SlideShare ist ein Scribd-Unternehmen logo
1 von 14
What is virus????
A computer virus is a computer program that
can replicate itself and spread from one
computer to another. The term "virus" is also
commonly, but erroneously, used to refer to
other types of malware, including but not
limited to adware and spyware programs that
do not have a reproductive ability.
Kinds of Virus
Boot Sector Virus
  The term “boot sector” is a generic name that seems to
  originally come from MS-DOS but is now applied
  generally to the boot information used by any
  operating system. In modern computers this is usually
  called the “master boot record,” and it is the first
  sector on a partitioned storage device.
  Boot sector viruses became popular because of the use
  of floppy disks to boot a computer. The widespread
  usage of the Internet and the death of the floppy has
  made other means of virus transmission more
  effective.
Kinds of Virus
Browser Hijacker
 This type of virus, which can spread itself in numerous ways including
 voluntary download, effectively hijacks certain browser functions, usually
 in the form of re-directing the user automatically to particular sites. It’s
 usually assumed that this tactic is designed to increase revenue from web
 advertisements. There are a lot of such viruses, and they usually have
 “search” included somewhere in their description. CoolWebSearch may be
 the most well known example, but others are nearly as common.
Kinds of Virus
Direct Action Virus
  This type of virus, unlike most, only comes into action
  when the file containing the virus is executed. The
  payload is delivered and then the virus essentially
  becomes dormant – it takes no other action unless an
  infected file is executed again.
  Most viruses do not use the direct action method of
  reproduction simply because it is not prolific, but
  viruses of this type have done damage in the past. The
  Vienna virus, which briefly threatened computers in
  1988, is one such example of a direct action virus.
Kinds of Virus
File Infector Virus
   Perhaps the most common type of virus, the file infector
   takes root in a host file and then begins its operation when
   the file is executed. The virus may completely overwrite the
   file that it infects, or may only replace parts of the file, or
   may not replace anything but instead re-write the file so
   that the virus is executed rather than the program the user
   intended.
   Although called a “file virus” the definition doesn’t apply to
   all viruses in all files generally – for example, the macro
   virus below is not referred to by the file virus. Instead, the
   definition is usually meant to refer only to viruses which
   use an executable file format, such as .exe, as their host.
Kinds of Virus
Macro Virus
 A wide variety of programs, including productivity
 applications like Microsoft Excel, provide support for
 Macros – special actions programmed into the document
 using a specific macro programming language.
 Unfortunately, this makes it possible for a virus to be
 hidden inside a seemingly benign document.
 Macro viruses very widely in terms of payload. The most
 well known macro virus is probably Melissa, a Word
 document supposedly containing the passwords to
 pornographic websites. The virus also exploited Word’s link
 to Microsoft Outlook in order to automatically email copies
 of itself.
Kinds of Virus
Multipartite Virus
 While some viruses are happy to spread via
 one method or deliver a single payload,
 Multipartite viruses want it all. A virus of this
 type may spread in multiple ways, and it may
 take different actions on an infected computer
 depending on variables, such as the operating
 system installed or the existence of certain
 files.
Kinds of Virus
Polymorphic Virus
  Another jack-of-all-trades, the Polymorphic virus
  actually mutates over time or after every execution,
  changing the code used to deliver its payload.
  Alternatively, or in addition, a Polymorphic virus may
  guard itself with an encryption algorithm that
  automatically alters itself when certain conditions are
  met.
  The goal of this trickery is evasion. Antivirus programs
  often find viruses by the specific code used. Obscuring
  or changing the code of a virus can help it avoid
  detection.
Kinds of Virus
Resident Virus
  This broad virus definition applies to any virus
  that inserts itself into a system’s memory. It then
  may take any number of actions and run
  independently of the file that was originally
  infected.
  A resident virus can be compared to a direct
  payload virus, which does not insert itself into the
  system’s memory and therefore only takes action
  when an infected file is executed.
Kinds of Virus
Web Scripting Virus
 Many websites execute complex code in order to provide
 interesting content. Displaying online video in your
 browser, for example, requires the execution of a specific
 code language that provides both the video itself and the
 player interface.
 Of course, this code can sometimes be exploited, making it
 possible for a virus to infect a computer or take actions on a
 computer through a website. Although malicious sites are
 sometimes created with purposely infected code, many
 such cases of virus exist because of code inserted into a site
 without the webmaster’s knowledge.
Virus
Ways to prevent virus from entering your computer
 One thing to do is avoid bad sites... illegal download sites, porn site, etc. Kazaa can
 cause major problems. Some game sites now have issues, when you down load
 their games. Uproar.com is one of them.
 There are also excellent Antivirus programs. I use Norton. I haven't had problems,
 and if I have they are caught. My son uses AVG from GriSoft, it seems to find more,
 and he doesn't even have email. He only uses AOL instant messenger, which is
 what I think might have given him a trojan. I now have AVG, Adware and McAfee.

 To prevent viruses, simply use a program such as Norton Antivirus, McAfee, or any
 other major virus protection program. A firewall is also very good in preventing
 viruses. On my computer I use Norton Antivirus and it is very helpful. You just
 access the internet for a live update every 30 days.
 To keep most important files safe especially the ones used most on your computer
 you should Scan not only the file but the folder it comes with as well before you
 begin to use the program. Most Antivirus programs that great for your computers
 safety can also put your computer in jeopardy. Though they still keep your
 computer safe, if your computer doesn't have enough power, your computer will
 cease to run at its expected speed leaving it with a higher risk of viruses, trojans,
 worms, and other problems.
Virus
How to clean your computer from viruses
      As soon as you suspect that your computer has a virus, remove your computer
      from any networks it might be on, as well as from the Internet, so that you
      don't inadvertently spread the bug to others. Unplug your network cable if
      you have to.
      If you have virus-scanning (anti-virus) software installed, run it.
      If you don't have anti-virus software, you'll need to obtain some. If you can't
      get it from a network administrator or download it from an uninfected
      computer, you can mail-order it from a retailer.
       Start your computer (still not connected to a network) and follow the
      instructions that came with the anti-virus software.
       Keep running the virus-scanning software until your computer comes up
      clean.
       Reconnect your computer to the Internet and check with the anti-virus
      software's publisher to make sure you have the latest updates. If not,
      download them now.
       After updating the anti-virus software, run it again until your computer comes
      up clean
Thank You


          Made By
         Aakriti
 Gupta

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)ainizbahari97
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus tayyaba rashid
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Computer virus
Computer virusComputer virus
Computer virushrithikjha
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 

Was ist angesagt? (20)

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virus Computer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 

Ähnlich wie Virus (20)

Virus
VirusVirus
Virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Virus

  • 1.
  • 2. What is virus???? A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
  • 3. Kinds of Virus Boot Sector Virus The term “boot sector” is a generic name that seems to originally come from MS-DOS but is now applied generally to the boot information used by any operating system. In modern computers this is usually called the “master boot record,” and it is the first sector on a partitioned storage device. Boot sector viruses became popular because of the use of floppy disks to boot a computer. The widespread usage of the Internet and the death of the floppy has made other means of virus transmission more effective.
  • 4. Kinds of Virus Browser Hijacker This type of virus, which can spread itself in numerous ways including voluntary download, effectively hijacks certain browser functions, usually in the form of re-directing the user automatically to particular sites. It’s usually assumed that this tactic is designed to increase revenue from web advertisements. There are a lot of such viruses, and they usually have “search” included somewhere in their description. CoolWebSearch may be the most well known example, but others are nearly as common.
  • 5. Kinds of Virus Direct Action Virus This type of virus, unlike most, only comes into action when the file containing the virus is executed. The payload is delivered and then the virus essentially becomes dormant – it takes no other action unless an infected file is executed again. Most viruses do not use the direct action method of reproduction simply because it is not prolific, but viruses of this type have done damage in the past. The Vienna virus, which briefly threatened computers in 1988, is one such example of a direct action virus.
  • 6. Kinds of Virus File Infector Virus Perhaps the most common type of virus, the file infector takes root in a host file and then begins its operation when the file is executed. The virus may completely overwrite the file that it infects, or may only replace parts of the file, or may not replace anything but instead re-write the file so that the virus is executed rather than the program the user intended. Although called a “file virus” the definition doesn’t apply to all viruses in all files generally – for example, the macro virus below is not referred to by the file virus. Instead, the definition is usually meant to refer only to viruses which use an executable file format, such as .exe, as their host.
  • 7. Kinds of Virus Macro Virus A wide variety of programs, including productivity applications like Microsoft Excel, provide support for Macros – special actions programmed into the document using a specific macro programming language. Unfortunately, this makes it possible for a virus to be hidden inside a seemingly benign document. Macro viruses very widely in terms of payload. The most well known macro virus is probably Melissa, a Word document supposedly containing the passwords to pornographic websites. The virus also exploited Word’s link to Microsoft Outlook in order to automatically email copies of itself.
  • 8. Kinds of Virus Multipartite Virus While some viruses are happy to spread via one method or deliver a single payload, Multipartite viruses want it all. A virus of this type may spread in multiple ways, and it may take different actions on an infected computer depending on variables, such as the operating system installed or the existence of certain files.
  • 9. Kinds of Virus Polymorphic Virus Another jack-of-all-trades, the Polymorphic virus actually mutates over time or after every execution, changing the code used to deliver its payload. Alternatively, or in addition, a Polymorphic virus may guard itself with an encryption algorithm that automatically alters itself when certain conditions are met. The goal of this trickery is evasion. Antivirus programs often find viruses by the specific code used. Obscuring or changing the code of a virus can help it avoid detection.
  • 10. Kinds of Virus Resident Virus This broad virus definition applies to any virus that inserts itself into a system’s memory. It then may take any number of actions and run independently of the file that was originally infected. A resident virus can be compared to a direct payload virus, which does not insert itself into the system’s memory and therefore only takes action when an infected file is executed.
  • 11. Kinds of Virus Web Scripting Virus Many websites execute complex code in order to provide interesting content. Displaying online video in your browser, for example, requires the execution of a specific code language that provides both the video itself and the player interface. Of course, this code can sometimes be exploited, making it possible for a virus to infect a computer or take actions on a computer through a website. Although malicious sites are sometimes created with purposely infected code, many such cases of virus exist because of code inserted into a site without the webmaster’s knowledge.
  • 12. Virus Ways to prevent virus from entering your computer One thing to do is avoid bad sites... illegal download sites, porn site, etc. Kazaa can cause major problems. Some game sites now have issues, when you down load their games. Uproar.com is one of them. There are also excellent Antivirus programs. I use Norton. I haven't had problems, and if I have they are caught. My son uses AVG from GriSoft, it seems to find more, and he doesn't even have email. He only uses AOL instant messenger, which is what I think might have given him a trojan. I now have AVG, Adware and McAfee. To prevent viruses, simply use a program such as Norton Antivirus, McAfee, or any other major virus protection program. A firewall is also very good in preventing viruses. On my computer I use Norton Antivirus and it is very helpful. You just access the internet for a live update every 30 days. To keep most important files safe especially the ones used most on your computer you should Scan not only the file but the folder it comes with as well before you begin to use the program. Most Antivirus programs that great for your computers safety can also put your computer in jeopardy. Though they still keep your computer safe, if your computer doesn't have enough power, your computer will cease to run at its expected speed leaving it with a higher risk of viruses, trojans, worms, and other problems.
  • 13. Virus How to clean your computer from viruses As soon as you suspect that your computer has a virus, remove your computer from any networks it might be on, as well as from the Internet, so that you don't inadvertently spread the bug to others. Unplug your network cable if you have to. If you have virus-scanning (anti-virus) software installed, run it. If you don't have anti-virus software, you'll need to obtain some. If you can't get it from a network administrator or download it from an uninfected computer, you can mail-order it from a retailer. Start your computer (still not connected to a network) and follow the instructions that came with the anti-virus software. Keep running the virus-scanning software until your computer comes up clean. Reconnect your computer to the Internet and check with the anti-virus software's publisher to make sure you have the latest updates. If not, download them now. After updating the anti-virus software, run it again until your computer comes up clean
  • 14. Thank You Made By Aakriti Gupta