SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Presented by:
                                  Ajit Kumar Pradhan
                   090101ITR006
                7th Sem IT
After INTERNET has evolved it had given a
sophisticate increase on the general computer
user as well as the malicious code writer, who
has changed the backbone of internet
architecture for their futuristic use & produced
billions of malicious codes throughout the web.
For defending these many billions of advance
technological codes we use a outdated
technology called as Antivirus. Is it sufficient ?
Lets see……
   In 1969 the term ‘virus’ – Dr. David Gerrold.
   In 1971 ‘Creeper virus‘ detected by-ARPANET.
   In between 1974-79 some virus like Webbit
    ,Animal ,Shockwave rider.
   "Elk Cloner" first personal computer virus "in
    the wild“ in 1981.
   Claimed by John McAfee in 1983.
   Mr. Fred Cohen published 1st educational paper
    on viruses in 1984.
   The first documented signature based antivirus
    s/w produced by Bernd Fix in 1987.
   In late 1987 two released based on heuristic
    analysis Flushot Plus by Ross Greenberg and
    Anti4us by Erwin Lanting.
   In 1988 a mailing list named VIRUS-L formed for
    better research in field of viruses.
   From 1988 -2007 strategic development occurs.
   100-200 billions of viruses believed to exist
    “in the wild”.
   “Infinite amounts” in zoos.
   At least 300 new malicious programs (Worms,
    Trojans, Spyware, Hacker tools, Root-kits )
    released per day.
   2- 3 millions of undetectable programs exists
    from early 19th centuries.
   It is software used to prevent, detect and
    remove Malicious programs.
   Provides computer security implemented by
    software methodology.
   No common malware definition

   No common repository

   Out-of date signatures
 High rate of production of new advanced virus.
 Traditional techniques like digital signature
  analysis.
 Lake of up-to-date knowledge.
 Unexpected renewal costs for providing service.
 Rogue security applications
 Problems caused by false positives
 System and interoperability related issues.
 Damage happens to ordinary files.
   According to an FBI survey, major businesses lose $12
    million annually dealing with virus incidents.

   A recent Yankee Group report stated that 99% of
    companies had AV technology installed, yet 62% of
    companies suffered successful virus attacks.

   According to AusCERT, Australia’s Computer
    Emergency Response Team, the two most
    technological and deployed AV products fail to
    prevent 80% of new threats.
   Try to use a good up-to-date antivirus
    product.
   Learn about malicious virus infection
    procedure
   Up to date with virus definitions.
   Use your commonsense while using system
As we are entering to a new era of technology
where no Antivirus is appropriate for
protecting our confidentiality, because of the
featured brain of malicious code writers. For
protecting our privacy we have to up to date
our brain with the technology.
   http://theinventionofantivirussoftware.blogs
    pot.in/
   http://en.wikipedia.org/wiki/Antivirus_softwa
    re
   http://www.antivirussoftwaremax.com/the-
    history-of-antivirus-software/
Anti virus
Anti virus

Weitere ähnliche Inhalte

Was ist angesagt?

Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
Kim Aarenstrup
 
Sandbox Technology in AntiVirus
Sandbox Technology in AntiVirusSandbox Technology in AntiVirus
Sandbox Technology in AntiVirus
Ashish Gautam
 

Was ist angesagt? (20)

Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
 
ANTI - VIRUS
ANTI - VIRUSANTI - VIRUS
ANTI - VIRUS
 
Viruses
VirusesViruses
Viruses
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Presentation about security I.T.
Presentation about security I.T.Presentation about security I.T.
Presentation about security I.T.
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
Sandbox Technology in AntiVirus
Sandbox Technology in AntiVirusSandbox Technology in AntiVirus
Sandbox Technology in AntiVirus
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
 
Secure printing in an unsecure world
Secure printing in an unsecure worldSecure printing in an unsecure world
Secure printing in an unsecure world
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Zimperium Enterprise Mobile Threats
Zimperium Enterprise Mobile ThreatsZimperium Enterprise Mobile Threats
Zimperium Enterprise Mobile Threats
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
Your Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsYour Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your Endpoints
 

Andere mochten auch

Ge Careers How To Apply
Ge Careers   How To ApplyGe Careers   How To Apply
Ge Careers How To Apply
Bruno Pitzer
 
LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011
Bill Ritchie
 
Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!
JessRoos
 
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
State Enterprise Ukrecoresursy
 
Angina pektoris
Angina pektoris Angina pektoris
Angina pektoris
saffaatifah
 
Bò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớtBò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớt
Các Món Ăn Ngon
 

Andere mochten auch (20)

NV_path_rendering
NV_path_renderingNV_path_rendering
NV_path_rendering
 
Ge Careers How To Apply
Ge Careers   How To ApplyGe Careers   How To Apply
Ge Careers How To Apply
 
10 Things to Make API Users Like You
10 Things to Make API Users Like You10 Things to Make API Users Like You
10 Things to Make API Users Like You
 
LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011
 
Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!
 
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
 
Mike baker eclipse
Mike baker eclipseMike baker eclipse
Mike baker eclipse
 
为什么选择游易帮
为什么选择游易帮为什么选择游易帮
为什么选择游易帮
 
Благотворительный фонд "Красивые дети в красивом мире"
Благотворительный фонд "Красивые дети в красивом мире"Благотворительный фонд "Красивые дети в красивом мире"
Благотворительный фонд "Красивые дети в красивом мире"
 
NEDITER
NEDITERNEDITER
NEDITER
 
Thais 5 años
Thais 5 añosThais 5 años
Thais 5 años
 
Doc1
Doc1Doc1
Doc1
 
慶應義塾大学 教育学特殊 第12講(2016年67月13日)
慶應義塾大学 教育学特殊 第12講(2016年67月13日) 慶應義塾大学 教育学特殊 第12講(2016年67月13日)
慶應義塾大学 教育学特殊 第12講(2016年67月13日)
 
Nahdet El Mahrousa's Incubator Information session
Nahdet El Mahrousa's Incubator Information session Nahdet El Mahrousa's Incubator Information session
Nahdet El Mahrousa's Incubator Information session
 
Presentasi b.ing
Presentasi b.ingPresentasi b.ing
Presentasi b.ing
 
Angina pektoris
Angina pektoris Angina pektoris
Angina pektoris
 
Web de la genèse à demain mars 2016
Web de la genèse à demain mars 2016Web de la genèse à demain mars 2016
Web de la genèse à demain mars 2016
 
150527 教育学特殊 第6講
150527 教育学特殊 第6講150527 教育学特殊 第6講
150527 教育学特殊 第6講
 
151121_お台場海苔づくり説明会
151121_お台場海苔づくり説明会151121_お台場海苔づくり説明会
151121_お台場海苔づくり説明会
 
Bò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớtBò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớt
 

Ähnlich wie Anti virus

Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
UltraUploader
 
A history of computer viruses introduction
A history of computer viruses   introductionA history of computer viruses   introduction
A history of computer viruses introduction
UltraUploader
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
IJECEIAES
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
Research Publish Journals (Publisher)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
shopnil786
 

Ähnlich wie Anti virus (20)

Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
A history of computer viruses introduction
A history of computer viruses   introductionA history of computer viruses   introduction
A history of computer viruses introduction
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Automated Sample Processing
Automated Sample ProcessingAutomated Sample Processing
Automated Sample Processing
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
C3
C3C3
C3
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
Information security
Information securityInformation security
Information security
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Conficker
ConfickerConficker
Conficker
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Anti virus

  • 1. Presented by: Ajit Kumar Pradhan 090101ITR006 7th Sem IT
  • 2. After INTERNET has evolved it had given a sophisticate increase on the general computer user as well as the malicious code writer, who has changed the backbone of internet architecture for their futuristic use & produced billions of malicious codes throughout the web. For defending these many billions of advance technological codes we use a outdated technology called as Antivirus. Is it sufficient ? Lets see……
  • 3. In 1969 the term ‘virus’ – Dr. David Gerrold.  In 1971 ‘Creeper virus‘ detected by-ARPANET.  In between 1974-79 some virus like Webbit ,Animal ,Shockwave rider.  "Elk Cloner" first personal computer virus "in the wild“ in 1981.
  • 4. Claimed by John McAfee in 1983.  Mr. Fred Cohen published 1st educational paper on viruses in 1984.  The first documented signature based antivirus s/w produced by Bernd Fix in 1987.  In late 1987 two released based on heuristic analysis Flushot Plus by Ross Greenberg and Anti4us by Erwin Lanting.  In 1988 a mailing list named VIRUS-L formed for better research in field of viruses.  From 1988 -2007 strategic development occurs.
  • 5. 100-200 billions of viruses believed to exist “in the wild”.  “Infinite amounts” in zoos.  At least 300 new malicious programs (Worms, Trojans, Spyware, Hacker tools, Root-kits ) released per day.  2- 3 millions of undetectable programs exists from early 19th centuries.
  • 6. It is software used to prevent, detect and remove Malicious programs.  Provides computer security implemented by software methodology.
  • 7.
  • 8. No common malware definition  No common repository  Out-of date signatures
  • 9.  High rate of production of new advanced virus.  Traditional techniques like digital signature analysis.  Lake of up-to-date knowledge.  Unexpected renewal costs for providing service.  Rogue security applications  Problems caused by false positives  System and interoperability related issues.  Damage happens to ordinary files.
  • 10. According to an FBI survey, major businesses lose $12 million annually dealing with virus incidents.  A recent Yankee Group report stated that 99% of companies had AV technology installed, yet 62% of companies suffered successful virus attacks.  According to AusCERT, Australia’s Computer Emergency Response Team, the two most technological and deployed AV products fail to prevent 80% of new threats.
  • 11.
  • 12.
  • 13.
  • 14. Try to use a good up-to-date antivirus product.  Learn about malicious virus infection procedure  Up to date with virus definitions.  Use your commonsense while using system
  • 15. As we are entering to a new era of technology where no Antivirus is appropriate for protecting our confidentiality, because of the featured brain of malicious code writers. For protecting our privacy we have to up to date our brain with the technology.
  • 16. http://theinventionofantivirussoftware.blogs pot.in/  http://en.wikipedia.org/wiki/Antivirus_softwa re  http://www.antivirussoftwaremax.com/the- history-of-antivirus-software/