SlideShare a Scribd company logo
1 of 33
Welcome
ANTI-VIRUS 
Prepared By:- Abhijeet Madhukar Chintamani 
WRO 0429625 
Supervised by :- Shri. Ajay Pande 
Information Technology Training Program (ITT)
Contents 
• Virus & Its Types 
• Types other than viruses 
• History of Anti-virus 
• Meaning of Anti-Virus 
• Types of Anti-Virus 
• How does Anti-Virus Works 
• Install & Upgrade Anti-Virus Software 
• Some Anti-Virus Software's which are 
available in market 
• Summery in short 
• Sources & useful links
What is a computer virus? 
• Computer viruses are small software programs that 
are designed to spread from one computer to 
another and to interfere with computer operation. 
• A virus might corrupt or delete data on your 
computer, use your e-mail program to spread itself to 
other computers, or even erase everything on your 
hard disk. 
• Viruses can be disguised as attachments of funny 
images, greeting cards, or audio and video files.
What is a computer virus? 
• Viruses are most easily spread by attachments in e-mail 
messages or instant messaging messages. That 
is why it is essential that you never open e-mail 
attachments unless you know who it's from and you 
are expecting it. 
• Viruses also spread through downloads on the 
Internet. They can be hidden in illicit software or 
other files or programs you might download.
Types of Viruses 
1. Boot sector viruses 
2. Program viruses 
3. Macro
Types other than Viruses 
• Virus Hoaxes 
• Trojan Horses 
• Worms 
• Spam 
• Adware 
• Spyware 
• Malware
What Should I do if I have a Virus? 
• Clean your computer with software. If 
your computer is still not functioning and you have 
data you are concerned about recovering, consider 
hiring a trusted expert. Often data can be 
successfully extracted from an injured hard drive, but 
the process is complex and will involve another 
computer, special software, and a technician with a 
lot of experience in data recovery.
Virus 
Infection of more than 75,000 vulnerable computers in 10 minutes
What is AntiVirus Software? 
computer programs intended to Identify and 
Eliminate Computer Viruses.
What is an Anti-Virus? 
• Antivirus software is a class of program that searches a 
hard drive and floppy disk for any known or potential 
viruses. 
• Antivirus program runs in the Random Accesses 
Memory of a computer. 
• Anti-virus software typically uses two different 
techniques to accomplish this: 
Examining files to look for known viruses by 
means of a virus dictionary. 
Identifying suspicious behavior from any 
computer program which might indicate infection. 
Most commercial anti-virus software uses 
both of these approaches, with an emphasis on the 
virus dictionary approach.
What is an Anti-Virus? 
• Anti-virus is a software (computer program) that scans files or 
your computer's memory for certain patterns that may 
indicate an infection. The patterns it looks for are based on 
the signatures, or fingerprints, of known viruses. Once a virus 
is detected in the wild, the Anti-Virus companies then release 
these new patterns for your Anti-virus software to use. These 
updates come out daily by some vendors. Virus authors are 
continually releasing new and updated viruses, so it is 
important that you have the latest definitions installed on 
your computer.
What is an Anti-Virus? 
• Once you have installed an anti-virus package, you 
should scan your entire computer periodically. 
Always leave your Anti-virus software running so it 
can provide constant protection. 
• Automatic scans- Depending what software you 
choose, you may be able to configure it to 
automatically scan specific files or directories and 
prompt you at set intervals to perform complete 
scans.
What is an Anti-Virus? 
• Manual scans- It is also a good idea to manually scan 
files you receive from an outside source before 
opening them. 
This includes: Saving and scanning email 
attachments or web downloads rather than selecting 
the option to open them directly from the source. 
Scanning floppy disks, CDs, or DVDs for viruses before 
opening any of the files
Two main types 
• There are different types of antivirus software 
for different computers 
1. Some are designed for personal 
computers. 
2. Some are for servers and others for 
enterprises 
• There are mainly two types of antivirus 
software: specific and generic
Types of Anti-virus product: 
• Depending on the installation method of the 
Anti-Virus these can be in the following forms: 
On-Access, On-Demand, and hardware. 
• Depending on the way they fix viruses these 
can be in the following forms: Anti-Virus, Anti-spyware, 
and Anti-spam Applications.
How does an Anti-Virus works? 
• Anti-virus applications maintain a database of known 
viruses and compare scanned files that match the 
characteristics of known viruses. If a scanned files 
matches those characteristics of known viruses. If a 
scanned file matches those characteristics, it is 
quarantined (which means moved to a new, 
presumably safe location on disk and renamed, so 
you can find it should you ever need it) so that it 
cannot affect other files on your system.
How does an Anti-Virus works? 
• Signature detection is just one way of identifying 
viruses and is only effective if the virus database is 
up-to-date and contains the signature of a virus. 
Anti-virus programs also attempt to identify 
suspicious behavior include an application 
attempting to write to an executable file, altering 
needed system files, making suspicious registry 
entrees, or adding to the list of items that execute 
automatically upon system start up.
How does an Anti-Virus works? 
• Once the file is quarantined, the application can attempt to 
repair it, delete it, or prompt you for a decision on what to do 
about the file infected. 
• This approach helps protect against unidentified or encrypted 
viruses and can alert you to suspicious behavior happening on 
your computer. This interesting is an area where anti-spyware/ 
anti-adware and anti-virus software often notice the 
same kinds of activities, because they are typical for adware 
and spyware as well as malware
How Antivirus Software Works: 
Source System 
Interception 
Disinfection 
Disinfection 
Destination System 
Video 
Interception 
Disinfection 
Alert
Why didn't my antivirus software 
work? 
• It's crucial to keep your antivirus software current 
with the latest updates (usually called definition files) 
that help the tool identify and remove the latest 
threats. 
• In addition, not all antivirus tools are the same; if you 
find that the one you use isn't working to your 
satisfaction, you should do some research and try an 
alternative.
How do I install and updates 
antivirus software if I can't use my 
computer? 
• It might be difficult to download tools or update 
your computer if your computer has a virus. In 
this case, use a friend's or other computer to 
download the tools to a disk
History of Antivirus 
Back in 1988 viruses grabbed the mass media attention and some of the best 
researchers in 
the antivirus world begun their work before 1989. So 1988 was the year in which 
antivirus 
comerciants emerged. 
• Antivirus Plus (Iris) 
• ViruScan (McAfee) 
By 1990 the following antivirus products were available on the market. • Certus (Certus 
• Prot (Frisk Software) 
International) 
• V-Analyst (BRM) 
• Data Physician (Digital 
• Dr. Solomon's Anti-Virus 
Dispatch) 
Toolkit (S&S) 
• Turbo Antivirus (Carmel) 
• Vet (Cybec) 
• Thunder Byte (ESaSS) 
• Virus Buster (Hunix) 
• Vaccine (Sophos) 
• Virscan (IBM) 
• Vaccine (World Wide Data) 
• Vi-Spy (RG Software 
• Virex-PC (Microcom) 
• Virucide (McAfee's Pro- 
Scan) (Parsons) 
• Virusafe (Elia Shim)
Some Examples of Antivirus Software's… 
Bit Defender: Easy to install and download processes, Real-time protection from 
spyware, malware and viruses, automatic hourly updates, Minimal use of system 
resources, Anti-phishing tools. 
Kaspersky Antivirus: Kaspersky includes important anti-virus software functions 
such as real-time email, file and web scanning, as well as the ability to remove 
spyware 
NOD32: The NOD32 anti-virus software by ESET is a novel virus program that 
provides real-time protection against worms, Trojans, spyware, malware, 
phishing and hackers. 
Panda Antivirus: Download and install process is smooth and fast. Panda's 
Antivirus software comes with an virus and spyware protection. Panda allows you 
to block, delete, clean, and quarantine infected files and does not slow your pc 
down during virus scans which is helpful to those constantly on your PC. 
Trend Micro: It is anti-virus plus Anti-spyware now gives its customers the tools 
it needs to battle malicious spyware, amongst things like trojans, hackers, worms, 
and adware.
The Best Defense 
• This years best defense against computer viruses, spyware, hackers 
and spam is an antivirus program called BitDefender. 
• Has a user-friendly interface that scans all existing files on your 
computer, all incoming and outgoing emails, and even IM transfers. 
• Features include privacy protection and web scanning for internet 
use. a years subscription is about $24.99.
NAV 
• The most widely used software is the Norton Antivirus. (NAV) 
• Since its release in 1990, over 100 million people around the world 
have used it. 
• It’s a free program but in order to receive live updates, a valid 
subscription is needed. 
• A yearly subscription is only $29.99.
McAfee 
• McAfee Virus Scan is another popular antivirus program. 
• It’s designed for home and home-office use. 
• It’s used specifically on a Microsoft Windows platform. 
• The 2007 edition includes a number of features including on access 
file sharing, inbound and outbound firewall protection, and daily 
definition updates.
Sophos 
• Sophos Antivirus is an antivirus and anti-spyware program that is 
primarily aimed at corporate environments or businesses. 
• Includes a number of security tools and advice. 
• Also includes 24/7 support including upgrade alerts.
Kaspersky 
• For the average home user and advanced users the Kaspersky 
antivirus software has an easy to use interface. 
• The program uses 3 tabs for protection, settings and support. 
• It updates itself on an hourly basis and is one of the fastest antivirus 
programs available. 
• However, quality comes at a price and year subscription is $49.99.
In Summary: 
• If it sounds to good to be true….It probably is! 
• Never let your guard down! 
• Treat your password and like a toothbrush… 
change it every 3 months and don’t let anyone else 
use it.! 
• Don’t be paranoid…Just aware!
Sources: 
http://www.antivirusworld.com/articles/history.php 
http://www.articlesbase.com/information-technology-articles/ 
antivirus-history-277310.html 
http://videos.howstuffworks.com/harvard-extension-schools- 
computer-science-e-1-understand/2736-desktop-firewalls- 
video.htm
Useful Links 
http://www.ftc.gov/index.html 
http://www.antiphishing.org 
http://www.bbb.org 
http://www.microsoft.com/security 
http://search.aladdin.com 
http://www.privacyrights.org
Thanks 
Q

More Related Content

What's hot

Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 

What's hot (20)

Malware ppt
Malware pptMalware ppt
Malware ppt
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Presentation on computer software
Presentation on computer softwarePresentation on computer software
Presentation on computer software
 
Presentation2
Presentation2Presentation2
Presentation2
 

Viewers also liked

Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarpMohd Arif
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcpMohd Arif
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationN V Amruth Varma
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST SoftwareJulia Szymańska
 

Viewers also liked (20)

Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
KNIME tutorial
KNIME tutorialKNIME tutorial
KNIME tutorial
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint Presentation
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer virus
Computer virusComputer virus
Computer virus
 
3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software
 

Similar to ANTIVIRUS AND VIRUS Powerpoint presentation

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Antiviruses and how they work
Antiviruses and how they workAntiviruses and how they work
Antiviruses and how they workRamlahAziz1
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxsachingwalani24
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfBlogger
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virusshusrusha
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptxReshmaBV2
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 

Similar to ANTIVIRUS AND VIRUS Powerpoint presentation (20)

anti_virus
anti_virusanti_virus
anti_virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Anti virus
Anti virusAnti virus
Anti virus
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Antiviruses and how they work
Antiviruses and how they workAntiviruses and how they work
Antiviruses and how they work
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
information about virus
information about virusinformation about virus
information about virus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 

Recently uploaded

Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 

Recently uploaded (20)

Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 

ANTIVIRUS AND VIRUS Powerpoint presentation

  • 2. ANTI-VIRUS Prepared By:- Abhijeet Madhukar Chintamani WRO 0429625 Supervised by :- Shri. Ajay Pande Information Technology Training Program (ITT)
  • 3. Contents • Virus & Its Types • Types other than viruses • History of Anti-virus • Meaning of Anti-Virus • Types of Anti-Virus • How does Anti-Virus Works • Install & Upgrade Anti-Virus Software • Some Anti-Virus Software's which are available in market • Summery in short • Sources & useful links
  • 4. What is a computer virus? • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. • A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. • Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
  • 5. What is a computer virus? • Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. • Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
  • 6. Types of Viruses 1. Boot sector viruses 2. Program viruses 3. Macro
  • 7. Types other than Viruses • Virus Hoaxes • Trojan Horses • Worms • Spam • Adware • Spyware • Malware
  • 8. What Should I do if I have a Virus? • Clean your computer with software. If your computer is still not functioning and you have data you are concerned about recovering, consider hiring a trusted expert. Often data can be successfully extracted from an injured hard drive, but the process is complex and will involve another computer, special software, and a technician with a lot of experience in data recovery.
  • 9. Virus Infection of more than 75,000 vulnerable computers in 10 minutes
  • 10. What is AntiVirus Software? computer programs intended to Identify and Eliminate Computer Viruses.
  • 11. What is an Anti-Virus? • Antivirus software is a class of program that searches a hard drive and floppy disk for any known or potential viruses. • Antivirus program runs in the Random Accesses Memory of a computer. • Anti-virus software typically uses two different techniques to accomplish this: Examining files to look for known viruses by means of a virus dictionary. Identifying suspicious behavior from any computer program which might indicate infection. Most commercial anti-virus software uses both of these approaches, with an emphasis on the virus dictionary approach.
  • 12. What is an Anti-Virus? • Anti-virus is a software (computer program) that scans files or your computer's memory for certain patterns that may indicate an infection. The patterns it looks for are based on the signatures, or fingerprints, of known viruses. Once a virus is detected in the wild, the Anti-Virus companies then release these new patterns for your Anti-virus software to use. These updates come out daily by some vendors. Virus authors are continually releasing new and updated viruses, so it is important that you have the latest definitions installed on your computer.
  • 13. What is an Anti-Virus? • Once you have installed an anti-virus package, you should scan your entire computer periodically. Always leave your Anti-virus software running so it can provide constant protection. • Automatic scans- Depending what software you choose, you may be able to configure it to automatically scan specific files or directories and prompt you at set intervals to perform complete scans.
  • 14. What is an Anti-Virus? • Manual scans- It is also a good idea to manually scan files you receive from an outside source before opening them. This includes: Saving and scanning email attachments or web downloads rather than selecting the option to open them directly from the source. Scanning floppy disks, CDs, or DVDs for viruses before opening any of the files
  • 15. Two main types • There are different types of antivirus software for different computers 1. Some are designed for personal computers. 2. Some are for servers and others for enterprises • There are mainly two types of antivirus software: specific and generic
  • 16. Types of Anti-virus product: • Depending on the installation method of the Anti-Virus these can be in the following forms: On-Access, On-Demand, and hardware. • Depending on the way they fix viruses these can be in the following forms: Anti-Virus, Anti-spyware, and Anti-spam Applications.
  • 17. How does an Anti-Virus works? • Anti-virus applications maintain a database of known viruses and compare scanned files that match the characteristics of known viruses. If a scanned files matches those characteristics of known viruses. If a scanned file matches those characteristics, it is quarantined (which means moved to a new, presumably safe location on disk and renamed, so you can find it should you ever need it) so that it cannot affect other files on your system.
  • 18. How does an Anti-Virus works? • Signature detection is just one way of identifying viruses and is only effective if the virus database is up-to-date and contains the signature of a virus. Anti-virus programs also attempt to identify suspicious behavior include an application attempting to write to an executable file, altering needed system files, making suspicious registry entrees, or adding to the list of items that execute automatically upon system start up.
  • 19. How does an Anti-Virus works? • Once the file is quarantined, the application can attempt to repair it, delete it, or prompt you for a decision on what to do about the file infected. • This approach helps protect against unidentified or encrypted viruses and can alert you to suspicious behavior happening on your computer. This interesting is an area where anti-spyware/ anti-adware and anti-virus software often notice the same kinds of activities, because they are typical for adware and spyware as well as malware
  • 20. How Antivirus Software Works: Source System Interception Disinfection Disinfection Destination System Video Interception Disinfection Alert
  • 21. Why didn't my antivirus software work? • It's crucial to keep your antivirus software current with the latest updates (usually called definition files) that help the tool identify and remove the latest threats. • In addition, not all antivirus tools are the same; if you find that the one you use isn't working to your satisfaction, you should do some research and try an alternative.
  • 22. How do I install and updates antivirus software if I can't use my computer? • It might be difficult to download tools or update your computer if your computer has a virus. In this case, use a friend's or other computer to download the tools to a disk
  • 23. History of Antivirus Back in 1988 viruses grabbed the mass media attention and some of the best researchers in the antivirus world begun their work before 1989. So 1988 was the year in which antivirus comerciants emerged. • Antivirus Plus (Iris) • ViruScan (McAfee) By 1990 the following antivirus products were available on the market. • Certus (Certus • Prot (Frisk Software) International) • V-Analyst (BRM) • Data Physician (Digital • Dr. Solomon's Anti-Virus Dispatch) Toolkit (S&S) • Turbo Antivirus (Carmel) • Vet (Cybec) • Thunder Byte (ESaSS) • Virus Buster (Hunix) • Vaccine (Sophos) • Virscan (IBM) • Vaccine (World Wide Data) • Vi-Spy (RG Software • Virex-PC (Microcom) • Virucide (McAfee's Pro- Scan) (Parsons) • Virusafe (Elia Shim)
  • 24. Some Examples of Antivirus Software's… Bit Defender: Easy to install and download processes, Real-time protection from spyware, malware and viruses, automatic hourly updates, Minimal use of system resources, Anti-phishing tools. Kaspersky Antivirus: Kaspersky includes important anti-virus software functions such as real-time email, file and web scanning, as well as the ability to remove spyware NOD32: The NOD32 anti-virus software by ESET is a novel virus program that provides real-time protection against worms, Trojans, spyware, malware, phishing and hackers. Panda Antivirus: Download and install process is smooth and fast. Panda's Antivirus software comes with an virus and spyware protection. Panda allows you to block, delete, clean, and quarantine infected files and does not slow your pc down during virus scans which is helpful to those constantly on your PC. Trend Micro: It is anti-virus plus Anti-spyware now gives its customers the tools it needs to battle malicious spyware, amongst things like trojans, hackers, worms, and adware.
  • 25. The Best Defense • This years best defense against computer viruses, spyware, hackers and spam is an antivirus program called BitDefender. • Has a user-friendly interface that scans all existing files on your computer, all incoming and outgoing emails, and even IM transfers. • Features include privacy protection and web scanning for internet use. a years subscription is about $24.99.
  • 26. NAV • The most widely used software is the Norton Antivirus. (NAV) • Since its release in 1990, over 100 million people around the world have used it. • It’s a free program but in order to receive live updates, a valid subscription is needed. • A yearly subscription is only $29.99.
  • 27. McAfee • McAfee Virus Scan is another popular antivirus program. • It’s designed for home and home-office use. • It’s used specifically on a Microsoft Windows platform. • The 2007 edition includes a number of features including on access file sharing, inbound and outbound firewall protection, and daily definition updates.
  • 28. Sophos • Sophos Antivirus is an antivirus and anti-spyware program that is primarily aimed at corporate environments or businesses. • Includes a number of security tools and advice. • Also includes 24/7 support including upgrade alerts.
  • 29. Kaspersky • For the average home user and advanced users the Kaspersky antivirus software has an easy to use interface. • The program uses 3 tabs for protection, settings and support. • It updates itself on an hourly basis and is one of the fastest antivirus programs available. • However, quality comes at a price and year subscription is $49.99.
  • 30. In Summary: • If it sounds to good to be true….It probably is! • Never let your guard down! • Treat your password and like a toothbrush… change it every 3 months and don’t let anyone else use it.! • Don’t be paranoid…Just aware!
  • 31. Sources: http://www.antivirusworld.com/articles/history.php http://www.articlesbase.com/information-technology-articles/ antivirus-history-277310.html http://videos.howstuffworks.com/harvard-extension-schools- computer-science-e-1-understand/2736-desktop-firewalls- video.htm
  • 32. Useful Links http://www.ftc.gov/index.html http://www.antiphishing.org http://www.bbb.org http://www.microsoft.com/security http://search.aladdin.com http://www.privacyrights.org