SlideShare uma empresa Scribd logo
1 de 22
By-
Anubhav Sinha
IX A
What’s Inside?
• What is a virus?
• More about virus
• Who wrote it and why?
• How do they spread?
• Kinds of virus……………….
• What is a worm?
• Difference between virus and worms
• 2014
What is a virus?
– An executable code
– That could make copies of itself or attach
itself to other executable codes
– Most of computer viruses have their
latency period.
– Attack programs or data on your hard
drive on a specific day when conditions
has been fulfilled.
More about Virus…..
• A virus is a small piece of software that piggybacks
on real programs.
• Computer viruses are called viruses because they
share some of the same traits of biological viruses.
Who write virus and why?
To prove their own theories.
– To see if they can do it.
– People who are political, religionary ardor.
– People usually publish their virus source
codes in BBSes or the Internet for users
who are interested in computer virus
programming.
– Most of them belong to specific
organizations
Difference between a worm and a virus
• Virus
– Usually small size programs ( 3-30k )
– Designed to evade detection
• Worm
– Sends itself to other systems
– Bigger in size than virus
– Not easy to write
From where does these virus spread?
• Medium
– Hard disk , Floppy disks , Tape
– Optical media
– Memory
• Internet
– E-mail attachments
– .exe .bat .vbs
• Research : One in every five hundred e-mail
messages contain a virus.
Kinds of virus
Memory Resident Virus
Hideout: This type of virus hides in the RAM
and stays there even after the malicious
code is executed
• Target: It can corrupt files and programs
that are opened, closed, copied, renamed,
etc.
• Examples: Randex, CMJ, Meve, and
MrKlunky
• Protection: Install an antivirus program.
Direct Action Viruses
Hideout: The viruses keep changing their
location into new files whenever the code
is executed, but are generally found in the
hard disk's root directory.
• Target: It can corrupt files.
• Examples: Vienna virus
• Protection: Install an antivirus scanner.
Overwrite Viruses
Hideout: The virus replaces the file content.
However, it does not change the file size.
• Examples: Way, Trj.Reboot, Trivial.88.D
• Protection: The only way to clean a file
infected by an overwrite virus is to delete
the file completely, thus losing the original
content.
Boot Sector Virus
• HIdeout: It hides in the memory until DOS
accesses the floppy disk, and whichever
boot data is accessed, the virus infects it.
• Examples: Polyboot.B, AntiEXE
• Protection: Ensure that floppy disks are
write-protected
Macro Virus
Hideout: These hide in documents that
are shared via e-mail or networks.
Examples: Relax, Melissa. A, Bablas,
O97M/Y2
Protection: Avoid opening e-mails from
unknown senders. Also, disabling macros
can help to protect your useful data.
Polymorphic Virus
Polymorphic viruses encrypt or encode
themselves in a different way (using
different algorithms and encryption keys)
every time they infect a system.
Examples: Elkern, Marburg, Satan Bug
and Tureen.
Protection: Install a high-end antivirus as
the normal ones are incapable of detecting
this type of virus.
FAT Virus
Hideout FAT virus attacks the FAT section and
may damage crucial information. It can be
especially dangerous as it prevents access to
certain sections of the disk where important files
are stored.
Examples: Link Virus
Protection: Before the virus attacks all the
files on the computer, locate all the files
that are actually needed on the hard drive,
and then delete the ones that are not
needed.
Multipartite Virus
Hideout: In the initial phase, these viruses
tend to hide in the memory as the resident
viruses do; then they infect the hard disk.
Examples: Invader, Flip and Tequila
Protection: You need to clean the boot
sector and also the disk to get rid of the
virus, and then reload all the data in it.
Trojans
• Trojans
In fact, it is a program which disguises
itself as a useful program or application.
▶ Beware of the fact that these viruses
copy files in your computer (when their
carrier program is executed) that can
damage your data, and even delete it.
2014's Worst Viruses
! Flame: It is said to be the first of its kind that uses
Bluetooth as the spread medium. It was first detected in a
Russian lab.
! Belgian Computer Crime Virus: This virus spread
globally and asked the users for some vital information
and a processing fee, claiming that it was for police records.
! Shamoon: This virus is dangerous as it creates files of
the data on your hard disk, and then this compiled data is
sent to the attacker.
Computer viruses - A daily harm
Computer viruses - A daily harm
Computer viruses - A daily harm

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Isas
IsasIsas
Isas
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
 
Types of computer viruses
Types of computer viruses Types of computer viruses
Types of computer viruses
 
Program security
Program securityProgram security
Program security
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Virus
VirusVirus
Virus
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
 
Viruses
VirusesViruses
Viruses
 
Viruspresentacion10
Viruspresentacion10Viruspresentacion10
Viruspresentacion10
 

Destaque (20)

Virus
VirusVirus
Virus
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
Virusppt
ViruspptVirusppt
Virusppt
 
Virus part1
Virus part1Virus part1
Virus part1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Semelhante a Computer viruses - A daily harm

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studydilsherece
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 

Semelhante a Computer viruses - A daily harm (20)

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
information about virus
information about virusinformation about virus
information about virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
anti_virus
anti_virusanti_virus
anti_virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 

Último

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Computer viruses - A daily harm

  • 2. What’s Inside? • What is a virus? • More about virus • Who wrote it and why? • How do they spread? • Kinds of virus………………. • What is a worm? • Difference between virus and worms • 2014
  • 3. What is a virus? – An executable code – That could make copies of itself or attach itself to other executable codes – Most of computer viruses have their latency period. – Attack programs or data on your hard drive on a specific day when conditions has been fulfilled.
  • 4. More about Virus….. • A virus is a small piece of software that piggybacks on real programs. • Computer viruses are called viruses because they share some of the same traits of biological viruses.
  • 5. Who write virus and why? To prove their own theories. – To see if they can do it. – People who are political, religionary ardor. – People usually publish their virus source codes in BBSes or the Internet for users who are interested in computer virus programming. – Most of them belong to specific organizations
  • 6. Difference between a worm and a virus • Virus – Usually small size programs ( 3-30k ) – Designed to evade detection • Worm – Sends itself to other systems – Bigger in size than virus – Not easy to write
  • 7. From where does these virus spread? • Medium – Hard disk , Floppy disks , Tape – Optical media – Memory • Internet – E-mail attachments – .exe .bat .vbs • Research : One in every five hundred e-mail messages contain a virus.
  • 9.
  • 10. Memory Resident Virus Hideout: This type of virus hides in the RAM and stays there even after the malicious code is executed • Target: It can corrupt files and programs that are opened, closed, copied, renamed, etc. • Examples: Randex, CMJ, Meve, and MrKlunky • Protection: Install an antivirus program.
  • 11. Direct Action Viruses Hideout: The viruses keep changing their location into new files whenever the code is executed, but are generally found in the hard disk's root directory. • Target: It can corrupt files. • Examples: Vienna virus • Protection: Install an antivirus scanner.
  • 12. Overwrite Viruses Hideout: The virus replaces the file content. However, it does not change the file size. • Examples: Way, Trj.Reboot, Trivial.88.D • Protection: The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.
  • 13. Boot Sector Virus • HIdeout: It hides in the memory until DOS accesses the floppy disk, and whichever boot data is accessed, the virus infects it. • Examples: Polyboot.B, AntiEXE • Protection: Ensure that floppy disks are write-protected
  • 14. Macro Virus Hideout: These hide in documents that are shared via e-mail or networks. Examples: Relax, Melissa. A, Bablas, O97M/Y2 Protection: Avoid opening e-mails from unknown senders. Also, disabling macros can help to protect your useful data.
  • 15. Polymorphic Virus Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. Examples: Elkern, Marburg, Satan Bug and Tureen. Protection: Install a high-end antivirus as the normal ones are incapable of detecting this type of virus.
  • 16. FAT Virus Hideout FAT virus attacks the FAT section and may damage crucial information. It can be especially dangerous as it prevents access to certain sections of the disk where important files are stored. Examples: Link Virus Protection: Before the virus attacks all the files on the computer, locate all the files that are actually needed on the hard drive, and then delete the ones that are not needed.
  • 17. Multipartite Virus Hideout: In the initial phase, these viruses tend to hide in the memory as the resident viruses do; then they infect the hard disk. Examples: Invader, Flip and Tequila Protection: You need to clean the boot sector and also the disk to get rid of the virus, and then reload all the data in it.
  • 18. Trojans • Trojans In fact, it is a program which disguises itself as a useful program or application. ▶ Beware of the fact that these viruses copy files in your computer (when their carrier program is executed) that can damage your data, and even delete it.
  • 19. 2014's Worst Viruses ! Flame: It is said to be the first of its kind that uses Bluetooth as the spread medium. It was first detected in a Russian lab. ! Belgian Computer Crime Virus: This virus spread globally and asked the users for some vital information and a processing fee, claiming that it was for police records. ! Shamoon: This virus is dangerous as it creates files of the data on your hard disk, and then this compiled data is sent to the attacker.