus software. . This software can scan all your drives for viruses and neutralize them. Install updated and good quality Anti-Virus software that provides complete protection from spyware, adware and malware too. Schedule a complete system scan at least once a week to keep your system clean. Schedule a complete system scan at least once a week to keep your system clean
  • 16.
  • 17. Kasper Sky Anti Virus Bit Defender Anti Virus Trend Micro Norton Anti Virus Internet Security McAfee Antivirus Panda Anti Virus Pro 2009 Zone Alarm Anti Virus F-Secure Anti Virus AVG Anti Virus ESET NOD32 Anti Virus