SlideShare uma empresa Scribd logo
1 de 16
@ Debraj
@ Debraj Chatterjee
   Computer virus refers to a program which
    damages computer systems and/or destroys or
    erases data files
   It has a Capability to copy itself and infect a
    computer without the permission or
    knowledge of the owner.
   One of the first detected virus was the Creeper
    virus in the early 70’s
Boot
Time   Logical                   Dos     Trojan
                 Worm   Sector
Bomb    Bomb                     Virus   Horse
                        Virus
Time   A time bomb is a virus
         program that performs an
Bomb     activity on a particular
         date
       It is a piece of Programming
       Code designed to damage a
         computer system at some
         point in the future. Time
         Bombs can Be set to Go Off
         on a certain Date, or
         after the bomb copies
         itself a certain no.of
         times. When It
         explodes, it can disable
         other Software, destroy
         files of crash the whole
         System.
   A logic bomb is a sort of program or
                 you can say a part of some program
Logic Bomb       which let itself dormant till a certain
                 logic program is activated. A logic
                 bomb is very comparable to a land mine.
                 Most of a time an activation key for a
                 logic bomb, is a date. The logic bomb
                 keeps checking the system for date and
                 remains in position till the set time
                 is reached. As soon as time has been
                 reached it activates itself.

                Logic bomb lacks the power to replicate
                 itself so it is an easy task to write a
                 logic bomb. And it would also don’t
                 spread to unintended systems. It is a
                 sort of civilized program threat.

                The classic use of this virus is
                 ensuring payment for some software. If
                 you don’t pay for some software then it
                 is certain that embedded logic bomb
                 would be activated and deletes that
                 software from your system. And if more
                 malicious then it would result other
                 data deleting from your system.
Worm                       It is a code designed to damage a
                              wide network of Computers. A
                              common purpose of worms is to
                              install a backdoor into a
                              computer. These are programs
Top 10 Computer Worms in      that allow others to gain
Internet History:             access to your computer. Worms
                              Spread by digging into the e-
                              Mail address book and sending
                              themselves automatically to
Morris(1988)
                              everyone the victim knows. Once
Melissa(1999)                they get started, Worms not
ILove You(2000)              only Wreck individual computers
Nimdah(2001)                 but also attack website
Code Red(2001)
                              servers. In 2003, a Worm
                              threatened to take down the
Blaster(2003)
                              Whole
Slammer(2003)                internet. W32.Mydoom.AX@mm i
Sasser(2004)                s an example of a worm. It
Storm(2007)                 was designed to allow
Conficker(2009)             spammers to send spam e-
                             mail from infected computers
The boot sector is the first software loaded
                        onto your computer. This program resides on
Boot Sector Virus       a disk, and this disk can be either the hard
                        disk inside the computer, a floppy disk or a
                        CD.

                    A boot sector virus infects computers by
                        modifying the contents of the boot sector
                        program. It replaces the legitimate contents
                        with its own infected version. A boot sector
                        virus can only infect a machine if it is
                        used to boot-up your computer, e.g. if you
                        start your computer by using a floppy disk
                        with an infected boot sector, your computer
                        is likely to be infected. A boot sector
                        cannot infect a computer if it is introduced
                        after the machine is running the operating
                        system.

                    An example of a boot sector virus is Parity
                        Boot. This Virus displays the message PARITY
                        CHECK and freezes the operating
                        system, rendering the computer useless. This
                        virus message is taken from an actual error
                        message which is displayed to users when a
                        computer's memory is faulty. As a result, a
                        user whose computer is infected with the
                        Parity Boot virus is led to believe that the
                        machine has a memory fault rather than an
                        disruptive virus infection.
The Viruses scripting done
Dos Virus     using DOS in known as Dos
              Virus.
            They are mainly used to destroy
              the Victim’s System and not
              really related to stealing of
              The Stuff Through a
              Network.
            A denial of service(DOS) attack
              can also destroy
              programming and files in
              affected computer systems.
    ******************************start of code*****
@echo off
cd
cd c:window
@deltree/y c:windows
exit
**************end of code********      ******************************start of code*****
                                        Changing Account Password:
                                         net user [annount_name] *
                                         ex:- net user john *
                                        **************end of code********
     ******************************start of code*****
     Deleting all files of a drive:
     @echo off
     rd /s /q [drivename:]
**************end of code********
Trojan
            It is a Malicious Software disguised as
             a useful program or computer File.


Horse    How Trojans work
            Trojans usually consist of two parts, a
             Client and a Server. The server is run
             on the victim's machine and listens for
             connections from a Client used by the
             attacker.

            When the server is run on a machine it
             will listen on a specific port or
             multiple ports for connections from a
             Client. In order for an attacker to
             connect to the server they must have
             the IP Address of the computer where
             the server is being run. Some trojans
             have the IP Address of the computer
             they are running on sent to the
             attacker via email or another form of
             communication.
             Once a connection is made to the
             server, the client can then send
             commands to the server; the server will
             then execute these commands on the
             victim's machine.
   The one and the safest method is the use of an Anti-Virus
    Program.


   How does an Antivirus work?
    Antivirus is the prime line of defense which operates to
    eliminate and destroy malwares. Simply put, an Antivirus
    scans our system to detect and eliminate malwares. Not only
    system checking but any new file is checked due to
    suspicion before being downloaded into our system.

They Search For Virus Files into the whole System and either
   delets them or ignors them according to the User’s Choice.
   Norton Anti-Virus
   Avast Security Centre
   Kaspersky Anti-virus
   Avira Anti-virus
   Quick-Heal Antivirus
   Bit-Defender Antivirus
   Guardian Anti-Virus
Virus Attacks are most Common in every
   Computer, specially when connected to the
   Internet. What We need to do is to prevent from
   harming the System.

ACTIONS TO PREVENT VIRUS INFECTION
 Installation and updation of Anti-Virus Programs.

 Installation of Security Updates for the Computer.

 Not Opening of unknown e-Mails which may Contain
  mostly Virus Files.
 Backing Up of important files in another Drive.

 Changing the Boot Sequence and setting the Hard Disk
  as the 1st priority booting device.
   http://en.wikipedia.org/wiki/Computer_virus
    #History
   www.microsoft.com
   www.cdebraj98.blogspot.com
   www.google.com
Seminar project(computer virus)

Mais conteúdo relacionado

Mais procurados (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus part2
Virus part2Virus part2
Virus part2
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 

Destaque

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Seminar and Project presentation tips
Seminar and Project presentation tipsSeminar and Project presentation tips
Seminar and Project presentation tipsap
 
Signature based virus detection and protection system
Signature based virus detection and protection systemSignature based virus detection and protection system
Signature based virus detection and protection systemMd. Hasan Basri (Angel)
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Digital light processing
Digital light processingDigital light processing
Digital light processingRamrao Desai
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology pptAkshay K Sajan
 
Gaming console final presentation
Gaming console final presentationGaming console final presentation
Gaming console final presentationVivek Bharadwaj
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 

Destaque (20)

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Antivirus
AntivirusAntivirus
Antivirus
 
Seminar and Project presentation tips
Seminar and Project presentation tipsSeminar and Project presentation tips
Seminar and Project presentation tips
 
Seminar project
Seminar projectSeminar project
Seminar project
 
Signature based virus detection and protection system
Signature based virus detection and protection systemSignature based virus detection and protection system
Signature based virus detection and protection system
 
TRIP WIRE
TRIP WIRETRIP WIRE
TRIP WIRE
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Digital light processing
Digital light processingDigital light processing
Digital light processing
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology ppt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Gaming console final presentation
Gaming console final presentationGaming console final presentation
Gaming console final presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 

Semelhante a Seminar project(computer virus)

Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antivirusesSanguine_Eva
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 

Semelhante a Seminar project(computer virus) (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computervirus
Computervirus Computervirus
Computervirus
 

Último

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Último (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Seminar project(computer virus)

  • 1. @ Debraj @ Debraj Chatterjee
  • 2. Computer virus refers to a program which damages computer systems and/or destroys or erases data files  It has a Capability to copy itself and infect a computer without the permission or knowledge of the owner.  One of the first detected virus was the Creeper virus in the early 70’s
  • 3. Boot Time Logical Dos Trojan Worm Sector Bomb Bomb Virus Horse Virus
  • 4. Time A time bomb is a virus program that performs an Bomb activity on a particular date It is a piece of Programming Code designed to damage a computer system at some point in the future. Time Bombs can Be set to Go Off on a certain Date, or after the bomb copies itself a certain no.of times. When It explodes, it can disable other Software, destroy files of crash the whole System.
  • 5. A logic bomb is a sort of program or you can say a part of some program Logic Bomb which let itself dormant till a certain logic program is activated. A logic bomb is very comparable to a land mine. Most of a time an activation key for a logic bomb, is a date. The logic bomb keeps checking the system for date and remains in position till the set time is reached. As soon as time has been reached it activates itself.  Logic bomb lacks the power to replicate itself so it is an easy task to write a logic bomb. And it would also don’t spread to unintended systems. It is a sort of civilized program threat.  The classic use of this virus is ensuring payment for some software. If you don’t pay for some software then it is certain that embedded logic bomb would be activated and deletes that software from your system. And if more malicious then it would result other data deleting from your system.
  • 6. Worm It is a code designed to damage a wide network of Computers. A common purpose of worms is to install a backdoor into a computer. These are programs Top 10 Computer Worms in that allow others to gain Internet History: access to your computer. Worms Spread by digging into the e- Mail address book and sending themselves automatically to Morris(1988) everyone the victim knows. Once Melissa(1999) they get started, Worms not ILove You(2000) only Wreck individual computers Nimdah(2001) but also attack website Code Red(2001) servers. In 2003, a Worm threatened to take down the Blaster(2003) Whole Slammer(2003) internet. W32.Mydoom.AX@mm i Sasser(2004) s an example of a worm. It Storm(2007) was designed to allow Conficker(2009) spammers to send spam e- mail from infected computers
  • 7. The boot sector is the first software loaded onto your computer. This program resides on Boot Sector Virus a disk, and this disk can be either the hard disk inside the computer, a floppy disk or a CD. A boot sector virus infects computers by modifying the contents of the boot sector program. It replaces the legitimate contents with its own infected version. A boot sector virus can only infect a machine if it is used to boot-up your computer, e.g. if you start your computer by using a floppy disk with an infected boot sector, your computer is likely to be infected. A boot sector cannot infect a computer if it is introduced after the machine is running the operating system. An example of a boot sector virus is Parity Boot. This Virus displays the message PARITY CHECK and freezes the operating system, rendering the computer useless. This virus message is taken from an actual error message which is displayed to users when a computer's memory is faulty. As a result, a user whose computer is infected with the Parity Boot virus is led to believe that the machine has a memory fault rather than an disruptive virus infection.
  • 8. The Viruses scripting done Dos Virus using DOS in known as Dos Virus. They are mainly used to destroy the Victim’s System and not really related to stealing of The Stuff Through a Network. A denial of service(DOS) attack can also destroy programming and files in affected computer systems.
  • 9. ******************************start of code***** @echo off cd cd c:window @deltree/y c:windows exit **************end of code******** ******************************start of code***** Changing Account Password: net user [annount_name] * ex:- net user john * **************end of code******** ******************************start of code***** Deleting all files of a drive: @echo off rd /s /q [drivename:] **************end of code********
  • 10. Trojan  It is a Malicious Software disguised as a useful program or computer File. Horse How Trojans work  Trojans usually consist of two parts, a Client and a Server. The server is run on the victim's machine and listens for connections from a Client used by the attacker.  When the server is run on a machine it will listen on a specific port or multiple ports for connections from a Client. In order for an attacker to connect to the server they must have the IP Address of the computer where the server is being run. Some trojans have the IP Address of the computer they are running on sent to the attacker via email or another form of communication. Once a connection is made to the server, the client can then send commands to the server; the server will then execute these commands on the victim's machine.
  • 11.
  • 12. The one and the safest method is the use of an Anti-Virus Program.  How does an Antivirus work? Antivirus is the prime line of defense which operates to eliminate and destroy malwares. Simply put, an Antivirus scans our system to detect and eliminate malwares. Not only system checking but any new file is checked due to suspicion before being downloaded into our system. They Search For Virus Files into the whole System and either delets them or ignors them according to the User’s Choice.
  • 13. Norton Anti-Virus  Avast Security Centre  Kaspersky Anti-virus  Avira Anti-virus  Quick-Heal Antivirus  Bit-Defender Antivirus  Guardian Anti-Virus
  • 14. Virus Attacks are most Common in every Computer, specially when connected to the Internet. What We need to do is to prevent from harming the System. ACTIONS TO PREVENT VIRUS INFECTION  Installation and updation of Anti-Virus Programs.  Installation of Security Updates for the Computer.  Not Opening of unknown e-Mails which may Contain mostly Virus Files.  Backing Up of important files in another Drive.  Changing the Boot Sequence and setting the Hard Disk as the 1st priority booting device.
  • 15. http://en.wikipedia.org/wiki/Computer_virus #History  www.microsoft.com  www.cdebraj98.blogspot.com  www.google.com