Binisha.pptx

Prepared By :
Binisha Tamang
Shree Rudrayanee Secondary School
Lalitpur, Nepal
A computer virus is a program that can copy
itself and infect a computer without the
permission or knowledge of the user.
 Boot sector virus
 File or Program virus
 Macro virus
 Multipartite virus
 Stealth virus
 Boot sector virus replace or implant themselves
in the boot sector, the area of the hard drive (or
any other disk) accessed when you first turn on
your computer. This kind of virus can prevent
you from being able to boot your hard disk. For
example:
 Danish Boot
 Brain
 Disk killer
 Michelangelo
 File viruses infect application programs. They
may attach themselves to any executable file,
usually .COM and .EXE files. An application
program infector takes control after the initial
use of the infected program For example:
 Acid Rain
 Alien.298
 Crazy A
 Macro viruses are written by using a simplified
macro programming language. These viruses
affect a Microsoft office document created
using MS-Word, MSExcel, MSAccess, etc. The
viruses can spread if the infected document is
open in another computer. For example:
 Melissa
 Word Concept
 Multipartite viruses can infect both application
programs and the boot sector of a disk. They
infect program files and when the infected
program is executed; these viruses infect boot
record. Next time, The virus from the boot
record loads in the memory and then starts
infecting other program files on the disk. For
example:
 Invader
 File
 Tequila
 Stealth viruses actively hide themselves from
antiviral software by either masking the size of
the file that they hide in or temporarily
removing itself from the infected file and
placing a copy of itself in another location on
the drive. For example:
 Frodo
 Joshi
 Whale
 Booting processing becomes slow
 Size of files may be changed
 Location of file may be changed
 Computer gives unnecessary message and
produces sounds
 Internet
 Email
 Infected files
 Infected removable storage devices
 Pirated software
 Programs take a longer time to load. Memory-
resident operations take a lot of time to start.
 A change occurs in dates and time of saved
files.
 Hard disk is suddenly accessed without a
logical reason.
 Viruses increases the use of disk space and
growth in file size. They attach themselves to
many files.
 Unnecessary massages are display on the
monitor.
 Scan downloaded files of the internet before
copying to your computer.
 Use a good antivirus program to scan floppy
disks before copying files. Recommended once
are Total AV, Norton Antivirus and McAfee.
 Do not install pirated software.
 Scan your computer system and removable
storage devices before use.
1 de 12

Recomendados

Viruses notes1 por
Viruses notes1Viruses notes1
Viruses notes1Dara Corporates
510 visualizações11 slides
Viruses notes por
Viruses notesViruses notes
Viruses notesDara Corporates
13.3K visualizações11 slides
Computer virus por
Computer virusComputer virus
Computer viruskiran_a_c
1.1K visualizações15 slides
Computer viruses and prevention techniques por
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
5.8K visualizações34 slides
Computer viruses by joy chakraborty por
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
1.7K visualizações9 slides
Computer virus por
Computer virusComputer virus
Computer virusdineshrwt911
57 visualizações22 slides

Mais conteúdo relacionado

Similar a Binisha.pptx

computer virus Report por
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
10.4K visualizações16 slides
Introductions To Malwares por
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
153 visualizações40 slides
Types of virus and saviour por
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
96 visualizações21 slides
Virus vs anti virus por
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
15.8K visualizações38 slides
Computer viruses por
Computer virusesComputer viruses
Computer virusesaagmansaini
2.6K visualizações18 slides
Viruses por
VirusesViruses
VirusesShahidaffridi
2.1K visualizações22 slides

Similar a Binisha.pptx(20)

computer virus Report por rawaabdullah
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah10.4K visualizações
Introductions To Malwares por Cyber Vignan
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan153 visualizações
Types of virus and saviour por Yastee Shah
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
Yastee Shah96 visualizações
Virus vs anti virus por Xʎz ʞsɥ
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ15.8K visualizações
Computer viruses por aagmansaini
Computer virusesComputer viruses
Computer viruses
aagmansaini2.6K visualizações
Viruses por Shahidaffridi
VirusesViruses
Viruses
Shahidaffridi2.1K visualizações
Computer Viruses por Aman Chaudhary
Computer VirusesComputer Viruses
Computer Viruses
Aman Chaudhary851 visualizações
Itc lec 15 Computer security risks por AnzaDar3
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar331 visualizações
Introduction to Computer Virus por Imtiaz Ahmed
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed3.4K visualizações
Computer virus (Microsoft Powerpoint) por ainizbahari97
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari9799.4K visualizações
Computer viruses por Alfred George
Computer virusesComputer viruses
Computer viruses
Alfred George7.7K visualizações
Computervirus por Dushyant Shekhawat
Computervirus Computervirus
Computervirus
Dushyant Shekhawat321 visualizações
Computer virus por Goa App
Computer virusComputer virus
Computer virus
Goa App701 visualizações
Computer Virus por izzul
Computer VirusComputer Virus
Computer Virus
izzul23.6K visualizações
Virus and antivirus por zain Ul abadin
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin4.2K visualizações
Computer virus por Sammer Khizer
Computer virusComputer virus
Computer virus
Sammer Khizer2.3K visualizações
viruses por khadija habib
virusesviruses
viruses
khadija habib483 visualizações
Antivirus security por mPower Technology
Antivirus securityAntivirus security
Antivirus security
mPower Technology109 visualizações
Virus.pptx por EimerejDlcrz
Virus.pptxVirus.pptx
Virus.pptx
EimerejDlcrz9 visualizações
Computer Viruses- B S Kalyan Chakravarthy por Dipayan Sarkar
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan Chakravarthy
Dipayan Sarkar545 visualizações

Último

hamro digital logics.pptx por
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
11 visualizações36 slides
Marketing and Community Building in Web3 por
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
15 visualizações64 slides
Affiliate Marketing por
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
20 visualizações30 slides
The Dark Web : Hidden Services por
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
19 visualizações24 slides
Amine el bouzalimi por
Amine el bouzalimiAmine el bouzalimi
Amine el bouzalimiAmine EL BOUZALIMI
5 visualizações38 slides
How to think like a threat actor for Kubernetes.pptx por
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
7 visualizações33 slides

Último(10)

hamro digital logics.pptx por tupeshghimire
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptx
tupeshghimire11 visualizações
Marketing and Community Building in Web3 por Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast15 visualizações
Affiliate Marketing por Navin Dhanuka
Affiliate MarketingAffiliate Marketing
Affiliate Marketing
Navin Dhanuka20 visualizações
The Dark Web : Hidden Services por Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh19 visualizações
How to think like a threat actor for Kubernetes.pptx por LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze17 visualizações
ATPMOUSE_융합2조.pptx por kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 visualizações
cis5-Project-11a-Harry Lai por harrylai126
cis5-Project-11a-Harry Laicis5-Project-11a-Harry Lai
cis5-Project-11a-Harry Lai
harrylai1269 visualizações
WITS Deck por W.I.T.S.
WITS DeckWITS Deck
WITS Deck
W.I.T.S.18 visualizações

Binisha.pptx

  • 1. Prepared By : Binisha Tamang Shree Rudrayanee Secondary School Lalitpur, Nepal
  • 2. A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.
  • 3.  Boot sector virus  File or Program virus  Macro virus  Multipartite virus  Stealth virus
  • 4.  Boot sector virus replace or implant themselves in the boot sector, the area of the hard drive (or any other disk) accessed when you first turn on your computer. This kind of virus can prevent you from being able to boot your hard disk. For example:  Danish Boot  Brain  Disk killer  Michelangelo
  • 5.  File viruses infect application programs. They may attach themselves to any executable file, usually .COM and .EXE files. An application program infector takes control after the initial use of the infected program For example:  Acid Rain  Alien.298  Crazy A
  • 6.  Macro viruses are written by using a simplified macro programming language. These viruses affect a Microsoft office document created using MS-Word, MSExcel, MSAccess, etc. The viruses can spread if the infected document is open in another computer. For example:  Melissa  Word Concept
  • 7.  Multipartite viruses can infect both application programs and the boot sector of a disk. They infect program files and when the infected program is executed; these viruses infect boot record. Next time, The virus from the boot record loads in the memory and then starts infecting other program files on the disk. For example:  Invader  File  Tequila
  • 8.  Stealth viruses actively hide themselves from antiviral software by either masking the size of the file that they hide in or temporarily removing itself from the infected file and placing a copy of itself in another location on the drive. For example:  Frodo  Joshi  Whale
  • 9.  Booting processing becomes slow  Size of files may be changed  Location of file may be changed  Computer gives unnecessary message and produces sounds
  • 10.  Internet  Email  Infected files  Infected removable storage devices  Pirated software
  • 11.  Programs take a longer time to load. Memory- resident operations take a lot of time to start.  A change occurs in dates and time of saved files.  Hard disk is suddenly accessed without a logical reason.  Viruses increases the use of disk space and growth in file size. They attach themselves to many files.  Unnecessary massages are display on the monitor.
  • 12.  Scan downloaded files of the internet before copying to your computer.  Use a good antivirus program to scan floppy disks before copying files. Recommended once are Total AV, Norton Antivirus and McAfee.  Do not install pirated software.  Scan your computer system and removable storage devices before use.