SlideShare ist ein Scribd-Unternehmen logo
1 von 14
COMPUTER VIRUS
SUBMITTED BY,
ABINIYA.K.VIJAYAN
ROLL NO : 22
PHYSICAL SCIENCE
COMPUTER VIRUS
 A computer virus or computer worm is a malicious software program that can
self-replicate on computers or via computer networks – without the user being
aware that his machine has become infected.
 Because each subsequent copy of the virus can also self – replicate, infections
can spread very easily.
 All computer viruses are man made. They are loaded onto the computer
without the users knowledge and runs against his wishes. A simple virus that
can make a copy of itself over and over again is relatively easy to produce.
 Even such a simple virus is dangerous because it will quickly use all available
memory and bring the system to a halt.
 The first computer virus was called “Creeper”. It was invented in the early
1970’s. Since then, millions of viruses have been invented.
 The first known computer virus was written in 1981 by a man named Rich
Skrenta. This virus was termed as “Elk Cloner”.
 According to Webster’s Collegiate Dictionary, a computer virus is “a computer
program usually hidden within another program that produces copies of itself
and inserts them into other programs or files, and they usually perform a
malicious action (such as destroying data)”.
How does virus affect
 By downloading files from the Internet.
 Sharing music, files, or photos with other users.
 Through pen drive.
 Through e-mail attachments or spam e-mails.
 Through unprotected or poor administrator passwords.
 Visiting an infected website.
 Downloading free games, toolbars, media’s.
 Installing mainstream software applications without thoroughly reading
license agreements.
What are the symptoms that computer
might have a virus?
 Slow response and slow program execution.
 Random hard drive crashes and restarts.
 Distorted graphics and text.
 Files that have mysteriously vanished
 Extensive pop-up ads.
 Inability to open files with existing passwords.
Impact of Virus
 Disrupts the normal functionality of respective computer system.
 Disrupts system network use.
 Modifies configuration setting of the system.
 Disrupts computer network resources.
 Destructs of confidential data.
 Slow computer performance.
 Erratic computer behaviour.
 Unexplained data loss.
 Frequent computer crashes.
MALWARE
 “Malware” is short for malicious software.
 It is a type of software that could harm a computer system, interfere with
and gather a user’s data, or make the computer perform actions without the
owner’s knowledge or permission.
 “Malware” is the general term covering all the different types of threats to
your computer safety such as viruses, spyware, worms, trojans, rootkits etc.
 Malware is often used to against individuals to gain information such a
personal identification numbers or details, bank or credit card numbers and
passwords.
SPYWARE
 It is a type of malware.
 Spyware is a program that gets installed without the user’s permission.
 Spyware monitor’s the user’s activities on the internet and transmits that
information to the third party.
 It is often hidden from the user.
 On the internet it is sometimes called a spybot Or tracking software.
 Spyware is mostly used for the purposes of tracking and storing internet users
movements on the web.
How to avoid spywarer
 Read licensing agreements.
 Watch out for anti – spyware scams.
 Beware of clickable ads.
 Keep your Internet browser up to date.
 Scan your computer often.
 Be selective about what you download to your computer.
Trojan
 A Trojan or Trojan horse, in computing is any malicious computer program which
misrepresents itself as useful, routine or interesting in order to persuade a victim
to install it. The malicious activities that they perform are the following ;
 Deleting data
 Blocking data
 Modifying data
 Copying data
 Disrupting the performance of computers or computer networks.
 Unlike computer viruses and worms, Trojans are not able to self-replicate.
 Trojans are usually used to take complete control of the computer.
 According to the type of action that they can perform on the affected computer,
they are classified as follows :
 Rootkit : To prevent malicious programs being detected.
 Trojan-Downloader : It can download and install new versions of malicious
programs onto your computer.
 Trojan- Game thief : It steals user account information from online gamers.
 Trojan-Spy : It can spy on how the user is using the computer.
 Trojan-Mailfinder : It can harvest email addresses from your computer.
Ways to overcome
 Use antivirus protection and a firewall.
 Get antispyware software.
 Always keep your antivirus protection and antispyware software up-to-date.
 Update your operating system regularly.
 Increase your browser security settings.
 Avoid questionable websites.
 Only download software from sites you trust.
 Carefully evaluate free software and file-sharing applications before downloading
them.
 Don’t open messages from unknown senders.
 Immediately delete messages you suspect to be spam.
“
”
THANK YOU🙏

Weitere ähnliche Inhalte

Was ist angesagt?

What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virusKriti kohli
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)phexcom1
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 

Was ist angesagt? (20)

Spyware
SpywareSpyware
Spyware
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
MALWARE
MALWAREMALWARE
MALWARE
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Network security
Network securityNetwork security
Network security
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 

Ähnlich wie computer virus ppt.pptx

Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfasujal2009
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwaresKriti kohli
 

Ähnlich wie computer virus ppt.pptx (20)

Computer virus
Computer virusComputer virus
Computer virus
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware
MalwareMalware
Malware
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
computer security
computer securitycomputer security
computer security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Computer malware
Computer malware Computer malware
Computer malware
 

Kürzlich hochgeladen

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

Kürzlich hochgeladen (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

computer virus ppt.pptx

  • 2. COMPUTER VIRUS  A computer virus or computer worm is a malicious software program that can self-replicate on computers or via computer networks – without the user being aware that his machine has become infected.  Because each subsequent copy of the virus can also self – replicate, infections can spread very easily.  All computer viruses are man made. They are loaded onto the computer without the users knowledge and runs against his wishes. A simple virus that can make a copy of itself over and over again is relatively easy to produce.  Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.
  • 3.  The first computer virus was called “Creeper”. It was invented in the early 1970’s. Since then, millions of viruses have been invented.  The first known computer virus was written in 1981 by a man named Rich Skrenta. This virus was termed as “Elk Cloner”.  According to Webster’s Collegiate Dictionary, a computer virus is “a computer program usually hidden within another program that produces copies of itself and inserts them into other programs or files, and they usually perform a malicious action (such as destroying data)”.
  • 4. How does virus affect  By downloading files from the Internet.  Sharing music, files, or photos with other users.  Through pen drive.  Through e-mail attachments or spam e-mails.  Through unprotected or poor administrator passwords.  Visiting an infected website.  Downloading free games, toolbars, media’s.  Installing mainstream software applications without thoroughly reading license agreements.
  • 5. What are the symptoms that computer might have a virus?  Slow response and slow program execution.  Random hard drive crashes and restarts.  Distorted graphics and text.  Files that have mysteriously vanished  Extensive pop-up ads.  Inability to open files with existing passwords.
  • 6. Impact of Virus  Disrupts the normal functionality of respective computer system.  Disrupts system network use.  Modifies configuration setting of the system.  Disrupts computer network resources.  Destructs of confidential data.  Slow computer performance.  Erratic computer behaviour.  Unexplained data loss.  Frequent computer crashes.
  • 7. MALWARE  “Malware” is short for malicious software.  It is a type of software that could harm a computer system, interfere with and gather a user’s data, or make the computer perform actions without the owner’s knowledge or permission.  “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits etc.  Malware is often used to against individuals to gain information such a personal identification numbers or details, bank or credit card numbers and passwords.
  • 8. SPYWARE  It is a type of malware.  Spyware is a program that gets installed without the user’s permission.  Spyware monitor’s the user’s activities on the internet and transmits that information to the third party.  It is often hidden from the user.  On the internet it is sometimes called a spybot Or tracking software.  Spyware is mostly used for the purposes of tracking and storing internet users movements on the web.
  • 9. How to avoid spywarer  Read licensing agreements.  Watch out for anti – spyware scams.  Beware of clickable ads.  Keep your Internet browser up to date.  Scan your computer often.  Be selective about what you download to your computer.
  • 10. Trojan  A Trojan or Trojan horse, in computing is any malicious computer program which misrepresents itself as useful, routine or interesting in order to persuade a victim to install it. The malicious activities that they perform are the following ;  Deleting data  Blocking data  Modifying data  Copying data  Disrupting the performance of computers or computer networks.
  • 11.  Unlike computer viruses and worms, Trojans are not able to self-replicate.  Trojans are usually used to take complete control of the computer.  According to the type of action that they can perform on the affected computer, they are classified as follows :  Rootkit : To prevent malicious programs being detected.  Trojan-Downloader : It can download and install new versions of malicious programs onto your computer.  Trojan- Game thief : It steals user account information from online gamers.
  • 12.  Trojan-Spy : It can spy on how the user is using the computer.  Trojan-Mailfinder : It can harvest email addresses from your computer.
  • 13. Ways to overcome  Use antivirus protection and a firewall.  Get antispyware software.  Always keep your antivirus protection and antispyware software up-to-date.  Update your operating system regularly.  Increase your browser security settings.  Avoid questionable websites.  Only download software from sites you trust.  Carefully evaluate free software and file-sharing applications before downloading them.  Don’t open messages from unknown senders.  Immediately delete messages you suspect to be spam.