SlideShare a Scribd company logo
1 of 11
1. DEFINITION OF COMPUTER VIRUS
2. TYPES OF COMPUTER VIRUSES
3. EXPLANATION OF COMPUTER VIRUSES
4. DEFINITION OF COMPUTER ANTI-VIRUS
5. TYPES OF COMPUTER ANTI-VIRUSES
6. EXPLANATION OF ANTI-VIRUSES
7. TOP FIVE COMPUTER ANTI-VIRUSES
A computer virus has been defined as a set of
computer instructions that reproduces
itself and it may attach to other executable
code.
Usually this code is a short program that
may either embed in other code or stand on
it's own.
In essence, this computer program is
designed to infect some aspect of the host
computer and then copy itself as much and
as often as it has the chance.
COMPUTER
VIRUSES
BOOT
SECTO
R
VIRUS

FILE
INFECTIO
N VIRUS

MULTIPART
EMAI
NETWORK
ITE
L
VIRUS
VIRUS
VIRUS

MACR
O
VIRUS
BOOT VIRUS:
Viruses that aim at the boot sector of a hard drive are infecting
a very crucial component of the boot process.
Examples, Polyboot.B and AntiEXE.
FILE INFECTION VIRUS:
These infect executable program files, such as those with
extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and
.SYS (device driver).
Examples, Sunday and Cascade.
MULTIPARTITE VIRUS:
Viruses that are both a file virus and a boot sector virus. They
enter the computer via various sorts of media and then embed
themselves in the system memory. They then go into the hard
drive and infect the boot sector. Examples, Invader, Flip, and
NETWORK VIRUS:
A virus that is especially made for networks is uniquely created
to quickly spread throughout the local area network and
generally across the internet as well. Examples , Christmas
tree and wank worm.

EMAIL VIRUS:
A e-mail virus is one of those types of computer viruses that is
generally a macro virus and it will multiply itself by seeking out
the other contacts in a e-mail address book.
Examples , ILOVEYOU and Melissa.
MACRO VIRUS;
A macro virus is a new type of computer virus that infects the
macros within a document or template. When you open a word
processing or spread sheet document, the macro virus is
Antivirus software is used to
prevent, detect, and remove malware and
other computer viruses. Anti virus software
systems detections involve searching for
known malicious patterns in executable code.
It is possible for a user to be infected with
new viruses that have no sign or symptoms or
existence.
CONVENTIONAL DISK SCANNERS:
This is the standard virus check program. It is run when the user
requests it, and it scans the contents of the disks, directories or
files that the user wants, for any boot sectors and/or files that
contain viruses that it recognizes, based on the virus description
information in its virus definition files.

MEMORY RESIDENT SCANNERS:
Some antivirus software now comes with a special program that
sits in the background while you use your PC and automatically
scans for viruses based on different triggers.

START UP SCANNERS:
Antivirus products often come with a special program that is
designed to be run every time the PC is booted up.

INOCULATION:
This is a totally different approach to virus detection. Instead of
looking for the viruses themselves, this technique looks for the
changes that the viruses make to files and boot sectors.
1.
2.
3.
4.
5.

AVG.
McAFEE.
NORTON (SYMANTEC).
KASPERSKY.
AD AWARE.
viruses and anti-viruses, computer battles

More Related Content

More from Muhammad Ali Bhalli Zada (6)

Thermal Fatigue Analysis of steel plate
Thermal Fatigue Analysis of steel plateThermal Fatigue Analysis of steel plate
Thermal Fatigue Analysis of steel plate
 
Differential equations
Differential equationsDifferential equations
Differential equations
 
Induction motor
Induction motorInduction motor
Induction motor
 
Design and fabrication of hydraulic lift
Design and fabrication of hydraulic liftDesign and fabrication of hydraulic lift
Design and fabrication of hydraulic lift
 
Four stroke petrol engine
Four stroke petrol engineFour stroke petrol engine
Four stroke petrol engine
 
Wedding project management
Wedding project managementWedding project management
Wedding project management
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 

viruses and anti-viruses, computer battles

  • 1.
  • 2. 1. DEFINITION OF COMPUTER VIRUS 2. TYPES OF COMPUTER VIRUSES 3. EXPLANATION OF COMPUTER VIRUSES 4. DEFINITION OF COMPUTER ANTI-VIRUS 5. TYPES OF COMPUTER ANTI-VIRUSES 6. EXPLANATION OF ANTI-VIRUSES 7. TOP FIVE COMPUTER ANTI-VIRUSES
  • 3. A computer virus has been defined as a set of computer instructions that reproduces itself and it may attach to other executable code. Usually this code is a short program that may either embed in other code or stand on it's own. In essence, this computer program is designed to infect some aspect of the host computer and then copy itself as much and as often as it has the chance.
  • 5. BOOT VIRUS: Viruses that aim at the boot sector of a hard drive are infecting a very crucial component of the boot process. Examples, Polyboot.B and AntiEXE. FILE INFECTION VIRUS: These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). Examples, Sunday and Cascade. MULTIPARTITE VIRUS: Viruses that are both a file virus and a boot sector virus. They enter the computer via various sorts of media and then embed themselves in the system memory. They then go into the hard drive and infect the boot sector. Examples, Invader, Flip, and
  • 6. NETWORK VIRUS: A virus that is especially made for networks is uniquely created to quickly spread throughout the local area network and generally across the internet as well. Examples , Christmas tree and wank worm. EMAIL VIRUS: A e-mail virus is one of those types of computer viruses that is generally a macro virus and it will multiply itself by seeking out the other contacts in a e-mail address book. Examples , ILOVEYOU and Melissa. MACRO VIRUS; A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spread sheet document, the macro virus is
  • 7. Antivirus software is used to prevent, detect, and remove malware and other computer viruses. Anti virus software systems detections involve searching for known malicious patterns in executable code. It is possible for a user to be infected with new viruses that have no sign or symptoms or existence.
  • 8.
  • 9. CONVENTIONAL DISK SCANNERS: This is the standard virus check program. It is run when the user requests it, and it scans the contents of the disks, directories or files that the user wants, for any boot sectors and/or files that contain viruses that it recognizes, based on the virus description information in its virus definition files. MEMORY RESIDENT SCANNERS: Some antivirus software now comes with a special program that sits in the background while you use your PC and automatically scans for viruses based on different triggers. START UP SCANNERS: Antivirus products often come with a special program that is designed to be run every time the PC is booted up. INOCULATION: This is a totally different approach to virus detection. Instead of looking for the viruses themselves, this technique looks for the changes that the viruses make to files and boot sectors.