SlideShare une entreprise Scribd logo
1  sur  15
Presentation 
Personal Firewalls 
Spyware and Adware Removers 
Anti Viruses 
1 
Presented By: 
Adeel Khurram 
Supervised By: 
Engr.Zahra Noor
What is Personal FireWalls? 
A personal firewall is a utility that detects and 
protects a personal computer from unauthorized 
disturbance. Personal firewalls constantly 
monitor all transmissions to and from a 
computer. When connected to the Internet, your 
computer is open to attacks from a hacker . 
2
INTERNET 
Firewall 
My 
PC 
Secure 
Private 
Network
Who are Hackers? 
4 
Hacker 
A hacker is someone who tries to access a 
computer or network illegally.
Operating systems often include a personal 
firewall. Windows automatically enables its 
built-in personal firewall, called Windows 
Firewall, upon installation of the operating 
system. If your operating system does not 
include a personal firewall or you want 
additional protection, you can purchase a 
stand-alone personal firewall utility 
5 
Continue…..
What is an Anti Virus? 
• An antivirus program protects a computer 
against viruses by identifying and removing 
any computer viruses found in memory, on 
storage media, or on incoming files. Most 
antivirus programs also protect against worms 
and Trojan horses. When you purchase a new 
computer, it often includes antivirus software. 
6
Most Famous Anti viruses
What is a Virus ? 
8
• The term, computer virus, describes a 
potentially damaging computer program that 
affects, or infects, a computer negatively by 
altering the way the computer works without 
the user’s knowledge or permission. Once the 
virus is in a computer, it can spread 
throughout and may damage your files and 
operating system. 
9 
Virus…..
• Viruses are just one type of malicious 
software. Malware (short for malicious 
software) is software that acts without a 
user’s knowledge and deliberately 
alters the computer’s operations. In addition 
to viruses, worms and Trojan horses are 
malware. 
10 
Continue….
Worms And Trojan Horse 
• A worm, such as Sasser or Klez, copies itself 
repeatedly, for example, in memory or over a 
network, using up system resources and 
possibly shutting down the system. 
11
Worms And Trojan Horse 
• Trojan HorseTrojan horse (named after the Greek 
myth) hides within or looks like a genuine 
program such as a screen saver. A certain 
condition or action usually start the Trojan 
horse. Unlike a virus or worm, a Trojan horse 
does not reproduce itself to other computers. 
12
Spyware and Adware Remover 
• A spyware remover is a program 
that detects and deletes spyware 
and other similar programs. 
• An adware remover is a program 
that detects and deletes adware. 
13
Spyware and Adware Remover 
• Spyware is a program placed on a computer 
without the user’s knowledge that secretly collects 
information about the user, often related toWeb 
browsing habits. Spyware can enter a computer as a 
virus or as a result of a user installing a new 
program. 
14
Spyware and Adware Remover 
• Adware is a program that displays an online 
advertisement in a banner or pop-up window 
on Web pages, e-mail, or other Internet 
services. Sometimes, spyware is hidden in 
adware. 
15

Contenu connexe

Tendances

Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
sumitra22
 
Demonstration Presentation
Demonstration PresentationDemonstration Presentation
Demonstration Presentation
Jerry Reyes
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
Rizwan Razman
 
Computer virus
Computer virusComputer virus
Computer virus
Toan Tong
 

Tendances (18)

Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Demonstration Presentation
Demonstration PresentationDemonstration Presentation
Demonstration Presentation
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Malware
MalwareMalware
Malware
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Anti virus
Anti virusAnti virus
Anti virus
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus
computer viruscomputer virus
computer virus
 

Similaire à Personal firewall,Spy ware,ad ware remover and viruses

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
JamesBennett15
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 

Similaire à Personal firewall,Spy ware,ad ware remover and viruses (20)

Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti VirusesPersonal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Virus project
Virus projectVirus project
Virus project
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Malware
MalwareMalware
Malware
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
information about virus
information about virusinformation about virus
information about virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 

Plus de Adeel Khurram (8)

What is active directory
What is active directoryWhat is active directory
What is active directory
 
Usages of May and can
Usages of May and canUsages of May and can
Usages of May and can
 
English Punctuation
English PunctuationEnglish Punctuation
English Punctuation
 
Computer simulation
Computer simulationComputer simulation
Computer simulation
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
 
Coaxial cable and its types
Coaxial cable and its typesCoaxial cable and its types
Coaxial cable and its types
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Gps2014
Gps2014Gps2014
Gps2014
 

Personal firewall,Spy ware,ad ware remover and viruses

  • 1. Presentation Personal Firewalls Spyware and Adware Removers Anti Viruses 1 Presented By: Adeel Khurram Supervised By: Engr.Zahra Noor
  • 2. What is Personal FireWalls? A personal firewall is a utility that detects and protects a personal computer from unauthorized disturbance. Personal firewalls constantly monitor all transmissions to and from a computer. When connected to the Internet, your computer is open to attacks from a hacker . 2
  • 3. INTERNET Firewall My PC Secure Private Network
  • 4. Who are Hackers? 4 Hacker A hacker is someone who tries to access a computer or network illegally.
  • 5. Operating systems often include a personal firewall. Windows automatically enables its built-in personal firewall, called Windows Firewall, upon installation of the operating system. If your operating system does not include a personal firewall or you want additional protection, you can purchase a stand-alone personal firewall utility 5 Continue…..
  • 6. What is an Anti Virus? • An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. Most antivirus programs also protect against worms and Trojan horses. When you purchase a new computer, it often includes antivirus software. 6
  • 8. What is a Virus ? 8
  • 9. • The term, computer virus, describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. Once the virus is in a computer, it can spread throughout and may damage your files and operating system. 9 Virus…..
  • 10. • Viruses are just one type of malicious software. Malware (short for malicious software) is software that acts without a user’s knowledge and deliberately alters the computer’s operations. In addition to viruses, worms and Trojan horses are malware. 10 Continue….
  • 11. Worms And Trojan Horse • A worm, such as Sasser or Klez, copies itself repeatedly, for example, in memory or over a network, using up system resources and possibly shutting down the system. 11
  • 12. Worms And Trojan Horse • Trojan HorseTrojan horse (named after the Greek myth) hides within or looks like a genuine program such as a screen saver. A certain condition or action usually start the Trojan horse. Unlike a virus or worm, a Trojan horse does not reproduce itself to other computers. 12
  • 13. Spyware and Adware Remover • A spyware remover is a program that detects and deletes spyware and other similar programs. • An adware remover is a program that detects and deletes adware. 13
  • 14. Spyware and Adware Remover • Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user, often related toWeb browsing habits. Spyware can enter a computer as a virus or as a result of a user installing a new program. 14
  • 15. Spyware and Adware Remover • Adware is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services. Sometimes, spyware is hidden in adware. 15