SlideShare uma empresa Scribd logo
1 de 16
~Computer Virus~

The things you MUST know


                    Brought to You By
                    Sumanta Majumdar
                  Dept. Of Electrical Engg.
                        2010,GNIT




   http://powerpointpresentationon.blogspot.com/
Introduction
         • About Virus
• Computer virus have become
  today’s headline news.

 • With the increasing use of the
internet, it has become easier for
virus to spread.

• Virus show us loopholes in
  software.

• Most virus are targeted at the MS
  Windows OS
~ Classifying
                            Computer Virus ~
•   A program designed to attach       •   File Virus: A computer virus that
    itself to a file, reproduce, and       infects executable files, that is
                                           programs with exe filename
    spread from one file to                extensions
    another, destroying data,          •   Payload: The disruptive
    displaying an irritating               instructions or message delivered
    message, or otherwise                  by a computer virus. Payloads can
    disrupting computer                    range from just being annoying to
    operations.                            destroying data and files on a
                                           computer system.
                                       •   Boot Sector Virus: A computer
                                           virus that infects the sectors on a
                                           disk that contain the data a
                                           computer uses during the boot
                                           process. The virus spreads every
                                           time the infected disk is in the
                                           computer when it boots.
                                       •   Macro Virus: A computer virus
                                           that infects the macros that are
                                           attached to documents and
                                           spreadsheets.
                                       •   Trojan Horse: A computer
                                           program that appears to perform
                                           one function while actually doing
                                           something else, such as inserting a
* Virus through the
        Internet *

Today almost 87% of all viruses
are spread through the internet.
Transmission time to a new host
  is relatively low, on the order
          of hours to days
           “Latent virus”
Symptoms of Virus Attack
•   Computer no longer boots up.
•   Screen sometimes flicker.
•   Computer runs slower then usual.
•   PC speaker beeps periodically.
•   System crashes for no reason.
•   Files/directories sometimes disappear.
•   Denial of service (dos)….. & Many More.
~Computer Virus~
                        How They Spread
•   A virus runs first when a legitimate        •   Unfortunately, the virus has now
    program is executed.                            reproduced itself, so two programs
•   The virus loads itself into memory              are infected.
    and looks to see if it can find any         •   The next time either of those
    other programs on the disk.                     programs gets executed, they infect
•   If it can find one, it modifies it to add       other programs, and the cycle
    the virus's code to the new program.            continues.
•   Then the virus launches the "real           •   When the infected program
    program“.                                        o is distributed by
•   The user has no way to know that                       floppy disk
    the virus ever ran.                                    uploaded to a bulletin board
                                                           zipped and delivered as an
                                                            executable.

                                                •   then other programs get infected.
~Computer Virus~
How To Prevent Them
• Security features keep viruses away.
• Buy virus protection software.
• Avoid programs from unknown sources (like
  the Internet).
• Stick with commercial software purchased on
  CDs.
~Computer Virus~
         How To Prevent Them
• With E-mail viruses
  o   defense is personal discipline
        Never double-click on an attachment that contains
         an executable program
        Attachments that come in as
          Word files (.DOC), spreadsheets (.XLS), images (.GIF
           and .JPG), etc., are data files
          and they can do no damage
~Computer Virus~
            How To Prevent Them
• Don’t victimize yourself
  o   learn where to find legitimate information on
      hoaxes, myths etc.
        do not forward warnings if you haven’t personally
         checked them out!
~Computer Virus~
   How To Prevent Them
Don’t fall for the
• "False Authority Syndrome”
   o   Most people who claim to speak with authority
       about computer viruses have little or no genuine
       expertise.
         The person feels competent to discuss viruses because of
            his job title,
            because of expertise in another computer field,
            simply because he knows how to use a computer.
~Computer Virus~
How To Prevent Them
• E-mail is clearly the predominant vulnerability
  point for viruses
  o   Current viruses are spread via security holes in
      Microsoft Outlook and Outlook Express
        Free patches are available from Microsoft to address these
         problems
           many people are reluctant to apply them.
• First, update your system with Windows Update
  and Office Update
  o   or, buy a Mac
• Buy virus protection software
~Computer Virus~
 How To Scan?
~Computer Virus~
Anti-Virus Is Scanning
~Computer Virus~
Finding Out A Virus
Computer Virus
            • Acknowledgement
• My special thanks goes to Sri Supriyo Ghosh
  (Dept. of BCA,Techno India, Sec. V) for
  helping & suggesting me about different kind
  of computer viruses & their characteristics.
Computer Virus
• Be Original Kill Piracy.

Mais conteúdo relacionado

Mais procurados (20)

Virus project
Virus projectVirus project
Virus project
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Virusppt
ViruspptVirusppt
Virusppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus
VirusVirus
Virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
viruses
virusesviruses
viruses
 

Semelhante a Everything You Need to Know About Computer Viruses

Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus workschinmay kelkar
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxglainAE
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their typesNeha Kurale
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 

Semelhante a Everything You Need to Know About Computer Viruses (20)

Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Proyecto7
Proyecto7Proyecto7
Proyecto7
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Malicious
MaliciousMalicious
Malicious
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 

Último

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Último (20)

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

Everything You Need to Know About Computer Viruses

  • 1. ~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT http://powerpointpresentationon.blogspot.com/
  • 2. Introduction • About Virus • Computer virus have become today’s headline news. • With the increasing use of the internet, it has become easier for virus to spread. • Virus show us loopholes in software. • Most virus are targeted at the MS Windows OS
  • 3. ~ Classifying Computer Virus ~ • A program designed to attach • File Virus: A computer virus that itself to a file, reproduce, and infects executable files, that is programs with exe filename spread from one file to extensions another, destroying data, • Payload: The disruptive displaying an irritating instructions or message delivered message, or otherwise by a computer virus. Payloads can disrupting computer range from just being annoying to operations. destroying data and files on a computer system. • Boot Sector Virus: A computer virus that infects the sectors on a disk that contain the data a computer uses during the boot process. The virus spreads every time the infected disk is in the computer when it boots. • Macro Virus: A computer virus that infects the macros that are attached to documents and spreadsheets. • Trojan Horse: A computer program that appears to perform one function while actually doing something else, such as inserting a
  • 4. * Virus through the Internet * Today almost 87% of all viruses are spread through the internet. Transmission time to a new host is relatively low, on the order of hours to days “Latent virus”
  • 5. Symptoms of Virus Attack • Computer no longer boots up. • Screen sometimes flicker. • Computer runs slower then usual. • PC speaker beeps periodically. • System crashes for no reason. • Files/directories sometimes disappear. • Denial of service (dos)….. & Many More.
  • 6. ~Computer Virus~ How They Spread • A virus runs first when a legitimate • Unfortunately, the virus has now program is executed. reproduced itself, so two programs • The virus loads itself into memory are infected. and looks to see if it can find any • The next time either of those other programs on the disk. programs gets executed, they infect • If it can find one, it modifies it to add other programs, and the cycle the virus's code to the new program. continues. • Then the virus launches the "real • When the infected program program“. o is distributed by • The user has no way to know that  floppy disk the virus ever ran.  uploaded to a bulletin board  zipped and delivered as an executable. • then other programs get infected.
  • 7. ~Computer Virus~ How To Prevent Them • Security features keep viruses away. • Buy virus protection software. • Avoid programs from unknown sources (like the Internet). • Stick with commercial software purchased on CDs.
  • 8. ~Computer Virus~ How To Prevent Them • With E-mail viruses o defense is personal discipline  Never double-click on an attachment that contains an executable program  Attachments that come in as  Word files (.DOC), spreadsheets (.XLS), images (.GIF and .JPG), etc., are data files  and they can do no damage
  • 9. ~Computer Virus~ How To Prevent Them • Don’t victimize yourself o learn where to find legitimate information on hoaxes, myths etc.  do not forward warnings if you haven’t personally checked them out!
  • 10. ~Computer Virus~ How To Prevent Them Don’t fall for the • "False Authority Syndrome” o Most people who claim to speak with authority about computer viruses have little or no genuine expertise.  The person feels competent to discuss viruses because of  his job title,  because of expertise in another computer field,  simply because he knows how to use a computer.
  • 11. ~Computer Virus~ How To Prevent Them • E-mail is clearly the predominant vulnerability point for viruses o Current viruses are spread via security holes in Microsoft Outlook and Outlook Express  Free patches are available from Microsoft to address these problems  many people are reluctant to apply them. • First, update your system with Windows Update and Office Update o or, buy a Mac • Buy virus protection software
  • 15. Computer Virus • Acknowledgement • My special thanks goes to Sri Supriyo Ghosh (Dept. of BCA,Techno India, Sec. V) for helping & suggesting me about different kind of computer viruses & their characteristics.
  • 16. Computer Virus • Be Original Kill Piracy.