SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Computer Viruses
And
Hacking
Created By .Bilal Hamid
9-1
Computer Viruses
Computer Virus is a malware
(file/method/software) designed to crash the
operating system and also designed to modify
the computer.
Types Of Viruses
• There are many types of computer viruses
Some are listed below
1. Trojan Horse Viruses
Trojan (Trojan Horse) viruses are the malware
which gain access to operating system and crash
the computer in few days.
2. Win32/Simile Viruses
Win32/Simile is a metamorphic computer
virus written in assembly language for Microsoft
Windows . It affects the executable file.
3. AGI-Plan Viruses
AGI-Plan virus is a virus which finds memory
resident DOS-File and infect it . This way the PC
will crash.
4. Ambulance Virus
Ambulance Virus or Ambulance Car Virus is a virus
which locate for MS-DOS Files , then overwrites in
it.
5. Stoned Virus
It is the part of BOOT SECTOR VIRUS(1987) . This
virus affects only the screen and the pc stoned
How To Protect
1. Use Antivirus Programs
2. Use Firewalls
3. Make Passwords Encrypted
4. Scan your PC Daily
5. Switch off net when not using
6. Use Chrome Explorer for safe download
7. Don’t download software from unknown source
8. Disable Auto run
9. Deploy DNS Protection
10.Download anti-spyware program
How To Make A Virus Using Notepad
Number One- (Harmless Virus)
(Can be DELETED)
Open Notepad And Write
Set oWMP = CreateObject("WMPlayer.OCX.7“
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Save this in notepad as virus.vbs in documents and
after every 2 mins the CD inserted will eject.
Number Two- (Harmful Virus)]
(Can't be DELETED)
Open Notepad And
Write
@echo off
:start
And save as .bat
Double click and your pc will crash
Note : @Echo is the code word for
computer to listen command
Computer Hacking
Hacking is the process of gaining
access to Passwords , Keys ,
Documents , OR accessing the
Computer Files without knowing
owner.
Types Of Hacking
1. Phishing
It is a method to send email and Hack
2. Smishing
It is a method to send messages and Hack
3. Malware
It is a method to download software's without
permission and Hack
How To Protect
1. Use Antivirus Programs
2. Use Firewalls
3. Make Passwords Encrypted
4. Scan your PC Daily
5. Switch off net when not using
6. Use Chrome Explorer for safe download
7. Don’t download software from unknown source
8. Disable Auto run
9. Deploy DNS Protection
10.Download anti-spyware program
THANK YOU
Created By : BILAL
HAMID
Grade : 9-1
A . C . I . S . J

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Virus
Virus  Virus
Virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Ähnlich wie Computer viruses

Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)cdebraj16101991
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxNORTHCUSTOMS
 
Nimda Wor Mv2
Nimda Wor Mv2Nimda Wor Mv2
Nimda Wor Mv2Goaway96
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhandenullowaspmumbai
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 

Ähnlich wie Computer viruses (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Virus project
Virus projectVirus project
Virus project
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Nimda Wor Mv2
Nimda Wor Mv2Nimda Wor Mv2
Nimda Wor Mv2
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Malware
MalwareMalware
Malware
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 

Kürzlich hochgeladen

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Computer viruses

  • 2. Computer Viruses Computer Virus is a malware (file/method/software) designed to crash the operating system and also designed to modify the computer.
  • 3. Types Of Viruses • There are many types of computer viruses Some are listed below 1. Trojan Horse Viruses Trojan (Trojan Horse) viruses are the malware which gain access to operating system and crash the computer in few days. 2. Win32/Simile Viruses Win32/Simile is a metamorphic computer virus written in assembly language for Microsoft Windows . It affects the executable file.
  • 4. 3. AGI-Plan Viruses AGI-Plan virus is a virus which finds memory resident DOS-File and infect it . This way the PC will crash. 4. Ambulance Virus Ambulance Virus or Ambulance Car Virus is a virus which locate for MS-DOS Files , then overwrites in it. 5. Stoned Virus It is the part of BOOT SECTOR VIRUS(1987) . This virus affects only the screen and the pc stoned
  • 5. How To Protect 1. Use Antivirus Programs 2. Use Firewalls 3. Make Passwords Encrypted 4. Scan your PC Daily 5. Switch off net when not using 6. Use Chrome Explorer for safe download 7. Don’t download software from unknown source 8. Disable Auto run 9. Deploy DNS Protection 10.Download anti-spyware program
  • 6. How To Make A Virus Using Notepad Number One- (Harmless Virus) (Can be DELETED) Open Notepad And Write Set oWMP = CreateObject("WMPlayer.OCX.7“ Set colCDROMs = oWMP.cdromCollection do if colCDROMs.Count >= 1 then For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next End If wscript.sleep 5000 loop Save this in notepad as virus.vbs in documents and after every 2 mins the CD inserted will eject.
  • 7. Number Two- (Harmful Virus)] (Can't be DELETED) Open Notepad And Write @echo off :start And save as .bat Double click and your pc will crash Note : @Echo is the code word for computer to listen command
  • 8. Computer Hacking Hacking is the process of gaining access to Passwords , Keys , Documents , OR accessing the Computer Files without knowing owner.
  • 9. Types Of Hacking 1. Phishing It is a method to send email and Hack 2. Smishing It is a method to send messages and Hack 3. Malware It is a method to download software's without permission and Hack
  • 10. How To Protect 1. Use Antivirus Programs 2. Use Firewalls 3. Make Passwords Encrypted 4. Scan your PC Daily 5. Switch off net when not using 6. Use Chrome Explorer for safe download 7. Don’t download software from unknown source 8. Disable Auto run 9. Deploy DNS Protection 10.Download anti-spyware program
  • 11. THANK YOU Created By : BILAL HAMID Grade : 9-1 A . C . I . S . J