SlideShare ist ein Scribd-Unternehmen logo
1 von 13
The term “boot sector” is a generic name that
seems to originally come from MS-DOS but is
now applied generally to the boot information
used by any operating system. In modern
computers this is usually called the “master boot
record,” and it is the first sector on a partitioned
storage device.
Boot sector viruses became popular because of
the use of floppy disks to boot a computer. The
widespread usage of the Internet and the death
of the floppy has made other means of virus
transmission more effective.
This type of virus, which can spread itself in numerous ways
including voluntary download, effectively hijacks certain
browser functions, usually in the form of re-directing the user
automatically to particular sites. It’s usually assumed that this
tactic is designed to increase revenue from web
advertisements
This type of virus, unlike most, only comes into
action when the file containing the virus is
executed. The payload is delivered and then the
virus essentially becomes dormant – it takes no
other action unless an infected file is executed
again.
Most viruses do not use the direct action method
of reproduction simply because it is not prolific,
but viruses of this type have done damage in the
past. The Vienna virus, which briefly threatened
computers in 1988, is one such example of a
direct action virus.
Perhaps the most common type of virus, the file infector
takes root in a host file and then begins its operation
when the file is executed. The virus may completely
overwrite the file that it infects, or may only replace parts
of the file, or may not replace anything but instead re-
write the file so that the virus is executed rather than the
program the user intended.
Although called a “file virus” the definition doesn’t apply
to all viruses in all files generally – for example, the
macro virus below is not referred to by the file virus.
Instead, the definition is usually meant to refer only to
viruses which use an executable file format, such as .exe,
as their host.
A wide variety of programs, including productivity
applications like Microsoft Excel, provide support for
Macros – special actions programmed into the document
using a specific macro programming language.
Unfortunately, this makes it possible for a virus to be
hidden inside a seemingly benign document.
Macro viruses very widely in terms of payload. The most
well known macro virus is probably Melissa, a Word
document supposedly containing the passwords to
pornographic websites. The virus also exploited Word’s
link to Microsoft Outlook in order to automatically email
copies of itself.
While some viruses are happy to spread via one
method or deliver a single payload, Multipartite viruses
want it all. A virus of this type may spread in multiple
ways, and it may take different actions on an infected
computer depending on variables, such as the
operating system installed or the existence of certain
files.
Another jack-of-all-trades, the Polymorphic virus actually
mutates over time or after every execution, changing the
code used to deliver its payload. Alternatively, or in
addition, a Polymorphic virus may guard itself with an
encryption algorithm that automatically alters itself when
certain conditions are met.
The goal of this trickery is evasion. Antivirus programs
often find viruses by the specific code used. Obscuring or
changing the code of a virus can help it avoid detection.
This broad virus definition applies to any virus that inserts
itself into a system’s memory. It then may take any
number of actions and run independently of the file that
was originally infected.
A resident virus can be compared to a direct payload
virus, which does not insert itself into the system’s
memory and therefore only takes action when an infected
file is executed.
Many websites execute complex code in order to provide
interesting content. Displaying online video in your
browser, for example, requires the execution of a specific
code language that provides both the video itself and the
player interface.
Of course, this code can sometimes be exploited, making
it possible for a virus to infect a computer or take actions
on a computer through a website. Although malicious
sites are sometimes created with purposely infected code,
many such cases of virus exist because of code inserted
into a site without the webmaster’s knowledge.
The threat of viruses infecting our computers is a serious matter. Luckily,
the steps for avoiding an infection on your equipment are relatively simple.
1. The first step in preventing infection is by installing anti-virus software
on your all your computers. A good antivirus system will scan your machine
regularly to clean it from any infected files. Some popular antivirus systems
are Norton Antivirus, Panda Antivirus and McAfee. It is advised to NOT
connect to the Internet without AV protection – the cost is well worth it.
Update your anti-virus software regularly. Over 200 viruses are
discovered each month, so you'll want to be protected.
3. WHEN IN DOUBT, THROW IT OUT! Always use caution and do not
open, download, or execute any suspicious files or email attachments. If the
file was in fact legitimate, you can always ask the sender to resend it. Do not
open any files attached to an email
Delete chain emails and junk email. Do not forward or reply to
any to them. These types of email are considered spam, which is
unsolicited, intrusive mail that clogs up the network.
2. Use caution when downloading files from the Internet. Ensure
that the source is a legitimate and reputable one. Verify that an
anti-virus program checks the files on the download site. If you're
uncertain, don't download the file at all.
3. Back up your files on a regular basis. If a virus destroys your
files, at least you can replace them with your back-up copy.
Computer virus

Weitere ähnliche Inhalte

Was ist angesagt?

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer virus
Computer virusComputer virus
Computer virusShubham Kafle
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virusHuma Tariq
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer viruses
Computer virusesComputer viruses
Computer virusesPankaj Kumawat
 
Computer virus
Computer virusComputer virus
Computer virushrithikjha
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015fidel barrios
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)Tejas Kolge
 

Was ist angesagt? (20)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
Virus  Virus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 

Andere mochten auch

CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"Mikee Monte de Ramos
 
Computer virus
Computer virusComputer virus
Computer virusdhamankar92
 
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...COWCATCHER Publications
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICTCJ900
 

Andere mochten auch (7)

CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Rohan dev
Rohan devRohan dev
Rohan dev
 
Computer virus
Computer virusComputer virus
Computer virus
 
Chemistry pbl
Chemistry pblChemistry pbl
Chemistry pbl
 
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICT
 

Ă„hnlich wie Computer virus

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer Virus
Computer Virus Computer Virus
Computer Virus bebo
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Virus
VirusVirus
Virusdddaou
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virusDivyesh Rakholiya
 
Computer virus
Computer virusComputer virus
Computer virusdineshrwt911
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer Virus
Computer VirusComputer Virus
Computer VirusAmirah Husna
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and DefenseMd.Tanvir Ul Haque
 
Computer virus
Computer virus Computer virus
Computer virus AshishVasan
 

Ă„hnlich wie Computer virus (20)

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Virus
VirusVirus
Virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer virus
Computer virus Computer virus
Computer virus
 

KĂĽrzlich hochgeladen

FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

KĂĽrzlich hochgeladen (20)

FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

Computer virus

  • 1.
  • 2. The term “boot sector” is a generic name that seems to originally come from MS-DOS but is now applied generally to the boot information used by any operating system. In modern computers this is usually called the “master boot record,” and it is the first sector on a partitioned storage device. Boot sector viruses became popular because of the use of floppy disks to boot a computer. The widespread usage of the Internet and the death of the floppy has made other means of virus transmission more effective.
  • 3. This type of virus, which can spread itself in numerous ways including voluntary download, effectively hijacks certain browser functions, usually in the form of re-directing the user automatically to particular sites. It’s usually assumed that this tactic is designed to increase revenue from web advertisements
  • 4. This type of virus, unlike most, only comes into action when the file containing the virus is executed. The payload is delivered and then the virus essentially becomes dormant – it takes no other action unless an infected file is executed again. Most viruses do not use the direct action method of reproduction simply because it is not prolific, but viruses of this type have done damage in the past. The Vienna virus, which briefly threatened computers in 1988, is one such example of a direct action virus.
  • 5. Perhaps the most common type of virus, the file infector takes root in a host file and then begins its operation when the file is executed. The virus may completely overwrite the file that it infects, or may only replace parts of the file, or may not replace anything but instead re- write the file so that the virus is executed rather than the program the user intended. Although called a “file virus” the definition doesn’t apply to all viruses in all files generally – for example, the macro virus below is not referred to by the file virus. Instead, the definition is usually meant to refer only to viruses which use an executable file format, such as .exe, as their host.
  • 6. A wide variety of programs, including productivity applications like Microsoft Excel, provide support for Macros – special actions programmed into the document using a specific macro programming language. Unfortunately, this makes it possible for a virus to be hidden inside a seemingly benign document. Macro viruses very widely in terms of payload. The most well known macro virus is probably Melissa, a Word document supposedly containing the passwords to pornographic websites. The virus also exploited Word’s link to Microsoft Outlook in order to automatically email copies of itself.
  • 7. While some viruses are happy to spread via one method or deliver a single payload, Multipartite viruses want it all. A virus of this type may spread in multiple ways, and it may take different actions on an infected computer depending on variables, such as the operating system installed or the existence of certain files.
  • 8. Another jack-of-all-trades, the Polymorphic virus actually mutates over time or after every execution, changing the code used to deliver its payload. Alternatively, or in addition, a Polymorphic virus may guard itself with an encryption algorithm that automatically alters itself when certain conditions are met. The goal of this trickery is evasion. Antivirus programs often find viruses by the specific code used. Obscuring or changing the code of a virus can help it avoid detection.
  • 9. This broad virus definition applies to any virus that inserts itself into a system’s memory. It then may take any number of actions and run independently of the file that was originally infected. A resident virus can be compared to a direct payload virus, which does not insert itself into the system’s memory and therefore only takes action when an infected file is executed.
  • 10. Many websites execute complex code in order to provide interesting content. Displaying online video in your browser, for example, requires the execution of a specific code language that provides both the video itself and the player interface. Of course, this code can sometimes be exploited, making it possible for a virus to infect a computer or take actions on a computer through a website. Although malicious sites are sometimes created with purposely infected code, many such cases of virus exist because of code inserted into a site without the webmaster’s knowledge.
  • 11. The threat of viruses infecting our computers is a serious matter. Luckily, the steps for avoiding an infection on your equipment are relatively simple. 1. The first step in preventing infection is by installing anti-virus software on your all your computers. A good antivirus system will scan your machine regularly to clean it from any infected files. Some popular antivirus systems are Norton Antivirus, Panda Antivirus and McAfee. It is advised to NOT connect to the Internet without AV protection – the cost is well worth it. Update your anti-virus software regularly. Over 200 viruses are discovered each month, so you'll want to be protected. 3. WHEN IN DOUBT, THROW IT OUT! Always use caution and do not open, download, or execute any suspicious files or email attachments. If the file was in fact legitimate, you can always ask the sender to resend it. Do not open any files attached to an email
  • 12. Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network. 2. Use caution when downloading files from the Internet. Ensure that the source is a legitimate and reputable one. Verify that an anti-virus program checks the files on the download site. If you're uncertain, don't download the file at all. 3. Back up your files on a regular basis. If a virus destroys your files, at least you can replace them with your back-up copy.