SlideShare uma empresa Scribd logo
1 de 16
COMPUTER
 *VIRUS *
                  Compiled By:
                      Sanmitha Rao
                       B.Sc 4th sem
  Karnatak Science College Dharwad    1
CONTENTS
   Introduction
   Origin of Viruses
   Symptoms of virus attack
   General Virus Types
   Prevention is the best cure
   Working of antivirus software
   Practice safe Computing



                      Karnatak Science College Dharwad   2
What is a virus?
   Virus is a Computer program like any other
    Program
   It gives Instructions to your computer to do
    the things which you don’t want it to do.
   It spreads.
   It can be destructive.
   It could format your hard drive boot sector
    or delete your files and render your machine
    inoperable.


    Karnatak Science College Dharwad          3
*ORIGIN *
   People normally create viruses by writing a
    code .
   Generally people create viruses just for thrill
    or fun.
   In early days viruses were pieces of code
    attached to a program.
   There are estimated 30,000 viruses, over 300
    viruses are created each month.
   First virus was created to show loopholes in
    software.

                          Karnatak Science College Dharwad   4
Symptoms of Virus attack
   Computer runs slower than usual
   Computer no longer boots up
   Screen sometimes flicker
   PC speaker beeps periodically
   System crashes for no reason
   Files /directories sometimes disappear
   Denial of Service (Dos)



                       Karnatak Science College Dharwad   5
TYPES OF VIRUSES
1.   Boot Sector Virus
2.   Macro Virus
3.   Multipartite Virus
4.   Polymorphic Virus
5.   E-mail Viruses
6.   Worms
7.   Trojan horses etc.




                          Karnatak Science College Dharwad   6
   Traditional Virus
   Infect the boot on floppy disks and hard disks.
   By putting its code in the boot sector virus can guarantee it
    gets executed.
   Load itself into the memory and it is able to run whenever
    the computer is on.




                       Karnatak Science College Dharwad             7
   Written using a simplified programming language
    these viruses can effect your Microsoft applications
    like word and excel
   A document infected with the Macro Virus generally
    modifies a pre-existing commonly used command (such
    as save) to trigger its payload upon execution of that
    command.


                    Karnatak Science College Dharwad     8
   This can infect both your files and boot sector
   It can infect thousands of times to your system
    before it is caught.
   It is a dangerous virus.




                   Karnatak Science College Dharwad   9
   Changes code whenever it passes to
    another machine.



               Karnatak Science College Dharwad   10
   It moves around in the email messages.

   Usually replicates itself by automatically
    mailing itself to the dozens of people in the
    victims e-mail address book.




        Karnatak Science College Dharwad            11
   It has the ability to copy itself from
    machine to machine.
   Eat up storage space and slows down
    the computer.
   Normally move around and infect other
    machine through computer networks.
   But worms don’t alter or delete files.




                      Karnatak Science College Dharwad   12
   It is basically a computer program that
    claims to do one thing, but instead it
    damages the computer.
   It can capture information from your
    system such as user name and password or
    could allow a malicious hacker to remotely
    control your system.
   It has no way to replicate automatically.

                    Karnatak Science College Dharwad   13
PREVENTION IS THE BEST
        CURE
1.   Install a virus protection software.
2.   Run a secure operating system like Unix or NT.
3.   Avoid programs from unknown sources.
4.   Disable floppy disk booting.
5.   Macro virus protection is enabled in all Microsoft
     applications.
6.   Never double click on the attachment that comes as an
     executable that arrives as an email attachment.




               Karnatak Science College Dharwad         14
Working of Antivirus Software
   There are two ways in which a antivirus
    software works-scanning software kooks
    for a virus,scanning software looks for a
    unusual virus.
   For a known virus software will look for a
    virus signature and will zap it from the
    system.
   For an unknown virus the software
    quarantines the questionable program and
    will inform you about what the program
    may be trying to do.

                      Karnatak Science College Dharwad   15
Sanmi's first pp

Mais conteúdo relacionado

Mais procurados

Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingmentcheauyih
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!amoY91
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)cdebraj16101991
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24Muhammad Zain
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ictmakanaya
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 

Mais procurados (20)

Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Antivirus
AntivirusAntivirus
Antivirus
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Viruses
VirusesViruses
Viruses
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24
 
Anti virus
Anti virusAnti virus
Anti virus
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
virus
virusvirus
virus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 

Semelhante a Sanmi's first pp

Semelhante a Sanmi's first pp (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Virus
VirusVirus
Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Virus project
Virus projectVirus project
Virus project
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
viruses
virusesviruses
viruses
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus
VirusVirus
Virus
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computervirus
Computervirus Computervirus
Computervirus
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 

Último

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

Sanmi's first pp

  • 1. COMPUTER *VIRUS * Compiled By: Sanmitha Rao B.Sc 4th sem Karnatak Science College Dharwad 1
  • 2. CONTENTS  Introduction  Origin of Viruses  Symptoms of virus attack  General Virus Types  Prevention is the best cure  Working of antivirus software  Practice safe Computing Karnatak Science College Dharwad 2
  • 3. What is a virus?  Virus is a Computer program like any other Program  It gives Instructions to your computer to do the things which you don’t want it to do.  It spreads.  It can be destructive.  It could format your hard drive boot sector or delete your files and render your machine inoperable. Karnatak Science College Dharwad 3
  • 4. *ORIGIN *  People normally create viruses by writing a code .  Generally people create viruses just for thrill or fun.  In early days viruses were pieces of code attached to a program.  There are estimated 30,000 viruses, over 300 viruses are created each month.  First virus was created to show loopholes in software. Karnatak Science College Dharwad 4
  • 5. Symptoms of Virus attack  Computer runs slower than usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files /directories sometimes disappear  Denial of Service (Dos) Karnatak Science College Dharwad 5
  • 6. TYPES OF VIRUSES 1. Boot Sector Virus 2. Macro Virus 3. Multipartite Virus 4. Polymorphic Virus 5. E-mail Viruses 6. Worms 7. Trojan horses etc. Karnatak Science College Dharwad 6
  • 7. Traditional Virus  Infect the boot on floppy disks and hard disks.  By putting its code in the boot sector virus can guarantee it gets executed.  Load itself into the memory and it is able to run whenever the computer is on. Karnatak Science College Dharwad 7
  • 8. Written using a simplified programming language these viruses can effect your Microsoft applications like word and excel  A document infected with the Macro Virus generally modifies a pre-existing commonly used command (such as save) to trigger its payload upon execution of that command. Karnatak Science College Dharwad 8
  • 9. This can infect both your files and boot sector  It can infect thousands of times to your system before it is caught.  It is a dangerous virus. Karnatak Science College Dharwad 9
  • 10. Changes code whenever it passes to another machine. Karnatak Science College Dharwad 10
  • 11. It moves around in the email messages.  Usually replicates itself by automatically mailing itself to the dozens of people in the victims e-mail address book. Karnatak Science College Dharwad 11
  • 12. It has the ability to copy itself from machine to machine.  Eat up storage space and slows down the computer.  Normally move around and infect other machine through computer networks.  But worms don’t alter or delete files. Karnatak Science College Dharwad 12
  • 13. It is basically a computer program that claims to do one thing, but instead it damages the computer.  It can capture information from your system such as user name and password or could allow a malicious hacker to remotely control your system.  It has no way to replicate automatically. Karnatak Science College Dharwad 13
  • 14. PREVENTION IS THE BEST CURE 1. Install a virus protection software. 2. Run a secure operating system like Unix or NT. 3. Avoid programs from unknown sources. 4. Disable floppy disk booting. 5. Macro virus protection is enabled in all Microsoft applications. 6. Never double click on the attachment that comes as an executable that arrives as an email attachment. Karnatak Science College Dharwad 14
  • 15. Working of Antivirus Software  There are two ways in which a antivirus software works-scanning software kooks for a virus,scanning software looks for a unusual virus.  For a known virus software will look for a virus signature and will zap it from the system.  For an unknown virus the software quarantines the questionable program and will inform you about what the program may be trying to do. Karnatak Science College Dharwad 15