SlideShare ist ein Scribd-Unternehmen logo
1 von 5
A computer virus is a program or a set of programs
that disrupts the normal operation of a computer .
Virus infects or destroys data . It enters in the
computer without the permission or knowledge of
the user . stands for Vital Information
Resources Under Seize. The essential resources like
memory, processing speed, data & programs etc. cannot
have normal operations and can be harmed when virus is
spread. Viruses are self-replicating & are continuously
expanding their reach by infecting more computer files,
resulting in loss of speed & destruction of data. It enters
through an infected floppy or Internet / E-mail.
Virus remains undetected & quietly inactive & waits for a particular signal
or an event to trigger them. Some virus programs monitor the clock in the
host computer & trigger on a certain day, like Friday the 13th. A biological
virus causes physical harm to our body and attack certain cells, whereas
computer virus causes harm to the data and programs stored in computer
by over writing them with garbage or erasing them.
Trojan Horses, Worms & Spyware are some other terms which are
associated with virus programs but are actually different from virus
programs.
Trojan Horse : They are non replicating simple but destructive programs
which spreads from one system to another when it is copied.
Worm : Is a special virus that can replicate itself and use memory but cant
add itself to other programs.
Malware : Is a trouble causing program which interrupt the normal working
of a computer by stealing important information and damages it without the
knowledge of the user.
Spyware: It is a type of malware that is installed on computers and collects
information about users without their knowledge. They secretly monitor the
user’s computing and also collect various types of personal information about
internet surfing habits, visited web pages and transmits the same in the
background to someone else.
Types of viruses :
Viruses can be classified into two major categories.
1. Boot Viruses:
They infect the boot record or master boot records by replacing the same
which is responsible for loading the operating system in memory by copying it
elsewhere. Examples are – Disk killer, Stoned virus.
2. Program File Viruses:
They infect executable files, programs such as those with extension like .com,
.exe, .ovl, .drv, .sys etc. These programs get loaded during execution and
becomes active by replicating, also infecting files on the disk. Sunday, Cascade
etc. are the examples of Program file virus.
VIRUS SYMPTOMS:
The symptoms of virus infection in computer can be detected in many ways such as
Decreasing computer speed, causing strange movements or patterns on screen,
displaying unusual messages, frequent hanging of the system, Reformatting the hard
disk, deleting or damaging files etc.
PREVENTING A VIRUS INFECTION :
To prevent virus infection every pc should be equipped with some anti-virus
program, perform scan for virus infection before running or copying files from
external devices, not installing pirated software, perform periodical scanning hard
disk, using internet and e-mail attachments very carefully.
ANTIVIRUS SOFTWARE :
Antivirus software are computer programs which are designed to indentify, prevent
and remove viruses from our computer.
Antivirus programs scan the computer files to look for known viruses matching
definitions from virus dictionary and also identify suspicious behavior from any
computer program which indicates infection.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 

Andere mochten auch

Question7
Question7Question7
Question7Pranu-k
 
Ipw 2015 summary (for students)
Ipw 2015 summary (for students)Ipw 2015 summary (for students)
Ipw 2015 summary (for students)taufeeqaffandey
 
Забезпечуємо підтримку обдарованих учнів
Забезпечуємо підтримку обдарованих учнівЗабезпечуємо підтримку обдарованих учнів
Забезпечуємо підтримку обдарованих учнівblondik1289
 
Brynn Kardash Resume May 2016
Brynn Kardash Resume May 2016Brynn Kardash Resume May 2016
Brynn Kardash Resume May 2016Kardash Brynn
 
Evaluation questions 1
Evaluation questions 1Evaluation questions 1
Evaluation questions 1Camstewart17
 
Evaluation questions 1
Evaluation questions 1Evaluation questions 1
Evaluation questions 1Camstewart17
 
Pertumbuhan dan perkembangan tumbuhan
Pertumbuhan dan perkembangan tumbuhanPertumbuhan dan perkembangan tumbuhan
Pertumbuhan dan perkembangan tumbuhanKhalifati sifa
 
літературно мистецький лютий2016
літературно мистецький лютий2016літературно мистецький лютий2016
літературно мистецький лютий2016Юлия Тер-Давлатян
 
Joseph Fakhry Habib Yanny_Diploma
Joseph Fakhry Habib Yanny_DiplomaJoseph Fakhry Habib Yanny_Diploma
Joseph Fakhry Habib Yanny_DiplomaJoseph Yanny
 
літературно мистецький жовтень2015
літературно мистецький жовтень2015літературно мистецький жовтень2015
літературно мистецький жовтень2015Юлия Тер-Давлатян
 
How to conduct yourself at work
How to conduct yourself at workHow to conduct yourself at work
How to conduct yourself at workMargaret Lakra Deb
 
Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008Phương Nhung
 

Andere mochten auch (20)

Divinabopanna
DivinabopannaDivinabopanna
Divinabopanna
 
Dataaaaa
DataaaaaDataaaaa
Dataaaaa
 
Question7
Question7Question7
Question7
 
Ipw 2015 summary (for students)
Ipw 2015 summary (for students)Ipw 2015 summary (for students)
Ipw 2015 summary (for students)
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Забезпечуємо підтримку обдарованих учнів
Забезпечуємо підтримку обдарованих учнівЗабезпечуємо підтримку обдарованих учнів
Забезпечуємо підтримку обдарованих учнів
 
Brynn Kardash Resume May 2016
Brynn Kardash Resume May 2016Brynn Kardash Resume May 2016
Brynn Kardash Resume May 2016
 
Evaluation questions 1
Evaluation questions 1Evaluation questions 1
Evaluation questions 1
 
Direct Access Group Benefits
Direct Access Group BenefitsDirect Access Group Benefits
Direct Access Group Benefits
 
Evaluation questions 1
Evaluation questions 1Evaluation questions 1
Evaluation questions 1
 
Pertumbuhan dan perkembangan tumbuhan
Pertumbuhan dan perkembangan tumbuhanPertumbuhan dan perkembangan tumbuhan
Pertumbuhan dan perkembangan tumbuhan
 
літературно мистецький лютий2016
літературно мистецький лютий2016літературно мистецький лютий2016
літературно мистецький лютий2016
 
Joseph Fakhry Habib Yanny_Diploma
Joseph Fakhry Habib Yanny_DiplomaJoseph Fakhry Habib Yanny_Diploma
Joseph Fakhry Habib Yanny_Diploma
 
літературно мистецький жовтень2015
літературно мистецький жовтень2015літературно мистецький жовтень2015
літературно мистецький жовтень2015
 
E learning
E learningE learning
E learning
 
Actual faerie powerpoint
Actual faerie powerpointActual faerie powerpoint
Actual faerie powerpoint
 
тренінг
тренінгтренінг
тренінг
 
How to conduct yourself at work
How to conduct yourself at workHow to conduct yourself at work
How to conduct yourself at work
 
Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008
 
Adriana Pieterse (2)
Adriana Pieterse (2)Adriana Pieterse (2)
Adriana Pieterse (2)
 

Ähnlich wie Computer Virus

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
Harmful software
Harmful softwareHarmful software
Harmful softwareBijoKG2
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Computer virus
Computer virusComputer virus
Computer viruskiran_a_c
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 

Ähnlich wie Computer Virus (20)

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Viruses
VirusesViruses
Viruses
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Virus
VirusVirus
Virus
 

Kürzlich hochgeladen

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 

Kürzlich hochgeladen (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 

Computer Virus

  • 1.
  • 2. A computer virus is a program or a set of programs that disrupts the normal operation of a computer . Virus infects or destroys data . It enters in the computer without the permission or knowledge of the user . stands for Vital Information Resources Under Seize. The essential resources like memory, processing speed, data & programs etc. cannot have normal operations and can be harmed when virus is spread. Viruses are self-replicating & are continuously expanding their reach by infecting more computer files, resulting in loss of speed & destruction of data. It enters through an infected floppy or Internet / E-mail.
  • 3. Virus remains undetected & quietly inactive & waits for a particular signal or an event to trigger them. Some virus programs monitor the clock in the host computer & trigger on a certain day, like Friday the 13th. A biological virus causes physical harm to our body and attack certain cells, whereas computer virus causes harm to the data and programs stored in computer by over writing them with garbage or erasing them. Trojan Horses, Worms & Spyware are some other terms which are associated with virus programs but are actually different from virus programs. Trojan Horse : They are non replicating simple but destructive programs which spreads from one system to another when it is copied. Worm : Is a special virus that can replicate itself and use memory but cant add itself to other programs. Malware : Is a trouble causing program which interrupt the normal working of a computer by stealing important information and damages it without the knowledge of the user.
  • 4. Spyware: It is a type of malware that is installed on computers and collects information about users without their knowledge. They secretly monitor the user’s computing and also collect various types of personal information about internet surfing habits, visited web pages and transmits the same in the background to someone else. Types of viruses : Viruses can be classified into two major categories. 1. Boot Viruses: They infect the boot record or master boot records by replacing the same which is responsible for loading the operating system in memory by copying it elsewhere. Examples are – Disk killer, Stoned virus. 2. Program File Viruses: They infect executable files, programs such as those with extension like .com, .exe, .ovl, .drv, .sys etc. These programs get loaded during execution and becomes active by replicating, also infecting files on the disk. Sunday, Cascade etc. are the examples of Program file virus.
  • 5. VIRUS SYMPTOMS: The symptoms of virus infection in computer can be detected in many ways such as Decreasing computer speed, causing strange movements or patterns on screen, displaying unusual messages, frequent hanging of the system, Reformatting the hard disk, deleting or damaging files etc. PREVENTING A VIRUS INFECTION : To prevent virus infection every pc should be equipped with some anti-virus program, perform scan for virus infection before running or copying files from external devices, not installing pirated software, perform periodical scanning hard disk, using internet and e-mail attachments very carefully. ANTIVIRUS SOFTWARE : Antivirus software are computer programs which are designed to indentify, prevent and remove viruses from our computer. Antivirus programs scan the computer files to look for known viruses matching definitions from virus dictionary and also identify suspicious behavior from any computer program which indicates infection.