SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Presented by Maryam Zahid
Presented to Mam Maria Ramzan
And
Anti Viruses
 What is anti virus? & short history of it.
 How an antivirus work?
 Configuring antivirus software?
 Some of the symptoms of an infected
computer?
 Deleting Identified Virus files manually?
 Antivirus Effectiveness.
 Antivirus Damaged files.
 Online Antivirus scanning.
 some popular Antivirus.
What is Computer Virus..??
Computer viruses are small software programs that are
designed to spread from one computer to another and to
interfere with computer operation. It is a program or
piece of code that is loaded onto your computer without
your knowledge and runs against your wishes. A
computer virus might corrupt or delete data on your
computer, use your email program to spread itself to
other computers, or even erase everything on your hard
disk.
Viruses – Types and Examples
1. Boot viruses:
This virus infects the hard disks or floppy drives boot sector. This would
make the computer unable to boot. These viruses can, however, be
avoided by ensuring that the floppy disks and hard drive is well protected.
Never start the computer using an unknown disk drive or floppy disk.
Examples: the brain virus -it is the very first wild virus to be created.
2.Overwrite Viruses:
These types of viruses delete any information in a file they infect, leaving
them partially or completely useless once they are infected. Once in the
computer, they replace all the file content but the file size doesn’t change.
Unfortunately, you would only clean the infected file by deleting it
completely, therefore losing original content.
Examples: Trj. Reboot ,Way and Trivial.88.D
3 .Memory Resident Viruses:
They usually fix themselves inside the computer memory. They get
activated every time the OS runs and end up infecting other opened
files. Their effects include corrupting programs and files that are closed,
opened, renamed or copied. They hide in RAM.
Example: CMJ, Meve, Randex and Mrklunky
4 .Direct Action Viruses
These viruses mainly replicate or take action once they are executed.
When a certain condition is met, the viruses will act by infecting the files
in the directory or the folder specified in the AUTOEXEC.BAT. The
viruses are generally found in the hard disk’s root directory, but they
keep on changing location.
Example: Vienna virus
5 .Program Viruses:
These infect executable program files, such as those with extensions like
BIN, COM, EXE, OVL, DRV (driver) and .SYS (device driver). These
programs are loaded in memory during execution, taking the virus with
them. The virus becomes active in memory, making copies of itself
and infecting files on disk.
Examples: Sunday and Cascade
6. Macro Viruses
These viruses infect the files created using some applications or programs that
contain macros such as doc, pps, xls and mdb. They automatically infect the files
with macros and also templates and documents that are contained in the file. They
hide in documents shared through e-mail and networks.
Examples: Relax, bablas and 097M/Y2K
Virus Hoaxes
Trojan Horses
Worms
Spam
Adware
Spyware
Malware
How Do Computer Viruses Spread?
Computer viruses usually spread in one of three
ways:-
•From Removable media.
•From Downloads off the Internet.
•From e-mail attachments.
I. When a virus begins to spread, many program files can
become unstable and display warnings.
II. The operating system may not launch properly.
III. Critical files may get deleted automatically and the
computer may be running slower than usual.
Computer Virus Symptoms:-
Computer is infected with a virus, it may begin to show a
series of Computer Virus symptoms that indicate that a
virus is present.
Virus can damage your system:-
A computer virus can do a lot of damage to your system before
you even realize that it happened.
Computer Viruses: Quickly spreads from one computer to
another computer. It starts by attaching and loading itself onto
the computer without your knowledge.
A computer virus can be duplicated.
How to remove a computer virus?
Install and Update the antivirus software on the
computer. Then, perform a thorough scan of the
computer by using the antivirus software.
Install the latest updates from Microsoft Update
on the computer.
Download, install, and then run the Malicious
Software Removal Tool to remove existing viruses
on the computer.
How to protect your computer against viruses:-
On the computer, turn on the firewall.
Keep the computer operating system
up-to-date.
Use updated antivirus software on
the computer.
Conclusion..!!
TopicTopic
Antivirus Software is a computer program that identify and
remove computer viruses, and other malicious software
like Worms and Trojans from an infected computer. Not
only this, an antivirus software also protects the computer
from further virus attacks.
The first anti-virus software in 1987. Fix, a German
astrophysicist and amateur computer programmer
developed software to combat the first computer virus “in
the wild," which means that the virus had escaped the
confines of the lab or network .
An Antivirus works Using dictionary
Approach The antivirus software
examines each and every file in a
computer and examines its content
with the virus definitions stored in its
virus dictionary. A virus dictionary is
an inbuilt file belonging to an antivirus
software that contains code identified
as a virus by the antivirus authors.
Anti-virus applications maintain a database of
known viruses and compare scanned files that
match the characteristics of known viruses. If a
scanned files matches those characteristics of
known viruses. If a scanned file matches those
characteristics, it is quarantined (which means
moved to a new, presumably safe location on disk
and renamed, so you can find it should you ever
need it) so that it cannot affect other files on your
system.
1.AVG
AVG is one of the most popular antivirus programs that can be
obtained for free and is easy to download directly from the Internet. It
can also work with a number of different Windows systems. It has the
ability to hold virus files in quarantine so that they cannot do any harm
before they can be checked and deleted.
2.McAfee
McAfee Virus Scan has been the second most popular antivirus
programs on the market. It provides for spyware and virus protection
under one program, rather than separately as many other programs
do. It is necessary downloads when they are required.
3.Norton
There are a number of Norton antivirus programs available which are
all produced by Symantec. They have quickly proven themselves to be
a market leader when it comes to computer system security. Norton
Anti-Virus software programs that searches the computer and deletes
any viruses that it finds.
4.Kaspersky
Though Kaspersky is not the most popular of all the antivirus
protection programs. However, they still provide a very effective
product in the protection against viruses, spyware and Trojan horses.
.
5.AdAware
Ad Aware provides protection against a large number of cyber security
threats that arise from using the Internet. In addition to finding and
removing viruses and spyware that can detect key strokes and
passwords, it will protect against trojan horses.
Files which have been damaged by computer
viruses are normally damaged beyond
recovery. Anti-virus software removes the
virus code from the file during disinfection, but
this does not always restore the file to its
undamaged state. In such circumstances,
damaged files can only be restored from
existing backups; installed software that is
damaged requires re-installation.
Conclusion
For Joining

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 

Andere mochten auch

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemLee Ray
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Uses of computer in space
Uses of computer in spaceUses of computer in space
Uses of computer in spaceAbdul Hadi
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionNeel Pathak
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 

Andere mochten auch (14)

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Uses of computer in space
Uses of computer in spaceUses of computer in space
Uses of computer in space
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 

Ähnlich wie Computer virus and antivirus

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Information of Virus
Information of VirusInformation of Virus
Information of Virusjazz_306
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 

Ähnlich wie Computer virus and antivirus (20)

Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus
VirusVirus
Virus
 
Virus project
Virus projectVirus project
Virus project
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 

Kürzlich hochgeladen

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Kürzlich hochgeladen (20)

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

Computer virus and antivirus

  • 1. Presented by Maryam Zahid Presented to Mam Maria Ramzan
  • 3.  What is anti virus? & short history of it.  How an antivirus work?  Configuring antivirus software?  Some of the symptoms of an infected computer?  Deleting Identified Virus files manually?  Antivirus Effectiveness.  Antivirus Damaged files.  Online Antivirus scanning.  some popular Antivirus.
  • 4. What is Computer Virus..?? Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.
  • 5. Viruses – Types and Examples 1. Boot viruses: This virus infects the hard disks or floppy drives boot sector. This would make the computer unable to boot. These viruses can, however, be avoided by ensuring that the floppy disks and hard drive is well protected. Never start the computer using an unknown disk drive or floppy disk. Examples: the brain virus -it is the very first wild virus to be created. 2.Overwrite Viruses: These types of viruses delete any information in a file they infect, leaving them partially or completely useless once they are infected. Once in the computer, they replace all the file content but the file size doesn’t change. Unfortunately, you would only clean the infected file by deleting it completely, therefore losing original content. Examples: Trj. Reboot ,Way and Trivial.88.D
  • 6. 3 .Memory Resident Viruses: They usually fix themselves inside the computer memory. They get activated every time the OS runs and end up infecting other opened files. Their effects include corrupting programs and files that are closed, opened, renamed or copied. They hide in RAM. Example: CMJ, Meve, Randex and Mrklunky 4 .Direct Action Viruses These viruses mainly replicate or take action once they are executed. When a certain condition is met, the viruses will act by infecting the files in the directory or the folder specified in the AUTOEXEC.BAT. The viruses are generally found in the hard disk’s root directory, but they keep on changing location. Example: Vienna virus
  • 7. 5 .Program Viruses: These infect executable program files, such as those with extensions like BIN, COM, EXE, OVL, DRV (driver) and .SYS (device driver). These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk. Examples: Sunday and Cascade 6. Macro Viruses These viruses infect the files created using some applications or programs that contain macros such as doc, pps, xls and mdb. They automatically infect the files with macros and also templates and documents that are contained in the file. They hide in documents shared through e-mail and networks. Examples: Relax, bablas and 097M/Y2K
  • 9. How Do Computer Viruses Spread? Computer viruses usually spread in one of three ways:- •From Removable media. •From Downloads off the Internet. •From e-mail attachments.
  • 10. I. When a virus begins to spread, many program files can become unstable and display warnings. II. The operating system may not launch properly. III. Critical files may get deleted automatically and the computer may be running slower than usual. Computer Virus Symptoms:- Computer is infected with a virus, it may begin to show a series of Computer Virus symptoms that indicate that a virus is present.
  • 11. Virus can damage your system:- A computer virus can do a lot of damage to your system before you even realize that it happened. Computer Viruses: Quickly spreads from one computer to another computer. It starts by attaching and loading itself onto the computer without your knowledge. A computer virus can be duplicated.
  • 12. How to remove a computer virus? Install and Update the antivirus software on the computer. Then, perform a thorough scan of the computer by using the antivirus software. Install the latest updates from Microsoft Update on the computer. Download, install, and then run the Malicious Software Removal Tool to remove existing viruses on the computer.
  • 13. How to protect your computer against viruses:- On the computer, turn on the firewall. Keep the computer operating system up-to-date. Use updated antivirus software on the computer.
  • 16. Antivirus Software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks. The first anti-virus software in 1987. Fix, a German astrophysicist and amateur computer programmer developed software to combat the first computer virus “in the wild," which means that the virus had escaped the confines of the lab or network .
  • 17. An Antivirus works Using dictionary Approach The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary. A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.
  • 18. Anti-virus applications maintain a database of known viruses and compare scanned files that match the characteristics of known viruses. If a scanned files matches those characteristics of known viruses. If a scanned file matches those characteristics, it is quarantined (which means moved to a new, presumably safe location on disk and renamed, so you can find it should you ever need it) so that it cannot affect other files on your system.
  • 19. 1.AVG AVG is one of the most popular antivirus programs that can be obtained for free and is easy to download directly from the Internet. It can also work with a number of different Windows systems. It has the ability to hold virus files in quarantine so that they cannot do any harm before they can be checked and deleted. 2.McAfee McAfee Virus Scan has been the second most popular antivirus programs on the market. It provides for spyware and virus protection under one program, rather than separately as many other programs do. It is necessary downloads when they are required.
  • 20. 3.Norton There are a number of Norton antivirus programs available which are all produced by Symantec. They have quickly proven themselves to be a market leader when it comes to computer system security. Norton Anti-Virus software programs that searches the computer and deletes any viruses that it finds. 4.Kaspersky Though Kaspersky is not the most popular of all the antivirus protection programs. However, they still provide a very effective product in the protection against viruses, spyware and Trojan horses. .
  • 21. 5.AdAware Ad Aware provides protection against a large number of cyber security threats that arise from using the Internet. In addition to finding and removing viruses and spyware that can detect key strokes and passwords, it will protect against trojan horses.
  • 22.
  • 23. Files which have been damaged by computer viruses are normally damaged beyond recovery. Anti-virus software removes the virus code from the file during disinfection, but this does not always restore the file to its undamaged state. In such circumstances, damaged files can only be restored from existing backups; installed software that is damaged requires re-installation.