SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Awesomeness
Computer Virus
Computer Virus are malicious programs
which disrupts the normal functioning of the
computer system and can transfer through
computers without the acknowledge or
permission of the user.
-Bipul Pant
Computer Virus
• Computer viruses can spread into our system without any permission.
So, we should always be aware before running any unknown or
suspicious files.
Computer viruses can also harm our whole system , they can corrupt
all our files to wierd extensions and make them unusable.
We must be sure that the unknow file is safe
to use otherwise we shouldn’t run it.
If you don’t know that the file is safe, always press no.
• Always make sure you have an antivirus
software installed, if not take some
advice from your seniors to download
it.
• Some examples of antivirus softwares are:
• Avast Secure Connection -Kaspersky -Malwarebytes
Stealth Virus
• It uses special techniques to hide its presence from the user and
virus scan.
• The examples are Frodo, Joshi and Whale.
• A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software.
• Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.
• Users are typically tricked by some form of social engineering into loading and executing
Trojans on their systems.
Trojan Horse
Purpose of creating virus
 To stop the software piracy.
 To entertain user by displaying interesting message and pictures.
 To steal data and information.
 To destroy data, information and files.
 To expose their programming ability
 To earn money
IF WE GET ANY FILES LIKE THIS , WE MUST SCAN OUR
COMPUTER AND REMOVE THE VIRUS.
Types of computer virus
There are 5 tyes of computer virus.
Boot Sector Infector Virus (Start Up Infector or Bootstrap Virus):
Infects the bootstrap loader and the file that contains files information. C-Brain,
Stone, Disk Killer etc. are some popular Boot sector viruses.
File Infector or Parasitic Virus (General Purpose Application Infector):
Infects executable files or program (i.e. files having .exe, .bin, .sys or .com extension)
in the computer. Ambulance virus, Die Heart etc are the examples of file viruses.
Multi-partite Virus :
 have the abilities of the parasitic and the bootstrap sector viruses. So they are able to
infect either executable files or boot sector.
Types of Viruses Continue...
 Macro Virus (Document infector virus) :
• Infects specially the documents created in Microsoft applications
like MS-Word, MS-Excel, MS-Access or MS-
PowerPoint. Melissa, LoveLetter etc. are some examples of
macro virus.
 Script Virus:
 Written in script programming languages, such
as VBScript(Visual Basic Script) Java Script. “HTML.Redloaf.A”
and “Iloveyou” viruses are the examples of Script Viruses.
Computer virus | Definition | Explaination

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Malware
MalwareMalware
Malware
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Anti virus
Anti virusAnti virus
Anti virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
computer virus
computer viruscomputer virus
computer virus
 
Virus
VirusVirus
Virus
 
computer Virus
computer Virus computer Virus
computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Presentation2
Presentation2Presentation2
Presentation2
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 

Ähnlich wie Computer virus | Definition | Explaination

Ähnlich wie Computer virus | Definition | Explaination (20)

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Virus project
Virus projectVirus project
Virus project
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 

Kürzlich hochgeladen

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Kürzlich hochgeladen (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Computer virus | Definition | Explaination

  • 1. Awesomeness Computer Virus Computer Virus are malicious programs which disrupts the normal functioning of the computer system and can transfer through computers without the acknowledge or permission of the user. -Bipul Pant
  • 3. • Computer viruses can spread into our system without any permission. So, we should always be aware before running any unknown or suspicious files. Computer viruses can also harm our whole system , they can corrupt all our files to wierd extensions and make them unusable.
  • 4. We must be sure that the unknow file is safe to use otherwise we shouldn’t run it. If you don’t know that the file is safe, always press no.
  • 5. • Always make sure you have an antivirus software installed, if not take some advice from your seniors to download it.
  • 6. • Some examples of antivirus softwares are: • Avast Secure Connection -Kaspersky -Malwarebytes
  • 7. Stealth Virus • It uses special techniques to hide its presence from the user and virus scan. • The examples are Frodo, Joshi and Whale.
  • 8. • A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. • Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. • Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Trojan Horse
  • 9. Purpose of creating virus  To stop the software piracy.  To entertain user by displaying interesting message and pictures.  To steal data and information.  To destroy data, information and files.  To expose their programming ability  To earn money
  • 10. IF WE GET ANY FILES LIKE THIS , WE MUST SCAN OUR COMPUTER AND REMOVE THE VIRUS.
  • 11. Types of computer virus There are 5 tyes of computer virus. Boot Sector Infector Virus (Start Up Infector or Bootstrap Virus): Infects the bootstrap loader and the file that contains files information. C-Brain, Stone, Disk Killer etc. are some popular Boot sector viruses. File Infector or Parasitic Virus (General Purpose Application Infector): Infects executable files or program (i.e. files having .exe, .bin, .sys or .com extension) in the computer. Ambulance virus, Die Heart etc are the examples of file viruses. Multi-partite Virus :  have the abilities of the parasitic and the bootstrap sector viruses. So they are able to infect either executable files or boot sector.
  • 12. Types of Viruses Continue...  Macro Virus (Document infector virus) : • Infects specially the documents created in Microsoft applications like MS-Word, MS-Excel, MS-Access or MS- PowerPoint. Melissa, LoveLetter etc. are some examples of macro virus.  Script Virus:  Written in script programming languages, such as VBScript(Visual Basic Script) Java Script. “HTML.Redloaf.A” and “Iloveyou” viruses are the examples of Script Viruses.