SlideShare uma empresa Scribd logo
1 de 3
TOPIC: COMPUTER VIRUSES



Have you ever been working in your computer and then you open an unknown file you find
in the web and suddenly appear a message that tells you that your PC is in danger? Do you
know what computer viruses are and how they spread?


WHAT ARE COMPUTER VIRUSES?

                          A virus is a malware (a malicious software or badware) that has
                          the objective of damaging the PC without the permission of the
                          computer user.


                          Viruses usually replace the files that can be carried out for the
                                                       ones that are infected. They take the
                            function of other files that           are already saved in the
                            computer, but there are also other viruses that are characterized
                            because they just annoy.


Some of the characteristics of the viruses are:
*They produce the loss of productivity of the PC, it becomes slow
*They produce cuts in the information systems
*Damage of data and files
*They are able to spread by replicas


                               HOW VIRUSES SPREAD?
                               There are two ways in which your PC can get viruses; they
                               are:
                               1-The user accepts or carries out the installation of the virus
                               without a warning message.
                               2-The virus acts by replicas through the net.
It can be mentioned that there are some ways in which the PC can be infected by the viruses
when the user is interacting or working on the computer; some of those are:
   •   Through messages that are carried out in programs
   •   Social messages like the ones that tell you “CLICK ON THIS; CARRY OUT THIS
       PROGRAM AND YOU’LL WIN A PRIZE”
   •   When you use diskettes, CD’s or the USB and the files that those hardwares contain
       is infected.
   •   When you install software and you ignore if it has a virus.




                                         TYPES OF VIRUSES


                                         There are a lot of types of viruses; they vary
                                         according to the way they spread, their function,
                                         and the way in which they carry out in the
                                         computer or in the way they alter the activity of it.




Some of the most common viruses are:
   •   The Trojan or the horse Trojan: They steal information and also alter the
       performance of your PC. There are extreme cases in which other users can control
       the system of your PC because of this type of virus.


   •   Worms: They are able to duplicate themselves by using the automatic parts of the
       operation system of the PC that are not visible for the users.


   •   Logic bombs: They are programs that are activated with certain files.
HOW CAN WE AVOID OR ELIMINATE THESE VIRUSES?
There are methods to be used aimed to the risk of getting viruses; they are called ACTIVE
AND PASSIVE METHODS.


Active method:
Antivirus: they are programs that can detect,
eliminate and even stop the spread of viruses.
The antivirus control de system of the PC and
they notified the user when a file or program is
possibly infected.




Passive method:


   •   Avoiding using hardwares like diskettes, CD’s or USB’s that you consider can be
       infected.
   •   Do not install pirated softwares.
   •   Do not open messages or emails that are from an unknown address.
   •   Do not open files without knowing the type of file.

Mais conteúdo relacionado

Mais procurados

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
Rakibul islam
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 

Mais procurados (20)

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Virus part2
Virus part2Virus part2
Virus part2
 

Destaque

Pangunahing problema sa aking barangay
Pangunahing problema sa aking barangayPangunahing problema sa aking barangay
Pangunahing problema sa aking barangay
Clarissa Sulit
 
Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2
jmori1
 
Brand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romanyBrand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romany
MrsPrentice
 
Understanding vocabulary from context
Understanding vocabulary from contextUnderstanding vocabulary from context
Understanding vocabulary from context
Les Davy
 

Destaque (20)

Pangunahing problema sa aking barangay
Pangunahing problema sa aking barangayPangunahing problema sa aking barangay
Pangunahing problema sa aking barangay
 
Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2
 
อติมา อุ่นจิตร
อติมา  อุ่นจิตรอติมา  อุ่นจิตร
อติมา อุ่นจิตร
 
Manal p.
Manal p.Manal p.
Manal p.
 
บทที่ 11
บทที่ 11บทที่ 11
บทที่ 11
 
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
 
Что делать с деструкторами?
Что делать с деструкторами?Что делать с деструкторами?
Что делать с деструкторами?
 
ボブスレー・リュージュパークのあり方の検討について
ボブスレー・リュージュパークのあり方の検討についてボブスレー・リュージュパークのあり方の検討について
ボブスレー・リュージュパークのあり方の検討について
 
Wellbeing 2011 Fact Sheet English
Wellbeing 2011  Fact  Sheet  EnglishWellbeing 2011  Fact  Sheet  English
Wellbeing 2011 Fact Sheet English
 
Brand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romanyBrand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romany
 
Rde c words from visitors trip advisor comments
Rde c words from visitors   trip advisor commentsRde c words from visitors   trip advisor comments
Rde c words from visitors trip advisor comments
 
Cлайды
CлайдыCлайды
Cлайды
 
S t o r y b o a r d
S t o r y b o a r dS t o r y b o a r d
S t o r y b o a r d
 
Corespring
CorespringCorespring
Corespring
 
Understanding vocabulary from context
Understanding vocabulary from contextUnderstanding vocabulary from context
Understanding vocabulary from context
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
 
Acrocanthasaurus
AcrocanthasaurusAcrocanthasaurus
Acrocanthasaurus
 
Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)
 
use WACS;
use WACS;use WACS;
use WACS;
 

Semelhante a Proyecto7

Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
wargames12
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
cheauyih
 

Semelhante a Proyecto7 (20)

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Proyecto7

  • 1. TOPIC: COMPUTER VIRUSES Have you ever been working in your computer and then you open an unknown file you find in the web and suddenly appear a message that tells you that your PC is in danger? Do you know what computer viruses are and how they spread? WHAT ARE COMPUTER VIRUSES? A virus is a malware (a malicious software or badware) that has the objective of damaging the PC without the permission of the computer user. Viruses usually replace the files that can be carried out for the ones that are infected. They take the function of other files that are already saved in the computer, but there are also other viruses that are characterized because they just annoy. Some of the characteristics of the viruses are: *They produce the loss of productivity of the PC, it becomes slow *They produce cuts in the information systems *Damage of data and files *They are able to spread by replicas HOW VIRUSES SPREAD? There are two ways in which your PC can get viruses; they are: 1-The user accepts or carries out the installation of the virus without a warning message. 2-The virus acts by replicas through the net.
  • 2. It can be mentioned that there are some ways in which the PC can be infected by the viruses when the user is interacting or working on the computer; some of those are: • Through messages that are carried out in programs • Social messages like the ones that tell you “CLICK ON THIS; CARRY OUT THIS PROGRAM AND YOU’LL WIN A PRIZE” • When you use diskettes, CD’s or the USB and the files that those hardwares contain is infected. • When you install software and you ignore if it has a virus. TYPES OF VIRUSES There are a lot of types of viruses; they vary according to the way they spread, their function, and the way in which they carry out in the computer or in the way they alter the activity of it. Some of the most common viruses are: • The Trojan or the horse Trojan: They steal information and also alter the performance of your PC. There are extreme cases in which other users can control the system of your PC because of this type of virus. • Worms: They are able to duplicate themselves by using the automatic parts of the operation system of the PC that are not visible for the users. • Logic bombs: They are programs that are activated with certain files.
  • 3. HOW CAN WE AVOID OR ELIMINATE THESE VIRUSES? There are methods to be used aimed to the risk of getting viruses; they are called ACTIVE AND PASSIVE METHODS. Active method: Antivirus: they are programs that can detect, eliminate and even stop the spread of viruses. The antivirus control de system of the PC and they notified the user when a file or program is possibly infected. Passive method: • Avoiding using hardwares like diskettes, CD’s or USB’s that you consider can be infected. • Do not install pirated softwares. • Do not open messages or emails that are from an unknown address. • Do not open files without knowing the type of file.