SlideShare uma empresa Scribd logo
1 de 29
Contents:
 History of virus
 Computer Virus
 Action of Virus
 Types of Virus
 History of Anti-virus
 Anti-virus Software
 What to do on suspecting virus attack
 Types of Antivirus
 Action of Antivirus
 Working of Anti-Virus
 General precautions
History of Virus
 The term ``computer virus'' was formally defined by Fred Cohen in
1983, while he performed academic experiments on a Digital
Equipment Corporation VAX(virtual address extension) system.
 The first computer viruses were developed in the early 1980s.
 The first viruses found in the wild were Apple II viruses, such as Elk
Cloner, which was reported in 1981.
Virus
 Virus (Vital information Resource Under Seize )
 It is a software use to infect a computer. After virus is written it is
integrated with in an essential programmed.
 Once the programmed is executed the virus code is activated and
attacks copies of itself to other programs.
 A common type virus is a boot virus which is stored in the boot
sector of disk if the disk is left in the drive when the machine is
infected with FLOPPY , CD, hard disk expecting to the find the
operating there once the machine is effected the boot virus may
replicate it self on to all the floppies.
What is computer virus?
 Computer virus is nothing but a computer program that can infect
a computer without the knowledge of the person using the system.
 Virus can spread from one system to another when a infected file is
copied or transfer from host to target system.
Action of virus on computer
 Any unwanted activity on the computer is treated as virus/worm
.In actual there are programs and codes written by some computer.
 Virus can cause on computer such as:
1. It may take space on Hard Disk.
2. Opening some programs.
3. Generating some messages.
4. Slow down the computer.
5. Delete your valuable data.
6. Unwanted activity over screen .
7. Crash the hard disk.
8. Unable to boot.
Types of viruses
1. Direct Action Virus:
The main purpose
of this virus is to
replicate and take
action when it is
executed.
2. Resident viruses:
This type of virus
Is a permanent which
dwells in the RAM memory.
3. Overwrite virus:
 virus of this kind is characterized by the fact that it deletes the
information contained in the files that it infects , rendering them
partially or totally.
 The only way to clean a file infected by an overwrite virus is to
delete the file completely , thus losing the original content.
4. Directory virus:
1. Computer virus:
A computer virus attached itself to a program or file enabling it to
spread from one computer to another , leaving infections as it travels
like a human virus.
1.It effects while others can damage your HARDWARE ,
SOFTWARE , or files. Almost all viruses are attached to an
executable file ,which means the viruses may exist on your computer
unless you run.
2.It is important to note that a virus cannot be spread without a human
action to keep it going.
3. People continue the spread of a computer virus , mostly
unknowingly , by sharing infected files e-mail with viruses as
attachment in the e-mail.
2. Worm:
 A worm is similar to a virus and considered to b a sub –class of a
virus . Worms spread from computer to computer , but unlike a
virus , it has the capability to travel without any human action.
 The biggest danger with a worm is its capability to replicate itself
on your system , so rather than your computer sending out a single
worm , it could send out hundred or thousand of copies of itself ,
creating a huge devastating effect.
 Due to the copying nature of a worm and its capability to travel
across networks the end result in most cases is that the worm
consume too much system memory causing web servers , and
individual computers to stop responding.
3. Trojan Horse:
 When a Trojan is activated on your computer , the result can vary.
 Some Trojans are designed to be more annoying than malicious or
they can cause serious damage by deleting files and destroying
information on your system.
 Unlike viruses and worms , Trojans do not reproduce by infecting
other files nor do they self-replicate.
 Latest virus:
Name Type Risk Data Discovers
1. RDN/Generic.bfr!6CCE1B5B719E TROJEN 2/10/2014
2. RDN/Generic.bfr!D5770181F03E TROJEN 2/10/2014
 Fred Cohen, who published one of the first academic papers on
computer viruses in 1984,began to develop strategies for antivirus
software in 1988 that were picked up and continued by later
antivirus software developers. In 1987, he published a
demonstration that there is no algorithm that can perfectly detect all
possible viruses.
 In 1987 the first two Heuristic antivirus utilities were released:
Flushot Plus by Ross Greenberg and Anti4us by Erwin Lanting.
History of Antivirus
Antivirus software
 An antivirus is a computer program that identify and remove
computer viruses and other malicious like worms and Trojans form
an infected computer. Not only this , antivirus software also
protects the computer from further virus attacks.
What to do on suspecting virus attack
 Disconnect the suspected computer system from the internet as
well as from the local network.
 Start the system in safe mode or from the windows boot disk , if it
display any problem in starting .
 Take backup of all data to an external drive.
 Install antivirus software if you do not have it installed .
 Now , download the latest virus definition update from the internet
(do it on a separate system).
 Perform a full system scan.
 Shield Deluxe – Anti-virus & Antispyware
 Spyware Doctor & Antivirus
 F pront Antivirus
 Bit Defender Antivirus Plus
 Ashampo Antivirus
1. Shield Deluxe – Antivirus &
Antispyware
 The shield Deluxe 2009 , powered by Bit Defender award winning
Antivirus engine . It provides advanced proactive protection against
viruses , Spyware attack and identity theft.
 Stay one step ahead of the latest e – Threats while maintaining superior
performance that keeps your PC running smoothly.
 The shield Deluxe is simple to install and set up , while offering
advanced users a range of versatile settings for fine – tuning the
program.
 $29.99 to register
2. Spyware Doctor & Antivirus
 Award – Winning spyware and virus protection to secure your PC.
 Spyware Doctor with Antivirus is a top-rated malware , spyware &
virus removal utility that detects , removes and protects your PC
from thousand of potential spyware , adware , Trojans , viruses ,
key loggers , spybots and tracking threats.
3. F Pront Antivirus
 Tired of clunky AV program the slow down your computer and
constantly interfere with your work or when you send email ?
 F –PROT Antivirus for windows is legendary for their high
security , streamlined efficiency and very low resource
consumption F – PROT for windows runs as good on win XP pro
as it does on Win -98 .
 Many millions have chosen F-PROT world wide.
 F-PROT will keep your computer secure and keep out of your way.
 New Bit Defender Antivirus Plus v 10 intergrates
ANTIVIRUS , ANTISPYWARE , FIREWALL , and
ANTISPAM modules into one comprehensive security
package that protect your personal computer.
5. Ashampo Antivirus:
 Ashampoo Antivirus gives you comprehensive protection against
viruses , worms , Trojans and dialers , but it s so efficient you won
even notice its there
 And its so easy to use that it wont waste any of your valuable time.
Just set it and forget it and get on with more important things.
Anti-virus Action:
1. Attempts to repair the file by removing the virus itself from the
file.
1. Quarantine the file (such that the file remains inaccessible to other
program & it s virus can no longer spread )
2. The antivirus software examine each & every file in a computer &
examines the contain with the virus definition if threat is found
then delete the infected file.
Working of Anti-Virus
General precautions:
 When inserted removable media (floppy drive etc.)
scan the whole device with the antivirus software before opening it.
 If you have internet access , make sure you use internet security
Software.
 Get windows updates.
 Form time to time , update your installed software to their latest
version . (MS office , java , flash player etc. )
 You should have an update antivirus guarding your PC all time.
Virus and antivirus

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer Virus
computer Virus computer Virus
computer Virus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware
MalwareMalware
Malware
 

Destaque

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Step by-step how to set up a WordPress.com site
Step by-step how to set up a WordPress.com siteStep by-step how to set up a WordPress.com site
Step by-step how to set up a WordPress.com siteLisa Comstock
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus Jayesh Naik
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemLee Ray
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 

Destaque (18)

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Step by-step how to set up a WordPress.com site
Step by-step how to set up a WordPress.com siteStep by-step how to set up a WordPress.com site
Step by-step how to set up a WordPress.com site
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
The history of virus {c}
The history of virus {c}The history of virus {c}
The history of virus {c}
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Semelhante a Virus and antivirus (20)

Virus project
Virus projectVirus project
Virus project
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Virus
VirusVirus
Virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus
VirusVirus
Virus
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
viruses
virusesviruses
viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Último

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 

Último (20)

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 

Virus and antivirus

  • 1.
  • 2. Contents:  History of virus  Computer Virus  Action of Virus  Types of Virus  History of Anti-virus  Anti-virus Software  What to do on suspecting virus attack  Types of Antivirus  Action of Antivirus  Working of Anti-Virus  General precautions
  • 3. History of Virus  The term ``computer virus'' was formally defined by Fred Cohen in 1983, while he performed academic experiments on a Digital Equipment Corporation VAX(virtual address extension) system.  The first computer viruses were developed in the early 1980s.  The first viruses found in the wild were Apple II viruses, such as Elk Cloner, which was reported in 1981.
  • 4. Virus  Virus (Vital information Resource Under Seize )  It is a software use to infect a computer. After virus is written it is integrated with in an essential programmed.  Once the programmed is executed the virus code is activated and attacks copies of itself to other programs.  A common type virus is a boot virus which is stored in the boot sector of disk if the disk is left in the drive when the machine is infected with FLOPPY , CD, hard disk expecting to the find the operating there once the machine is effected the boot virus may replicate it self on to all the floppies.
  • 5.
  • 6. What is computer virus?  Computer virus is nothing but a computer program that can infect a computer without the knowledge of the person using the system.  Virus can spread from one system to another when a infected file is copied or transfer from host to target system.
  • 7. Action of virus on computer  Any unwanted activity on the computer is treated as virus/worm .In actual there are programs and codes written by some computer.  Virus can cause on computer such as: 1. It may take space on Hard Disk. 2. Opening some programs. 3. Generating some messages. 4. Slow down the computer. 5. Delete your valuable data. 6. Unwanted activity over screen . 7. Crash the hard disk. 8. Unable to boot.
  • 8. Types of viruses 1. Direct Action Virus: The main purpose of this virus is to replicate and take action when it is executed. 2. Resident viruses: This type of virus Is a permanent which dwells in the RAM memory.
  • 9. 3. Overwrite virus:  virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects , rendering them partially or totally.  The only way to clean a file infected by an overwrite virus is to delete the file completely , thus losing the original content.
  • 10. 4. Directory virus: 1. Computer virus: A computer virus attached itself to a program or file enabling it to spread from one computer to another , leaving infections as it travels like a human virus. 1.It effects while others can damage your HARDWARE , SOFTWARE , or files. Almost all viruses are attached to an executable file ,which means the viruses may exist on your computer unless you run. 2.It is important to note that a virus cannot be spread without a human action to keep it going. 3. People continue the spread of a computer virus , mostly unknowingly , by sharing infected files e-mail with viruses as attachment in the e-mail.
  • 11.
  • 12. 2. Worm:  A worm is similar to a virus and considered to b a sub –class of a virus . Worms spread from computer to computer , but unlike a virus , it has the capability to travel without any human action.  The biggest danger with a worm is its capability to replicate itself on your system , so rather than your computer sending out a single worm , it could send out hundred or thousand of copies of itself , creating a huge devastating effect.  Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consume too much system memory causing web servers , and individual computers to stop responding.
  • 13.
  • 14. 3. Trojan Horse:  When a Trojan is activated on your computer , the result can vary.  Some Trojans are designed to be more annoying than malicious or they can cause serious damage by deleting files and destroying information on your system.  Unlike viruses and worms , Trojans do not reproduce by infecting other files nor do they self-replicate.  Latest virus: Name Type Risk Data Discovers 1. RDN/Generic.bfr!6CCE1B5B719E TROJEN 2/10/2014 2. RDN/Generic.bfr!D5770181F03E TROJEN 2/10/2014
  • 15.
  • 16.  Fred Cohen, who published one of the first academic papers on computer viruses in 1984,began to develop strategies for antivirus software in 1988 that were picked up and continued by later antivirus software developers. In 1987, he published a demonstration that there is no algorithm that can perfectly detect all possible viruses.  In 1987 the first two Heuristic antivirus utilities were released: Flushot Plus by Ross Greenberg and Anti4us by Erwin Lanting. History of Antivirus
  • 17. Antivirus software  An antivirus is a computer program that identify and remove computer viruses and other malicious like worms and Trojans form an infected computer. Not only this , antivirus software also protects the computer from further virus attacks.
  • 18.
  • 19. What to do on suspecting virus attack  Disconnect the suspected computer system from the internet as well as from the local network.  Start the system in safe mode or from the windows boot disk , if it display any problem in starting .  Take backup of all data to an external drive.  Install antivirus software if you do not have it installed .  Now , download the latest virus definition update from the internet (do it on a separate system).  Perform a full system scan.
  • 20.  Shield Deluxe – Anti-virus & Antispyware  Spyware Doctor & Antivirus  F pront Antivirus  Bit Defender Antivirus Plus  Ashampo Antivirus
  • 21. 1. Shield Deluxe – Antivirus & Antispyware  The shield Deluxe 2009 , powered by Bit Defender award winning Antivirus engine . It provides advanced proactive protection against viruses , Spyware attack and identity theft.  Stay one step ahead of the latest e – Threats while maintaining superior performance that keeps your PC running smoothly.  The shield Deluxe is simple to install and set up , while offering advanced users a range of versatile settings for fine – tuning the program.  $29.99 to register
  • 22. 2. Spyware Doctor & Antivirus  Award – Winning spyware and virus protection to secure your PC.  Spyware Doctor with Antivirus is a top-rated malware , spyware & virus removal utility that detects , removes and protects your PC from thousand of potential spyware , adware , Trojans , viruses , key loggers , spybots and tracking threats.
  • 23. 3. F Pront Antivirus  Tired of clunky AV program the slow down your computer and constantly interfere with your work or when you send email ?  F –PROT Antivirus for windows is legendary for their high security , streamlined efficiency and very low resource consumption F – PROT for windows runs as good on win XP pro as it does on Win -98 .  Many millions have chosen F-PROT world wide.  F-PROT will keep your computer secure and keep out of your way.
  • 24.  New Bit Defender Antivirus Plus v 10 intergrates ANTIVIRUS , ANTISPYWARE , FIREWALL , and ANTISPAM modules into one comprehensive security package that protect your personal computer.
  • 25. 5. Ashampo Antivirus:  Ashampoo Antivirus gives you comprehensive protection against viruses , worms , Trojans and dialers , but it s so efficient you won even notice its there  And its so easy to use that it wont waste any of your valuable time. Just set it and forget it and get on with more important things.
  • 26. Anti-virus Action: 1. Attempts to repair the file by removing the virus itself from the file. 1. Quarantine the file (such that the file remains inaccessible to other program & it s virus can no longer spread ) 2. The antivirus software examine each & every file in a computer & examines the contain with the virus definition if threat is found then delete the infected file.
  • 28. General precautions:  When inserted removable media (floppy drive etc.) scan the whole device with the antivirus software before opening it.  If you have internet access , make sure you use internet security Software.  Get windows updates.  Form time to time , update your installed software to their latest version . (MS office , java , flash player etc. )  You should have an update antivirus guarding your PC all time.