SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Abdullah shahzad
Computer virus:
 Computer virus:
 A computer virus is a program that may disturbed the
normal working of that may computer system without
the knowledge or permission of a user. Virus attaches
itself to a file in a flash drive hardware and email
attachment
Type of virus
 Worm:
 A worm is a harmful program that resides in the active
memory of the computer and duplicates itself. It can
propagate without human intervention, sending
copies of themselves to other computers by e-mail or
Internet Relay Chat
Trojan Horses:
A Trojan horse is a program in which malicious code is
hidden inside a seemingly harmless program. The
program’s harmful payload can enable the hacker to
destroy hard drives, corrupt files, control the computer
remotely, launch attacks against other computers, steal
passwords or Social Security numbers, and spy on
users by recording keystrokes and transmitting them
to a server operated by a third party. It can be delivered
as an e-mail attachment, downloaded from a Web site,
or contracted via a removable media device such as a
CD/DVD or USB memory stick.
Bot nets:
 Bot nets:
 A botnets is a large group of computer controlled from
one or more remote locations by hackers, without the
knowledge or consent of their owners.
 - Are frequently used to distribute spam and malicious
code.
 Cutwail, a large botnet, controlled approximately one
million active bots at a time.
Root kits:
 A root kits is a set of programs that enables its user to
gain administrator level access to a computer without
the end user’s consent or knowledge.
 Attackers can use the root kits to execute files, access
logs, monitor users activity, and change the computer’s
configuration. Root kits are one part of a blended
threat, consisting of the dropper, loader and root kit.
Spam:
 E-mail spam is the abuse of e-mail systems to send
unsolicited e-mail to large numbers of people.
 Most are in a form of low-cost commercial advertising
 It is also an extremely inexpensive method of
marketing used by many legitimate organizations.
 It may also be used to deliver harmful worms or other
malware.
Logic bomb:
 Logic bomb is also called a logic bomb. Its differ from
other viures.it is activated at a certain date and time
.its destroy data on the hard disk march 6.

Weitere ähnliche Inhalte

Was ist angesagt?

Computer viruses
Computer virusesComputer viruses
Computer virusesBilliyan
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Computer Virus
Computer VirusComputer Virus
Computer VirusAritra Das
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer VirusYo Maruf
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protectionscasyrichard
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 

Was ist angesagt? (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 

Andere mochten auch

Ud06 e03 copiado de s.o
Ud06 e03 copiado de s.oUd06 e03 copiado de s.o
Ud06 e03 copiado de s.oÁngela B
 
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HRDaniel Donatelli
 
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...블랙 핑크
 

Andere mochten auch (8)

Pareceimposibleperosucedio!
Pareceimposibleperosucedio!Pareceimposibleperosucedio!
Pareceimposibleperosucedio!
 
Reunion de noviembre
Reunion de noviembreReunion de noviembre
Reunion de noviembre
 
Ud06 e03 copiado de s.o
Ud06 e03 copiado de s.oUd06 e03 copiado de s.o
Ud06 e03 copiado de s.o
 
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR
20170109-HYDROGEN-COUNCIL-Vision-document-FINAL-HR
 
Ii+jornadas
Ii+jornadasIi+jornadas
Ii+jornadas
 
Mapa conceptual
Mapa conceptualMapa conceptual
Mapa conceptual
 
Article VI: Legislative Department
Article VI: Legislative DepartmentArticle VI: Legislative Department
Article VI: Legislative Department
 
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...
정품발기부전치료제 『 W6.ow.to 』 톡 w2015 ♡ 발기부전치료제판매, 발기부전치료제 효과,발기부전치료제 정품구입,발기부전치료제부작...
 

Ähnlich wie Computer Virus 2017

RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity AttacksZyrellLalaguna
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identificationsandeep shergill
 
Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threatsEC-Council
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 

Ähnlich wie Computer Virus 2017 (20)

RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
TIC
TICTIC
TIC
 
Mitppt
MitpptMitppt
Mitppt
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Information security
Information securityInformation security
Information security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
It ppt new
It ppt newIt ppt new
It ppt new
 
MALWARE
MALWAREMALWARE
MALWARE
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity Attacks
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threats
 
Computer virus
Computer virusComputer virus
Computer virus
 

Kürzlich hochgeladen

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 

Kürzlich hochgeladen (20)

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 

Computer Virus 2017

  • 2. Computer virus:  Computer virus:  A computer virus is a program that may disturbed the normal working of that may computer system without the knowledge or permission of a user. Virus attaches itself to a file in a flash drive hardware and email attachment
  • 3. Type of virus  Worm:  A worm is a harmful program that resides in the active memory of the computer and duplicates itself. It can propagate without human intervention, sending copies of themselves to other computers by e-mail or Internet Relay Chat
  • 4. Trojan Horses: A Trojan horse is a program in which malicious code is hidden inside a seemingly harmless program. The program’s harmful payload can enable the hacker to destroy hard drives, corrupt files, control the computer remotely, launch attacks against other computers, steal passwords or Social Security numbers, and spy on users by recording keystrokes and transmitting them to a server operated by a third party. It can be delivered as an e-mail attachment, downloaded from a Web site, or contracted via a removable media device such as a CD/DVD or USB memory stick.
  • 5. Bot nets:  Bot nets:  A botnets is a large group of computer controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.  - Are frequently used to distribute spam and malicious code.  Cutwail, a large botnet, controlled approximately one million active bots at a time.
  • 6. Root kits:  A root kits is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge.  Attackers can use the root kits to execute files, access logs, monitor users activity, and change the computer’s configuration. Root kits are one part of a blended threat, consisting of the dropper, loader and root kit.
  • 7. Spam:  E-mail spam is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.  Most are in a form of low-cost commercial advertising  It is also an extremely inexpensive method of marketing used by many legitimate organizations.  It may also be used to deliver harmful worms or other malware.
  • 8. Logic bomb:  Logic bomb is also called a logic bomb. Its differ from other viures.it is activated at a certain date and time .its destroy data on the hard disk march 6.