SlideShare ist ein Scribd-Unternehmen logo
1 von 16
~Computer Virus~

The things you MUST know


                    Brought to You By
                    Sumanta Majumdar
                  Dept. Of Electrical Engg.
                        2010,GNIT




   http://powerpointpresentationon.blogspot.com/
Introduction
         • About Virus
• Computer virus have become
  today’s headline news.

 • With the increasing use of the
internet, it has become easier for
virus to spread.

• Virus show us loopholes in
  software.

• Most virus are targeted at the MS
  Windows OS
~ Classifying
                            Computer Virus ~
•   A program designed to attach       •   File Virus: A computer virus that
    itself to a file, reproduce, and       infects executable files, that is
                                           programs with exe filename
    spread from one file to                extensions
    another, destroying data,          •   Payload: The disruptive
    displaying an irritating               instructions or message delivered
    message, or otherwise                  by a computer virus. Payloads can
    disrupting computer                    range from just being annoying to
    operations.                            destroying data and files on a
                                           computer system.
                                       •   Boot Sector Virus: A computer
                                           virus that infects the sectors on a
                                           disk that contain the data a
                                           computer uses during the boot
                                           process. The virus spreads every
                                           time the infected disk is in the
                                           computer when it boots.
                                       •   Macro Virus: A computer virus
                                           that infects the macros that are
                                           attached to documents and
                                           spreadsheets.
                                       •   Trojan Horse: A computer
                                           program that appears to perform
                                           one function while actually doing
                                           something else, such as inserting a
* Virus through the
        Internet *

Today almost 87% of all viruses
are spread through the internet.
Transmission time to a new host
  is relatively low, on the order
          of hours to days
           “Latent virus”
Symptoms of Virus Attack
•   Computer no longer boots up.
•   Screen sometimes flicker.
•   Computer runs slower then usual.
•   PC speaker beeps periodically.
•   System crashes for no reason.
•   Files/directories sometimes disappear.
•   Denial of service (dos)….. & Many More.
~Computer Virus~
                        How They Spread
•   A virus runs first when a legitimate        •   Unfortunately, the virus has now
    program is executed.                            reproduced itself, so two programs
•   The virus loads itself into memory              are infected.
    and looks to see if it can find any         •   The next time either of those
    other programs on the disk.                     programs gets executed, they infect
•   If it can find one, it modifies it to add       other programs, and the cycle
    the virus's code to the new program.            continues.
•   Then the virus launches the "real           •   When the infected program
    program“.                                        o is distributed by
•   The user has no way to know that                       floppy disk
    the virus ever ran.                                    uploaded to a bulletin board
                                                           zipped and delivered as an
                                                            executable.

                                                •   then other programs get infected.
~Computer Virus~
How To Prevent Them
• Security features keep viruses away.
• Buy virus protection software.
• Avoid programs from unknown sources (like
  the Internet).
• Stick with commercial software purchased on
  CDs.
~Computer Virus~
         How To Prevent Them
• With E-mail viruses
  o   defense is personal discipline
        Never double-click on an attachment that contains
         an executable program
        Attachments that come in as
          Word files (.DOC), spreadsheets (.XLS), images (.GIF
           and .JPG), etc., are data files
          and they can do no damage
~Computer Virus~
            How To Prevent Them
• Don’t victimize yourself
  o   learn where to find legitimate information on
      hoaxes, myths etc.
        do not forward warnings if you haven’t personally
         checked them out!
~Computer Virus~
   How To Prevent Them
Don’t fall for the
• "False Authority Syndrome”
   o   Most people who claim to speak with authority
       about computer viruses have little or no genuine
       expertise.
         The person feels competent to discuss viruses because of
            his job title,
            because of expertise in another computer field,
            simply because he knows how to use a computer.
~Computer Virus~
How To Prevent Them
• E-mail is clearly the predominant vulnerability
  point for viruses
  o   Current viruses are spread via security holes in
      Microsoft Outlook and Outlook Express
        Free patches are available from Microsoft to address these
         problems
           many people are reluctant to apply them.
• First, update your system with Windows Update
  and Office Update
  o   or, buy a Mac
• Buy virus protection software
~Computer Virus~
 How To Scan?
~Computer Virus~
Anti-Virus Is Scanning
~Computer Virus~
Finding Out A Virus
Computer Virus
            • Acknowledgement
• My special thanks goes to Sri Supriyo Ghosh
  (Dept. of BCA,Techno India, Sec. V) for
  helping & suggesting me about different kind
  of computer viruses & their characteristics.
Computer Virus
• Be Original Kill Piracy.

Weitere ähnliche Inhalte

Was ist angesagt?

How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 

Was ist angesagt? (20)

Virus project
Virus projectVirus project
Virus project
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Virusppt
ViruspptVirusppt
Virusppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus
VirusVirus
Virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
viruses
virusesviruses
viruses
 

Ähnlich wie Computer virus_the_things_u_must_know_

computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 
Computer virus
Computer virusComputer virus
Computer virus
rana_babar
 
Computer virus
Computer virusComputer virus
Computer virus
rana_babar
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 

Ähnlich wie Computer virus_the_things_u_must_know_ (20)

Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Proyecto7
Proyecto7Proyecto7
Proyecto7
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Malicious
MaliciousMalicious
Malicious
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Kürzlich hochgeladen (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Computer virus_the_things_u_must_know_

  • 1. ~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT http://powerpointpresentationon.blogspot.com/
  • 2. Introduction • About Virus • Computer virus have become today’s headline news. • With the increasing use of the internet, it has become easier for virus to spread. • Virus show us loopholes in software. • Most virus are targeted at the MS Windows OS
  • 3. ~ Classifying Computer Virus ~ • A program designed to attach • File Virus: A computer virus that itself to a file, reproduce, and infects executable files, that is programs with exe filename spread from one file to extensions another, destroying data, • Payload: The disruptive displaying an irritating instructions or message delivered message, or otherwise by a computer virus. Payloads can disrupting computer range from just being annoying to operations. destroying data and files on a computer system. • Boot Sector Virus: A computer virus that infects the sectors on a disk that contain the data a computer uses during the boot process. The virus spreads every time the infected disk is in the computer when it boots. • Macro Virus: A computer virus that infects the macros that are attached to documents and spreadsheets. • Trojan Horse: A computer program that appears to perform one function while actually doing something else, such as inserting a
  • 4. * Virus through the Internet * Today almost 87% of all viruses are spread through the internet. Transmission time to a new host is relatively low, on the order of hours to days “Latent virus”
  • 5. Symptoms of Virus Attack • Computer no longer boots up. • Screen sometimes flicker. • Computer runs slower then usual. • PC speaker beeps periodically. • System crashes for no reason. • Files/directories sometimes disappear. • Denial of service (dos)….. & Many More.
  • 6. ~Computer Virus~ How They Spread • A virus runs first when a legitimate • Unfortunately, the virus has now program is executed. reproduced itself, so two programs • The virus loads itself into memory are infected. and looks to see if it can find any • The next time either of those other programs on the disk. programs gets executed, they infect • If it can find one, it modifies it to add other programs, and the cycle the virus's code to the new program. continues. • Then the virus launches the "real • When the infected program program“. o is distributed by • The user has no way to know that  floppy disk the virus ever ran.  uploaded to a bulletin board  zipped and delivered as an executable. • then other programs get infected.
  • 7. ~Computer Virus~ How To Prevent Them • Security features keep viruses away. • Buy virus protection software. • Avoid programs from unknown sources (like the Internet). • Stick with commercial software purchased on CDs.
  • 8. ~Computer Virus~ How To Prevent Them • With E-mail viruses o defense is personal discipline  Never double-click on an attachment that contains an executable program  Attachments that come in as  Word files (.DOC), spreadsheets (.XLS), images (.GIF and .JPG), etc., are data files  and they can do no damage
  • 9. ~Computer Virus~ How To Prevent Them • Don’t victimize yourself o learn where to find legitimate information on hoaxes, myths etc.  do not forward warnings if you haven’t personally checked them out!
  • 10. ~Computer Virus~ How To Prevent Them Don’t fall for the • "False Authority Syndrome” o Most people who claim to speak with authority about computer viruses have little or no genuine expertise.  The person feels competent to discuss viruses because of  his job title,  because of expertise in another computer field,  simply because he knows how to use a computer.
  • 11. ~Computer Virus~ How To Prevent Them • E-mail is clearly the predominant vulnerability point for viruses o Current viruses are spread via security holes in Microsoft Outlook and Outlook Express  Free patches are available from Microsoft to address these problems  many people are reluctant to apply them. • First, update your system with Windows Update and Office Update o or, buy a Mac • Buy virus protection software
  • 15. Computer Virus • Acknowledgement • My special thanks goes to Sri Supriyo Ghosh (Dept. of BCA,Techno India, Sec. V) for helping & suggesting me about different kind of computer viruses & their characteristics.
  • 16. Computer Virus • Be Original Kill Piracy.