Binisha.pptx

Prepared By :
Binisha Tamang
Shree Rudrayanee Secondary School
Lalitpur, Nepal
A computer virus is a program that can copy
itself and infect a computer without the
permission or knowledge of the user.
 Boot sector virus
 File or Program virus
 Macro virus
 Multipartite virus
 Stealth virus
 Boot sector virus replace or implant themselves
in the boot sector, the area of the hard drive (or
any other disk) accessed when you first turn on
your computer. This kind of virus can prevent
you from being able to boot your hard disk. For
example:
 Danish Boot
 Brain
 Disk killer
 Michelangelo
 File viruses infect application programs. They
may attach themselves to any executable file,
usually .COM and .EXE files. An application
program infector takes control after the initial
use of the infected program For example:
 Acid Rain
 Alien.298
 Crazy A
 Macro viruses are written by using a simplified
macro programming language. These viruses
affect a Microsoft office document created
using MS-Word, MSExcel, MSAccess, etc. The
viruses can spread if the infected document is
open in another computer. For example:
 Melissa
 Word Concept
 Multipartite viruses can infect both application
programs and the boot sector of a disk. They
infect program files and when the infected
program is executed; these viruses infect boot
record. Next time, The virus from the boot
record loads in the memory and then starts
infecting other program files on the disk. For
example:
 Invader
 File
 Tequila
 Stealth viruses actively hide themselves from
antiviral software by either masking the size of
the file that they hide in or temporarily
removing itself from the infected file and
placing a copy of itself in another location on
the drive. For example:
 Frodo
 Joshi
 Whale
 Booting processing becomes slow
 Size of files may be changed
 Location of file may be changed
 Computer gives unnecessary message and
produces sounds
 Internet
 Email
 Infected files
 Infected removable storage devices
 Pirated software
 Programs take a longer time to load. Memory-
resident operations take a lot of time to start.
 A change occurs in dates and time of saved
files.
 Hard disk is suddenly accessed without a
logical reason.
 Viruses increases the use of disk space and
growth in file size. They attach themselves to
many files.
 Unnecessary massages are display on the
monitor.
 Scan downloaded files of the internet before
copying to your computer.
 Use a good antivirus program to scan floppy
disks before copying files. Recommended once
are Total AV, Norton Antivirus and McAfee.
 Do not install pirated software.
 Scan your computer system and removable
storage devices before use.
1 von 12

Recomendados

Viruses notes1 von
Viruses notes1Viruses notes1
Viruses notes1Dara Corporates
510 views11 Folien
Viruses notes von
Viruses notesViruses notes
Viruses notesDara Corporates
13.3K views11 Folien
Computer virus von
Computer virusComputer virus
Computer viruskiran_a_c
1.1K views15 Folien
Computer viruses and prevention techniques von
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
5.8K views34 Folien
Computer viruses by joy chakraborty von
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
1.7K views9 Folien
Computer virus von
Computer virusComputer virus
Computer virusdineshrwt911
57 views22 Folien

Más contenido relacionado

Similar a Binisha.pptx

computer virus Report von
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
10.4K views16 Folien
Introductions To Malwares von
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
153 views40 Folien
Types of virus and saviour von
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
96 views21 Folien
Virus vs anti virus von
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
15.8K views38 Folien
Computer viruses von
Computer virusesComputer viruses
Computer virusesaagmansaini
2.6K views18 Folien
Viruses von
VirusesViruses
VirusesShahidaffridi
2.1K views22 Folien

Similar a Binisha.pptx(20)

computer virus Report von rawaabdullah
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah10.4K views
Introductions To Malwares von Cyber Vignan
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan153 views
Types of virus and saviour von Yastee Shah
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
Yastee Shah96 views
Virus vs anti virus von Xʎz ʞsɥ
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ15.8K views
Computer viruses von aagmansaini
Computer virusesComputer viruses
Computer viruses
aagmansaini2.6K views
Itc lec 15 Computer security risks von AnzaDar3
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar331 views
Introduction to Computer Virus von Imtiaz Ahmed
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed3.4K views
Computer virus (Microsoft Powerpoint) von ainizbahari97
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari9799.4K views
Computer virus von Goa App
Computer virusComputer virus
Computer virus
Goa App701 views
Computer Virus von izzul
Computer VirusComputer Virus
Computer Virus
izzul23.6K views
Computer Viruses- B S Kalyan Chakravarthy von Dipayan Sarkar
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan Chakravarthy
Dipayan Sarkar545 views

Último

The Dark Web : Hidden Services von
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
16 views24 Folien
Marketing and Community Building in Web3 von
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
15 views64 Folien
Affiliate Marketing von
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
18 views30 Folien
How to think like a threat actor for Kubernetes.pptx von
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
7 views33 Folien
hamro digital logics.pptx von
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
10 views36 Folien
ATPMOUSE_융합2조.pptx von
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptxkts120898
35 views70 Folien

Último(6)

The Dark Web : Hidden Services von Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh16 views
Marketing and Community Building in Web3 von Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast15 views
How to think like a threat actor for Kubernetes.pptx von LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze17 views
ATPMOUSE_융합2조.pptx von kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 views

Binisha.pptx

  • 1. Prepared By : Binisha Tamang Shree Rudrayanee Secondary School Lalitpur, Nepal
  • 2. A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.
  • 3.  Boot sector virus  File or Program virus  Macro virus  Multipartite virus  Stealth virus
  • 4.  Boot sector virus replace or implant themselves in the boot sector, the area of the hard drive (or any other disk) accessed when you first turn on your computer. This kind of virus can prevent you from being able to boot your hard disk. For example:  Danish Boot  Brain  Disk killer  Michelangelo
  • 5.  File viruses infect application programs. They may attach themselves to any executable file, usually .COM and .EXE files. An application program infector takes control after the initial use of the infected program For example:  Acid Rain  Alien.298  Crazy A
  • 6.  Macro viruses are written by using a simplified macro programming language. These viruses affect a Microsoft office document created using MS-Word, MSExcel, MSAccess, etc. The viruses can spread if the infected document is open in another computer. For example:  Melissa  Word Concept
  • 7.  Multipartite viruses can infect both application programs and the boot sector of a disk. They infect program files and when the infected program is executed; these viruses infect boot record. Next time, The virus from the boot record loads in the memory and then starts infecting other program files on the disk. For example:  Invader  File  Tequila
  • 8.  Stealth viruses actively hide themselves from antiviral software by either masking the size of the file that they hide in or temporarily removing itself from the infected file and placing a copy of itself in another location on the drive. For example:  Frodo  Joshi  Whale
  • 9.  Booting processing becomes slow  Size of files may be changed  Location of file may be changed  Computer gives unnecessary message and produces sounds
  • 10.  Internet  Email  Infected files  Infected removable storage devices  Pirated software
  • 11.  Programs take a longer time to load. Memory- resident operations take a lot of time to start.  A change occurs in dates and time of saved files.  Hard disk is suddenly accessed without a logical reason.  Viruses increases the use of disk space and growth in file size. They attach themselves to many files.  Unnecessary massages are display on the monitor.
  • 12.  Scan downloaded files of the internet before copying to your computer.  Use a good antivirus program to scan floppy disks before copying files. Recommended once are Total AV, Norton Antivirus and McAfee.  Do not install pirated software.  Scan your computer system and removable storage devices before use.