SlideShare uma empresa Scribd logo
1 de 35
Baixar para ler offline
Computer Viruses
COMPUTER VIRUS








A computer virus is a computer program that can
reproduce itself and spread from one computer to
another. and leaving infections as it travels, Like a
human virus.
Some virus may cause only testing effects while others
can damage your hardware, software or files. Almost
all viruses are attached to an executable file.
It is important to note that a virus cannot be spread
without a human action.
Because a virus is spread by human action people will
unknowingly continue the spread of a computer virus
by sharing infecting files or sending emails with
viruses as attachments in the email.
EFFECT OF COMPUTER VIRUS











It can slow down your computer.
It might corrupt your system files.
It might make some programs faulty or
corrupt.
It might damage your boot sector creating
problems when you boot into the windows.
it might steal important information from
your computer and send to some other
person.
It might change the power ratings of your
computer and could blast the system.
VIRUS IMPACT ON SYSTEM ACCESSORIES








Programs. Some viruses may impair your certain computer
programs and applications. As a result, you may not be able to
access the software or operate it smoothly.
Files. There are viruses that may modify, corrupt or delete files in
your machine owing to which you may not be able to access them.
Hard disk. Some viruses may attack the data present on your
computer’s hard disk, resulting in its crash. You may need to
reformat the disk in such cases.
Operational impact. Some viruses may not apparently harm your
system’s integrity and may limit themselves to displaying text
messages, images, audio and Video.
WHY DO PEOPLE CREATE COMPUTER VIRUS








To take control of a computer and use it for
specific tasks
To generate money
To steal sensitive information (credit card numbers,
passwords, personal details, data etc.)
To prove a point, to prove it can be done, to prove
ones skill or for revenge purposes
VIRUS IMPACT ON SYSTEM ACCESSORIES








Hardware. No computer viruses are capable of damaging your

hardware yet. They just work on all the files and data of your system,
make them useless and disable them.
Speed. Your system may slow down under the influence of viruses as
they consume your system’s memory for their execution.
Booting. Your system may suddenly restart and at times may not load
properly. In few cases, you may not be able to access your disk drives.
Applications. Viruses may modify, damage or delete your program files
and system files because of which applications on your system may not
be able to work appropriately.
VIRUS IMPACT ON SYSTEM ACCESSORIES




Reinstall. Some computer viruses are designed in the gravest
way possible. They cannot be uninstalled easily from your
system and some reinstall themselves even after they have
been removed.
Peripherals. Some viruses may impact device driver software
in your computer resulting in the relevant operational
issues. For example, disturbed software setting for printer
may impair its function.
COMPUTER VIRUS HISTORY












Elk Cloner has the distinction of being the
first wild virus for a home computer.

Coded by then-high-school student, Richard
Skrenta, around 1982.
who created the search engine blekko.

Happy
Birthday
Joshi',
the virus was first discovered in India in
June 1990
The first known virus was created in 1971
by Cambridge and was called the Creeper
Virus.
Creeper was an experimental selfreplicating program written by Bob Thomas
at BBN in 1971.
COMPUTER VIRUS HISTORY








This virus was spread using the Advanced Research Projects
Agency Network (ARPANET).
It was designed not to damage but to demonstrate a mobile
application. It is generally accepted to be the first computer
worm, although the Concept of a "computer virus" did not
exist in the 1970s
When the computers were infected, the message "I'm the
creeper, catch me if you can!"
This year marks the 40th anniversary of Creeper.
FIRST VIRUS FROM PAKISTAN




World's first computer virus was created to infect IBM PCs by
two Pakistani brothers, Amjad and Basit Farooq in 1986.

While they were trying to explore their expertise and potential
of MS DOS operating system, Virus travelled beyond their
imagination through Asia, Europe and was picked up in USA.

Amjad and Basit Farooq Alvi
FIRST VIRUS FROM PAKISTAN


The first computer virus named “Brain” was
designed by Amjad Farooq Alvi and Basit
Farooq Alvi.

 "Beware

of this VIRUS...Contact us for
vaccination,". This message was put on the
screen.
 The interesting fact remains that the location
of the “Brain Pvt Limited” is exactly the same
where the virus was first developed.
10 LATEST COMPUTER VIRUS
Virus name

Spreading

Damage

Discovered

Backdoor.IRCBot.Dorkbot.A

MEDIUM

MEDIUM

2011 May 15

Backdoor.Lavandos.A

MEDIUM

HIGH

2011 Jan 06

VERY LOW

HIGH

2011 Jan 03

Java.Trojan.Downloader.OpenConn
ection.AI

HIGH

MEDIUM

2010 Nov 12

Java.Backdoor.ReverseBackdoor.A

LOW

MEDIUM

2010 Nov 12

VERY LOW

VERY LOW

2010 Oct 28

MEDIUM

HIGH

2010 Oct 20

Win32.Worm.Stuxnet.A

HIGH

MEDIUM

2010 Oct 07

Win32.Worm.Prolaco.S

MEDIUM

MEDIUM

2010 Oct 06

Exploit.CplLnk.Gen

MEDIUM

LOW

2010 Jul 19

Trojan.Android.Geinimi.A

Win32.Ramnit.G

Trojan.Spy.Ursnif.F
WORLD’S WORST COMPUTER VIRUS
Surreptitious Sircam

Sircam appeared in July 2001 on PCs running Windows 95, 98, and
Me.

The worm appeared in e-mail in-boxes with an attachment

the body of the message was in Spanish or English.

Typical greetings included "Hi! How are you?" and "Hola como
estas?”
Raid raider
 Code Red burned brightly in the summer of 2001,
 Infecting hundreds of thousands of computers--mainly on corporate
networks.
WORLD’S WORST COMPUTER VIRUS
Maniacal Magistr

Magistr is one of the most complex viruses to hit the Internet.

Its victims, users of Outlook Express, were hooked by an infected email attachment.

The virus, discovered in mid-March 2001,

Sent garbled messages to everyone in the infected user's e-mail
address book

Melissa

Melissa propagated via infected Microsoft Word documents and
mailed itself to Outlook contacts of the contaminated user.
WORLD’S WORST COMPUTER VIRUS
Expletive Deleted) Explorer

The Explorer.zip worm appeared in the summer of 1999.

The worm deleted Word, Excel, and PowerPoint files and
types of files.

Explorer traveled via e-mails that appeared to be from
someone the recipient knew.
Numbing Nimda

Nimda (also known as the Concept Virus) appeared in
September 2001,

Attacking tens of thousands of servers and hundreds of
thousands of PCs.

The worm modified Web documents and executable files

The worm spread as an embedded attachment in an HTML
e-mail message that would execute as soon as the
recipient opened the message
SOME COMPUTER SECURITY THREATS
ADWARE
Adware is software that displays advertisements on your computer.

BACKDOOR TROJAN
A backdoor Trojan allows someone to take control of another user’s
computer via the internet without their permission.
BLUE JACKING
Bluejacking is sending anonymous, unwanted messages to other users
with Bluetooth-enabled mobile phones or laptops.

BLUE SNARFING
Bluesnarfing is the theft of data from a Bluetooth phone.
Like Bluejacking, Bluesnarfing depends on the ability of Bluetoothenabled devices todetect and contact others nearby.
SOME COMPUTER SECURITY THREATS
BOOT SECTOR VIRUS

Boot sector viruses spread by modifying the program that enables
your computer to start up
BROWSER HIJACKERS

Browser hijackers change the default home and search pages in your
internet browser
CHAIN LETTER

In electronic chain letter is an email that urges you to forward copies
to other people.
COOKIES

Cookies are files on your computer that enable websites to remember
your details.
DENIAL OF SERVICE

A denial-of-service (DoS) attack prevents users from accessing a
computer or website.
SOME COMPUTER SECURITY THREATS






Worms
Worms are programs that replicate and spread, often opening a back door to allow
hackers to gain access to the computers that they infect.
Worms can spread over the Internet by exploiting security flaws in the software of
computers that are connected to the Internet. Worms can also spread by copying
themselves from disk to disk or by email.
Zombies
A Zombie is a hidden program that lies inactive on a computer.
Zombies don’t normally damage the computer on which they reside but can
damage other computers.
Zombies often arrive as email attachments and when the attachment is opened
they install themselves secretly and then wait to be activated.
Phishing
A Phishing attack is when you are are sent an email that asks you to click on a link
and re-enter your bank or credit card details. These emails can pretend to be from
banks, Internet service providers, on-line stores and so on, and both the email and
the web site it links to appear genuine. When you enter your bank or credit card
details they are then used fraudulently.
TYPE OF COMPUTER WORMS
ADWARE
MALWARE
SPYWARE
ADWARE


Adware, or advertising-supported software, is
any software package which automatically plays, displays, or
downloads advertisements to a computer.



These advertisements can be in the form of a pop-up.



They may also be in the user interface of the software or on a
screen presented to the user during the installation process.



The object of the Adware is to generate revenue for its author



Advertising functions are integrated into or bundled with the
software, which is often designed to note what Internet sites the
user visits
MALWARE


Malware, short for malicious software, Malware is a very general word for
software that deliberately harms, restricts, alters, or stops your computer from
working properly where the true purpose of the download or installation is
hidden or difficult to find and not clearly explained to the user .



Malware includes computer viruses, worms, trojan horses, spyware, dishonest
adware, scareware, crimeware, most rootkits, and other malicious and
unwanted software or program.



Malware can arrive through an internet download, as an email link or

attachment


as a file sent between users of instant messaging, social networking
communities, peer-to-peer file sharing programs, online games, online video
games or chatrooms or a link to a malicious webpage.
MALWARE


The best-known types of malware, viruses and worms, are
known for the manner in which they spread, rather than any
other particular behavior.



The term computer virus is used for a program that has
infected some executable software and, when run, causes the
virus to spread to other executables .



On

the

other

hand,

a

worm

is

a

program

that actively transmits itself over a network to infect other

computers
INDICATION OF MALWARE


the browser’s home page keeps changing



Pop-up advertisements appear when your browser is closed,.



Strange icons appear on your desktop without your prompting or
knowledge of the program



The computer light is blinking (meaning that your computer is
processing information) at unusual or unexpected times.



Your browser settings keep changing, including the webpage you
designate as your internet start-up page



Files are uploaded or downloaded without your prompting or
permission.
SPYWARE


Spyware

is

Internet

language

for

Advertising

Supported

software (Adware).


Spyware is

tracking software that hides itself (runs in

the

background) and gathers information without the computer owner's
or user's knowledge or permission for the benefit of someone else


The first recorded use of the term spyware occurred on 16 October
1995.



showing them pop-up ads, or altering web-browser behavior for the
financial benefit of the spyware creator.



For instance, some spyware programs redirect search engine results
to paid advertisements.
SPYWARE







Others,
often
called
"stealware"
by
the
media,
overwrite affiliate marketing codes so that revenue is
redirected to the spyware creator rather than the intended
recipient.
The presence of spyware is typically hidden from the user,
and can be difficult to detect
Spyware programs can collect various types of personal
information, such as Internet surfing habits and sites that
have been visited,
As of 2006, spyware has become one of the preeminent
security threats to computer systems running Microsoft
Windows operating systems.
GUIDELINE TO AVOID SPYWARE











Not opening emails or email attachments from
unknown senders
Block or don’t click on suspicious pop-up windows
Don’t open files that are more prone to be associated
with malware such as .bat, .pif, .txt .vbs, .htm .exe or
.vbs
Don’t download or execute applications from
untrusted sources.
Avoid phishing scams.
Use updated anti-virus and anti-spyware software
regularly.
COMPUTER ANTIVIRUS


A utility that searches a hard disk for viruses and removes any that are
found.



Antivirus software is a computer program you install on your machine that

scans files for malicious (dangerous) programs and either deletes them or
"heals" them therefore eliminating the threat of damage to your computer.


Most antivirus programs include an auto-update feature that enables
the program to download profiles of new viruses so that it can check

for the new viruses as soon as they are discovered.


Antivirus software is a computer program that detects, prevents, and
takes action to disarm or remove malicious software programs, such
as viruses and worms.
COMPUTER ANTIVIRUS HISTORY
The very first anti-virus software wasn't really an anti-virus
software.
It was a removal tool to remove a Polish virus named MKS vir.
That removal tool was released in 1987, and the person who
first had the idea of such removal tool was Bernt Fix.
BENEFITS FROM ANTIVIRUS
Stop Virus-Related Damage
Maintain the PC's Security
Protect Against Email Threats/Spam
Financial Savings
Protect Data and Files
TOP 10 ANTIVIRUS













Norton Antivirus
Kaspersky Antivirus
McAfee Antivirus Plus
Avira Antivir Premium
AVG Antivirus
ESET NOD32 Antivirus
ZoneAlarm Antvirus
Panda Antivirus
BitDefender Antivirus
F-Secure Antivirus
FIREWALL


A personal firewall is an application which controls network traffic to
and from a computer, permitting or denying communications based
on a security policy.



A personal firewall will usually protect only the computer on which it
is installed.



Personal firewalls may also provide some level of trouble detection,
allowing the software to terminate or block connectivity.



Allows the user to control which programs can and cannot access
the local network and/or Internet.



Provide information about the destination server with which an
application is attempting to communicate.
FIREWALL




They block other packets (usually dropping them
without acknowledgment to the sender). In
principle, application firewalls can prevent all
unwanted outside traffic from reaching protected
machines.
Packet filter: Looks at each packet entering or
leaving the network and accepts or rejects it based
on user-defined rules.
FIREWALL PROTECTION CHART
ANKIT FADIA


Ankit Fadia is an independent computer
security consultant



He runs a program on computer security for
corporates in alliance with Reliance Info



He

started

a

website

called

"HackingTruths". At 15, his book on Ethical
Hacking made him the youngest author to
be published by Macmillan India.


Fadia

sponsors

Singapore

Management

University's "Ankit Fadia Study Award", which
consists

of

a

$1000

cash

prize

and

Certificate which is annually awarded to "an
outstanding student“
ANKIT FADIA






According to Wendy McAuliffe at ZDNet UK, Fadia's Hacking
Truths website was judged "second best hacking site" by the Federal
Bureau of Investigation, though no ranked list of "hacking sites“
Person of the Year India 2002’ by Limca Book of Records.
In December 2009 Fadia's business site, hackingmobilephones.com
appeared.

Ankit Fadia’s Hacking Books--





The Unofficial Guide to Ethical Hacking
Network Security: A Hacker's Perspective
Hacking Mobile Phones
Tips and Tricks on Linux
Email Hacking

Mais conteúdo relacionado

Mais procurados

What is Coomputer What are the parts of computer
What is Coomputer What are the parts of computer What is Coomputer What are the parts of computer
What is Coomputer What are the parts of computer TarandeepSingh143
 
What is Application Software?
What is Application Software?What is Application Software?
What is Application Software?DaisyJeffenYRios
 
Types of scanner........
Types of scanner........Types of scanner........
Types of scanner........Zunaira Arshad
 
Computer Hardware-Part 1
Computer Hardware-Part 1Computer Hardware-Part 1
Computer Hardware-Part 1Coky Fauzi Alfi
 
Features of windows
Features of windowsFeatures of windows
Features of windowsmyrajendra
 
Computer storage devices
Computer storage devicesComputer storage devices
Computer storage devicesTANISH KHURANA
 
Computer components
Computer componentsComputer components
Computer componentsAva Meek
 
What is software
What is softwareWhat is software
What is softwareAnil815218
 
Computer Systems Foundation General
Computer Systems Foundation GeneralComputer Systems Foundation General
Computer Systems Foundation Generalmrcarty
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Types of input-output devices
Types of input-output devicesTypes of input-output devices
Types of input-output devicesriyadingria
 
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Gene Carboni
 
Chapter 6 output
Chapter 6   outputChapter 6   output
Chapter 6 outputhaider ali
 

Mais procurados (20)

What is Coomputer What are the parts of computer
What is Coomputer What are the parts of computer What is Coomputer What are the parts of computer
What is Coomputer What are the parts of computer
 
System and Application Software of Computer
System and Application Software of ComputerSystem and Application Software of Computer
System and Application Software of Computer
 
What is Application Software?
What is Application Software?What is Application Software?
What is Application Software?
 
Types of scanner........
Types of scanner........Types of scanner........
Types of scanner........
 
Computer Hardware-Part 1
Computer Hardware-Part 1Computer Hardware-Part 1
Computer Hardware-Part 1
 
Features of windows
Features of windowsFeatures of windows
Features of windows
 
Hardware
HardwareHardware
Hardware
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Computer storage devices
Computer storage devicesComputer storage devices
Computer storage devices
 
Computer components
Computer componentsComputer components
Computer components
 
Output devices
Output devicesOutput devices
Output devices
 
What is software
What is softwareWhat is software
What is software
 
CROSS PLATFORM APPLICATIONS DEVELOPMENT
CROSS PLATFORM APPLICATIONS DEVELOPMENT CROSS PLATFORM APPLICATIONS DEVELOPMENT
CROSS PLATFORM APPLICATIONS DEVELOPMENT
 
Computer Systems Foundation General
Computer Systems Foundation GeneralComputer Systems Foundation General
Computer Systems Foundation General
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of input-output devices
Types of input-output devicesTypes of input-output devices
Types of input-output devices
 
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
 
Chapter 6 output
Chapter 6   outputChapter 6   output
Chapter 6 output
 
SYSTEM SOFTWARE
SYSTEM SOFTWARE SYSTEM SOFTWARE
SYSTEM SOFTWARE
 

Destaque

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus tayyaba rashid
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
file handling, dynamic memory allocation
file handling, dynamic memory allocationfile handling, dynamic memory allocation
file handling, dynamic memory allocationindra Kishor
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)Abdullah khawar
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 

Destaque (20)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Top 10 Latest Viruses
Top 10 Latest VirusesTop 10 Latest Viruses
Top 10 Latest Viruses
 
file handling, dynamic memory allocation
file handling, dynamic memory allocationfile handling, dynamic memory allocation
file handling, dynamic memory allocation
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 

Semelhante a Computer Viruses

Semelhante a Computer Viruses (20)

viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Social impacts of it
Social impacts of it Social impacts of it
Social impacts of it
 
MALWARE
MALWAREMALWARE
MALWARE
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Dangers Of The Internet Essay
Dangers Of The Internet EssayDangers Of The Internet Essay
Dangers Of The Internet Essay
 
Computervirus
Computervirus Computervirus
Computervirus
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 

Mais de actanimation

Internet Technology
Internet TechnologyInternet Technology
Internet Technologyactanimation
 
HTML (Hyper Text Markup Language)
HTML (Hyper Text Markup Language)HTML (Hyper Text Markup Language)
HTML (Hyper Text Markup Language)actanimation
 
Financial Accouting
Financial AccoutingFinancial Accouting
Financial Accoutingactanimation
 
Copmuter Languages
Copmuter LanguagesCopmuter Languages
Copmuter Languagesactanimation
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamentalactanimation
 
Java script by Act Academy
Java script by Act AcademyJava script by Act Academy
Java script by Act Academyactanimation
 

Mais de actanimation (10)

Web Designing Kit
Web Designing KitWeb Designing Kit
Web Designing Kit
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
HTML (Hyper Text Markup Language)
HTML (Hyper Text Markup Language)HTML (Hyper Text Markup Language)
HTML (Hyper Text Markup Language)
 
Financial Accouting
Financial AccoutingFinancial Accouting
Financial Accouting
 
Copmuter Languages
Copmuter LanguagesCopmuter Languages
Copmuter Languages
 
Developers
DevelopersDevelopers
Developers
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
AutoCAD
AutoCADAutoCAD
AutoCAD
 
Java script by Act Academy
Java script by Act AcademyJava script by Act Academy
Java script by Act Academy
 
Act academy
Act academyAct academy
Act academy
 

Último

How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptxmary850239
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Dr. Asif Anas
 
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...M56BOOKSTORE PRODUCT/SERVICE
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustVani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustSavipriya Raghavendra
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSyedNadeemGillANi
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdfJayanti Pande
 

Último (20)

How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
 
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustVani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
 
March 2024 Directors Meeting, Division of Student Affairs and Academic Support
March 2024 Directors Meeting, Division of Student Affairs and Academic SupportMarch 2024 Directors Meeting, Division of Student Affairs and Academic Support
March 2024 Directors Meeting, Division of Student Affairs and Academic Support
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf
 

Computer Viruses

  • 2. COMPUTER VIRUS     A computer virus is a computer program that can reproduce itself and spread from one computer to another. and leaving infections as it travels, Like a human virus. Some virus may cause only testing effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file. It is important to note that a virus cannot be spread without a human action. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
  • 3. EFFECT OF COMPUTER VIRUS       It can slow down your computer. It might corrupt your system files. It might make some programs faulty or corrupt. It might damage your boot sector creating problems when you boot into the windows. it might steal important information from your computer and send to some other person. It might change the power ratings of your computer and could blast the system.
  • 4. VIRUS IMPACT ON SYSTEM ACCESSORIES     Programs. Some viruses may impair your certain computer programs and applications. As a result, you may not be able to access the software or operate it smoothly. Files. There are viruses that may modify, corrupt or delete files in your machine owing to which you may not be able to access them. Hard disk. Some viruses may attack the data present on your computer’s hard disk, resulting in its crash. You may need to reformat the disk in such cases. Operational impact. Some viruses may not apparently harm your system’s integrity and may limit themselves to displaying text messages, images, audio and Video.
  • 5. WHY DO PEOPLE CREATE COMPUTER VIRUS     To take control of a computer and use it for specific tasks To generate money To steal sensitive information (credit card numbers, passwords, personal details, data etc.) To prove a point, to prove it can be done, to prove ones skill or for revenge purposes
  • 6. VIRUS IMPACT ON SYSTEM ACCESSORIES     Hardware. No computer viruses are capable of damaging your hardware yet. They just work on all the files and data of your system, make them useless and disable them. Speed. Your system may slow down under the influence of viruses as they consume your system’s memory for their execution. Booting. Your system may suddenly restart and at times may not load properly. In few cases, you may not be able to access your disk drives. Applications. Viruses may modify, damage or delete your program files and system files because of which applications on your system may not be able to work appropriately.
  • 7. VIRUS IMPACT ON SYSTEM ACCESSORIES   Reinstall. Some computer viruses are designed in the gravest way possible. They cannot be uninstalled easily from your system and some reinstall themselves even after they have been removed. Peripherals. Some viruses may impact device driver software in your computer resulting in the relevant operational issues. For example, disturbed software setting for printer may impair its function.
  • 8. COMPUTER VIRUS HISTORY       Elk Cloner has the distinction of being the first wild virus for a home computer. Coded by then-high-school student, Richard Skrenta, around 1982. who created the search engine blekko. Happy Birthday Joshi', the virus was first discovered in India in June 1990 The first known virus was created in 1971 by Cambridge and was called the Creeper Virus. Creeper was an experimental selfreplicating program written by Bob Thomas at BBN in 1971.
  • 9. COMPUTER VIRUS HISTORY     This virus was spread using the Advanced Research Projects Agency Network (ARPANET). It was designed not to damage but to demonstrate a mobile application. It is generally accepted to be the first computer worm, although the Concept of a "computer virus" did not exist in the 1970s When the computers were infected, the message "I'm the creeper, catch me if you can!" This year marks the 40th anniversary of Creeper.
  • 10. FIRST VIRUS FROM PAKISTAN   World's first computer virus was created to infect IBM PCs by two Pakistani brothers, Amjad and Basit Farooq in 1986. While they were trying to explore their expertise and potential of MS DOS operating system, Virus travelled beyond their imagination through Asia, Europe and was picked up in USA. Amjad and Basit Farooq Alvi
  • 11. FIRST VIRUS FROM PAKISTAN  The first computer virus named “Brain” was designed by Amjad Farooq Alvi and Basit Farooq Alvi.  "Beware of this VIRUS...Contact us for vaccination,". This message was put on the screen.  The interesting fact remains that the location of the “Brain Pvt Limited” is exactly the same where the virus was first developed.
  • 12. 10 LATEST COMPUTER VIRUS Virus name Spreading Damage Discovered Backdoor.IRCBot.Dorkbot.A MEDIUM MEDIUM 2011 May 15 Backdoor.Lavandos.A MEDIUM HIGH 2011 Jan 06 VERY LOW HIGH 2011 Jan 03 Java.Trojan.Downloader.OpenConn ection.AI HIGH MEDIUM 2010 Nov 12 Java.Backdoor.ReverseBackdoor.A LOW MEDIUM 2010 Nov 12 VERY LOW VERY LOW 2010 Oct 28 MEDIUM HIGH 2010 Oct 20 Win32.Worm.Stuxnet.A HIGH MEDIUM 2010 Oct 07 Win32.Worm.Prolaco.S MEDIUM MEDIUM 2010 Oct 06 Exploit.CplLnk.Gen MEDIUM LOW 2010 Jul 19 Trojan.Android.Geinimi.A Win32.Ramnit.G Trojan.Spy.Ursnif.F
  • 13. WORLD’S WORST COMPUTER VIRUS Surreptitious Sircam  Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me.  The worm appeared in e-mail in-boxes with an attachment  the body of the message was in Spanish or English.  Typical greetings included "Hi! How are you?" and "Hola como estas?” Raid raider  Code Red burned brightly in the summer of 2001,  Infecting hundreds of thousands of computers--mainly on corporate networks.
  • 14. WORLD’S WORST COMPUTER VIRUS Maniacal Magistr  Magistr is one of the most complex viruses to hit the Internet.  Its victims, users of Outlook Express, were hooked by an infected email attachment.  The virus, discovered in mid-March 2001,  Sent garbled messages to everyone in the infected user's e-mail address book Melissa  Melissa propagated via infected Microsoft Word documents and mailed itself to Outlook contacts of the contaminated user.
  • 15. WORLD’S WORST COMPUTER VIRUS Expletive Deleted) Explorer  The Explorer.zip worm appeared in the summer of 1999.  The worm deleted Word, Excel, and PowerPoint files and types of files.  Explorer traveled via e-mails that appeared to be from someone the recipient knew. Numbing Nimda  Nimda (also known as the Concept Virus) appeared in September 2001,  Attacking tens of thousands of servers and hundreds of thousands of PCs.  The worm modified Web documents and executable files  The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message
  • 16. SOME COMPUTER SECURITY THREATS ADWARE Adware is software that displays advertisements on your computer. BACKDOOR TROJAN A backdoor Trojan allows someone to take control of another user’s computer via the internet without their permission. BLUE JACKING Bluejacking is sending anonymous, unwanted messages to other users with Bluetooth-enabled mobile phones or laptops. BLUE SNARFING Bluesnarfing is the theft of data from a Bluetooth phone. Like Bluejacking, Bluesnarfing depends on the ability of Bluetoothenabled devices todetect and contact others nearby.
  • 17. SOME COMPUTER SECURITY THREATS BOOT SECTOR VIRUS Boot sector viruses spread by modifying the program that enables your computer to start up BROWSER HIJACKERS Browser hijackers change the default home and search pages in your internet browser CHAIN LETTER In electronic chain letter is an email that urges you to forward copies to other people. COOKIES Cookies are files on your computer that enable websites to remember your details. DENIAL OF SERVICE A denial-of-service (DoS) attack prevents users from accessing a computer or website.
  • 18. SOME COMPUTER SECURITY THREATS    Worms Worms are programs that replicate and spread, often opening a back door to allow hackers to gain access to the computers that they infect. Worms can spread over the Internet by exploiting security flaws in the software of computers that are connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email. Zombies A Zombie is a hidden program that lies inactive on a computer. Zombies don’t normally damage the computer on which they reside but can damage other computers. Zombies often arrive as email attachments and when the attachment is opened they install themselves secretly and then wait to be activated. Phishing A Phishing attack is when you are are sent an email that asks you to click on a link and re-enter your bank or credit card details. These emails can pretend to be from banks, Internet service providers, on-line stores and so on, and both the email and the web site it links to appear genuine. When you enter your bank or credit card details they are then used fraudulently.
  • 19. TYPE OF COMPUTER WORMS ADWARE MALWARE SPYWARE
  • 20. ADWARE  Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.  These advertisements can be in the form of a pop-up.  They may also be in the user interface of the software or on a screen presented to the user during the installation process.  The object of the Adware is to generate revenue for its author  Advertising functions are integrated into or bundled with the software, which is often designed to note what Internet sites the user visits
  • 21. MALWARE  Malware, short for malicious software, Malware is a very general word for software that deliberately harms, restricts, alters, or stops your computer from working properly where the true purpose of the download or installation is hidden or difficult to find and not clearly explained to the user .  Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, and other malicious and unwanted software or program.  Malware can arrive through an internet download, as an email link or attachment  as a file sent between users of instant messaging, social networking communities, peer-to-peer file sharing programs, online games, online video games or chatrooms or a link to a malicious webpage.
  • 22. MALWARE  The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior.  The term computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables .  On the other hand, a worm is a program that actively transmits itself over a network to infect other computers
  • 23. INDICATION OF MALWARE  the browser’s home page keeps changing  Pop-up advertisements appear when your browser is closed,.  Strange icons appear on your desktop without your prompting or knowledge of the program  The computer light is blinking (meaning that your computer is processing information) at unusual or unexpected times.  Your browser settings keep changing, including the webpage you designate as your internet start-up page  Files are uploaded or downloaded without your prompting or permission.
  • 24. SPYWARE  Spyware is Internet language for Advertising Supported software (Adware).  Spyware is tracking software that hides itself (runs in the background) and gathers information without the computer owner's or user's knowledge or permission for the benefit of someone else  The first recorded use of the term spyware occurred on 16 October 1995.  showing them pop-up ads, or altering web-browser behavior for the financial benefit of the spyware creator.  For instance, some spyware programs redirect search engine results to paid advertisements.
  • 25. SPYWARE     Others, often called "stealware" by the media, overwrite affiliate marketing codes so that revenue is redirected to the spyware creator rather than the intended recipient. The presence of spyware is typically hidden from the user, and can be difficult to detect Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, As of 2006, spyware has become one of the preeminent security threats to computer systems running Microsoft Windows operating systems.
  • 26. GUIDELINE TO AVOID SPYWARE       Not opening emails or email attachments from unknown senders Block or don’t click on suspicious pop-up windows Don’t open files that are more prone to be associated with malware such as .bat, .pif, .txt .vbs, .htm .exe or .vbs Don’t download or execute applications from untrusted sources. Avoid phishing scams. Use updated anti-virus and anti-spyware software regularly.
  • 27. COMPUTER ANTIVIRUS  A utility that searches a hard disk for viruses and removes any that are found.  Antivirus software is a computer program you install on your machine that scans files for malicious (dangerous) programs and either deletes them or "heals" them therefore eliminating the threat of damage to your computer.  Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered.  Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms.
  • 28. COMPUTER ANTIVIRUS HISTORY The very first anti-virus software wasn't really an anti-virus software. It was a removal tool to remove a Polish virus named MKS vir. That removal tool was released in 1987, and the person who first had the idea of such removal tool was Bernt Fix.
  • 29. BENEFITS FROM ANTIVIRUS Stop Virus-Related Damage Maintain the PC's Security Protect Against Email Threats/Spam Financial Savings Protect Data and Files
  • 30. TOP 10 ANTIVIRUS           Norton Antivirus Kaspersky Antivirus McAfee Antivirus Plus Avira Antivir Premium AVG Antivirus ESET NOD32 Antivirus ZoneAlarm Antvirus Panda Antivirus BitDefender Antivirus F-Secure Antivirus
  • 31. FIREWALL  A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy.  A personal firewall will usually protect only the computer on which it is installed.  Personal firewalls may also provide some level of trouble detection, allowing the software to terminate or block connectivity.  Allows the user to control which programs can and cannot access the local network and/or Internet.  Provide information about the destination server with which an application is attempting to communicate.
  • 32. FIREWALL   They block other packets (usually dropping them without acknowledgment to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines. Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules.
  • 34. ANKIT FADIA  Ankit Fadia is an independent computer security consultant  He runs a program on computer security for corporates in alliance with Reliance Info  He started a website called "HackingTruths". At 15, his book on Ethical Hacking made him the youngest author to be published by Macmillan India.  Fadia sponsors Singapore Management University's "Ankit Fadia Study Award", which consists of a $1000 cash prize and Certificate which is annually awarded to "an outstanding student“
  • 35. ANKIT FADIA    According to Wendy McAuliffe at ZDNet UK, Fadia's Hacking Truths website was judged "second best hacking site" by the Federal Bureau of Investigation, though no ranked list of "hacking sites“ Person of the Year India 2002’ by Limca Book of Records. In December 2009 Fadia's business site, hackingmobilephones.com appeared. Ankit Fadia’s Hacking Books--     The Unofficial Guide to Ethical Hacking Network Security: A Hacker's Perspective Hacking Mobile Phones Tips and Tricks on Linux Email Hacking