SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Done by: Abir Almaqrashi
Ahlam Alabri
Shiekha AlRashdi
The Outline
 Definition of viruses.
 Why people create viruses.
 How the viruses enter your computer.
 Examples of viruses.
 Protecting information & computer.
 Definition of antivirus.
 Antivirus functionality.
 Examples of antivirus.
 Selecting an antivirus.
It is a small software program that is
designed to replicate itself. It has a negative
effect, such as causing a program to operate
incorrectly or corrupting a computer's
memory.
What is a Computer Viruses
Why people create computer viruses
 To make money.
 To steal account information.
 To cause problems and trouble for others.
How the viruses enter your computer?
1. Internet
 Software , gaming and multimedia
downloads
 Opening e-mail attachments
 Accepting without reading
2. Devices
 USB devices
 CD,DVD
 Bluetooth device.
 Mobile devices.
Examples of Viruses
1. Boot Sector Virus
2. Macro Virus
3. File Virus
4. Steath Virus
5. Polymorphic virus
6. Multipartite Virus
7. Worm
8. Trojans
9. shortcut virus
How to protect information in general.
Keep your computer clean and cool .
Use clean, steady power source .
Keep backups.
Use good password.
Keep your OS up to date.
Run a personal firewall.
Delete spam
Do not install shareware
Download and install a spyware removal tool.
How to protect your computer from viruses
 Technical measures
Anti-virus software
Update
 Check mail-servers
 Reject all e-mails of dangerous or unknown extensions
 Back up your important files
 scan any removable hardware
 Install security updates for your operating system and
programs
How to protect your computer from viruses
The definition of antivirus.
antivirus" is protective software designed to
defend your computer against malicious
software.
How Antivirus Software Works
 On-Access Scanning
 Full System Scans
 Virus Definitions
 Heuristics
Examples of Anti-Virus Software
 Shield Deluxe
 Trend Micro
 Norton Antivirus
 Panda Antivirus Pro
Examples of Anti-Virus Software
 Zone Alarm Anti-Virus
 Vipre Antivirus
 BitDefender Antivirus
 Kaspersky Antivirus
How to Choose the Right Antivirus Software
for Your PC
1. narrowed the list to meet your operating
system
2. narrowed the list to meet your usage needs
3. check the major certification and testing
agencies
4. (detection) check out the test scores
5. Evaluation
The top 10 antivirus software 2013
reviewed by (toptenantivirus.net )
BitDefender Antivirus
Vipre Antivirus
Perfect Antivirus
Kaspersky Antivirus
5 Norton Antivirus
ESET Nod32 Antivirus 5
F-Secure Antivirus
TrendMicro Titanium Antivirus
Zonealarm Antivirus
McAfee Antivirus Plus
How Viruses Enter Computers and How to Protect With Antivirus

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virusNaveen Goyal
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 

Was ist angesagt? (20)

Presentation2
Presentation2Presentation2
Presentation2
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Andere mochten auch

Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Jaime Sánchez
 
general organization and characterstics of virus
general organization and characterstics of virusgeneral organization and characterstics of virus
general organization and characterstics of virusMohd Asif Kanth
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
The Real Threats to Your Presentation Success
The Real Threats to Your Presentation SuccessThe Real Threats to Your Presentation Success
The Real Threats to Your Presentation SuccessMichelle Mazur
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Report on launching of new product
Report on launching of new productReport on launching of new product
Report on launching of new productFaiza Javaid
 
Threats to internal and external validity
Threats to internal and external validityThreats to internal and external validity
Threats to internal and external validityrodsazon
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Andere mochten auch (16)

Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
 
07 viruses
07   viruses07   viruses
07 viruses
 
general organization and characterstics of virus
general organization and characterstics of virusgeneral organization and characterstics of virus
general organization and characterstics of virus
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
The Real Threats to Your Presentation Success
The Real Threats to Your Presentation SuccessThe Real Threats to Your Presentation Success
The Real Threats to Your Presentation Success
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Security threats
Security threatsSecurity threats
Security threats
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Report on launching of new product
Report on launching of new productReport on launching of new product
Report on launching of new product
 
Threats to internal and external validity
Threats to internal and external validityThreats to internal and external validity
Threats to internal and external validity
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Ähnlich wie How Viruses Enter Computers and How to Protect With Antivirus

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentationDavid Lombrozo
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfBlogger
 

Ähnlich wie How Viruses Enter Computers and How to Protect With Antivirus (20)

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus project
Virus projectVirus project
Virus project
 
Antivirus
AntivirusAntivirus
Antivirus
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 

Mehr von Abir Almaqrashi

Mehr von Abir Almaqrashi (20)

دليل المعلم لدرس كيف أتوضأ؟
دليل المعلم لدرس كيف أتوضأ؟دليل المعلم لدرس كيف أتوضأ؟
دليل المعلم لدرس كيف أتوضأ؟
 
Evaluation
EvaluationEvaluation
Evaluation
 
Squ الجامعة الرقمية
Squ الجامعة الرقميةSqu الجامعة الرقمية
Squ الجامعة الرقمية
 
Evaluation of chem lab software.
Evaluation of chem lab software.Evaluation of chem lab software.
Evaluation of chem lab software.
 
Click go-decision-tool
Click go-decision-toolClick go-decision-tool
Click go-decision-tool
 
The color presentation
The color presentationThe color presentation
The color presentation
 
E learning and-its_applicability_in_basic_education.pptx
E learning and-its_applicability_in_basic_education.pptxE learning and-its_applicability_in_basic_education.pptx
E learning and-its_applicability_in_basic_education.pptx
 
Using multimedia
Using multimedia Using multimedia
Using multimedia
 
فعاليات ليوم الشجرة بعنوان
فعاليات ليوم الشجرة بعنوانفعاليات ليوم الشجرة بعنوان
فعاليات ليوم الشجرة بعنوان
 
تصميم مدونة الكترونية
تصميم مدونة الكترونيةتصميم مدونة الكترونية
تصميم مدونة الكترونية
 
Writing de materials11
Writing de materials11Writing de materials11
Writing de materials11
 
Writing de materials1
Writing de materials1Writing de materials1
Writing de materials1
 
Applying actions model
Applying actions modelApplying actions model
Applying actions model
 
Mlearning
MlearningMlearning
Mlearning
 
Mlearning
MlearningMlearning
Mlearning
 
Mlearning
MlearningMlearning
Mlearning
 
Mlearning
MlearningMlearning
Mlearning
 
Nsd
NsdNsd
Nsd
 
Tech 4101 1
Tech 4101 1Tech 4101 1
Tech 4101 1
 
Tech4101 1
 Tech4101 1 Tech4101 1
Tech4101 1
 

Kürzlich hochgeladen

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Kürzlich hochgeladen (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

How Viruses Enter Computers and How to Protect With Antivirus

  • 1. Done by: Abir Almaqrashi Ahlam Alabri Shiekha AlRashdi
  • 2. The Outline  Definition of viruses.  Why people create viruses.  How the viruses enter your computer.  Examples of viruses.  Protecting information & computer.  Definition of antivirus.  Antivirus functionality.  Examples of antivirus.  Selecting an antivirus.
  • 3. It is a small software program that is designed to replicate itself. It has a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory. What is a Computer Viruses
  • 4. Why people create computer viruses  To make money.  To steal account information.  To cause problems and trouble for others.
  • 5. How the viruses enter your computer? 1. Internet  Software , gaming and multimedia downloads  Opening e-mail attachments  Accepting without reading 2. Devices  USB devices  CD,DVD  Bluetooth device.  Mobile devices.
  • 6. Examples of Viruses 1. Boot Sector Virus 2. Macro Virus 3. File Virus 4. Steath Virus 5. Polymorphic virus 6. Multipartite Virus 7. Worm 8. Trojans 9. shortcut virus
  • 7. How to protect information in general. Keep your computer clean and cool . Use clean, steady power source . Keep backups. Use good password. Keep your OS up to date. Run a personal firewall. Delete spam Do not install shareware Download and install a spyware removal tool.
  • 8. How to protect your computer from viruses  Technical measures Anti-virus software Update  Check mail-servers  Reject all e-mails of dangerous or unknown extensions
  • 9.  Back up your important files  scan any removable hardware  Install security updates for your operating system and programs How to protect your computer from viruses
  • 10. The definition of antivirus. antivirus" is protective software designed to defend your computer against malicious software.
  • 11. How Antivirus Software Works  On-Access Scanning  Full System Scans  Virus Definitions  Heuristics
  • 12. Examples of Anti-Virus Software  Shield Deluxe  Trend Micro  Norton Antivirus  Panda Antivirus Pro
  • 13. Examples of Anti-Virus Software  Zone Alarm Anti-Virus  Vipre Antivirus  BitDefender Antivirus  Kaspersky Antivirus
  • 14. How to Choose the Right Antivirus Software for Your PC 1. narrowed the list to meet your operating system 2. narrowed the list to meet your usage needs 3. check the major certification and testing agencies 4. (detection) check out the test scores 5. Evaluation
  • 15. The top 10 antivirus software 2013 reviewed by (toptenantivirus.net ) BitDefender Antivirus Vipre Antivirus Perfect Antivirus Kaspersky Antivirus 5 Norton Antivirus ESET Nod32 Antivirus 5 F-Secure Antivirus TrendMicro Titanium Antivirus Zonealarm Antivirus McAfee Antivirus Plus