SlideShare une entreprise Scribd logo
1  sur  10
qwertyuiopasdfghjklzxcvbnmqwertyi
uiopasdfghjklzxcvbnmqwertyuiopasd
fghjklzxcvbnmqwertyuiopasdfghjklzx
cvbnmqwertyuiopasdfghjklzxcvbnmq
Computer Virus
wertyuiopasdfghjklzxcvbnmqwertyui
Name: Siti Ainiz Binti Bahari
Class : 4 Iswara
opasdfghjklzxcvbnmqwertyuiopasdfg
2013
hjklzxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiopasdfg
hjklzxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiopasdfg
hjklzxcvbnmrtyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyuiopas
What is virus?
Computer viruses are small software programs that are designed
to spread from one computer to another and to interfere with
computer operation.
A virus might corrupt or delete data on your computer, use your
e-mail program to spread itself to other computers, or even erase
everything on your hard disk.
Viruses are most easily spread by attachments in e-mail
messages or instant messaging messages. That is why it is
essential that you never open e-mail attachments unless you
know who it's from and you are expecting it.
Viruses can be disguised as attachments of funny images,
greeting cards, or audio and video files. Viruses also spread
through downloads on the Internet. They can be hidden in illicit
software or other files or programs you might download.
To help avoid viruses, it's essential that you keep your computer
current with the latest updates and antivirus tools , stay
informed about recent threats , and that you follow a few basic
rules when you surf the Internet, download files, and open
attachments.
Once a virus is on your computer, its type or the method it used
to get there is not as important as removing it and preventing
further infection .
A computer virus is a computer program that can copy itself and
infect a computer without permission or knowledge of the user. The
virus may also be purposly planted in order to cause confusion. The
original may modify the copies or the copies may modify themselves,
as occurs in a metamorphic virus . A virus can only spread from one
computer to another when its host is taken to the uninfected computer,
for instance by a user sending it over a network or carrying it on a
removable medium such as a floppy disk , CD , or USB drive .
Additionally, viruses can spread to other computers by infecting files
on a network file system or a file system that is accessed by another
computer. Viruses are sometimes confused with computer worms
and Trojan horses . A worm, however, can spread itself to other
computers without needing to be transferred as part of a host. A
Trojan horse is a file that appears harmless until executed. In contrast
to viruses, Trojan horses do not insert their code into other computer
files. Many personal computers are now connected to the Internet and
to local-area networks, facilitating their spread. Today's viruses may
also take advantage of network services such as the World Wide
Web , e-mail , and file sharing systems to spread, blurring the line
between viruses and worms. Furthermore, some sources use an
alternative terminology in which a virus is any form of selfreplicating malware .
How do I remove a computer virus?
If your computer is infected with a virus, you'll want to remove it as
quickly as possible. A fast way to check for viruses is to use an online
scanner, such as the Microsoft Safety Scanner. The scanner is a free
online service that helps you identify and remove viruses, clean up
your hard disk, and generally improve your computer's performance.
If you're not sure whether your computer has a virus, see How can I
tell if my computer has a virus? to check for some telltale signs. To
try a different online scanner, follow the links to other companies that
provide them on the Windows Security software providers webpage.
To run the Microsoft Safety Scanner
1.
Go to the Microsoft Safety Scanner webpage to download the
scanner.
2.
Click Download Now, and then follow the instructions on the
screen.
If you can't connect to the Internet
If you can't get to the Microsoft Safety Scanner online, try restarting
your computer in safe mode with networking enabled.
To restart in Safe Mode with networking enabled
1.
Restart your computer.
2.
When you see the computer manufacturer's logo, press and hold
the F8 key.
3.
On the Advanced Boot Options screen, use the arrow keys to
highlight Safe Mode with Networking, and then press Enter.
4.
Log on to your computer with a user account that has
administrator rights.
5.
Follow the steps above to run the Microsoft Safety Scanner.

General Information About Computer Virus
Different Malware Types
Malware is a general name for all programs that are harmful;
viruses, trojan, worms and all other similar programs.
Viruses
A computer virus is a program, a block of executable code,
which attach itself to, overwrite or otherwise replace another
program in order to reproduce itself without a knowledge of a
PC user.
There are a couple of different types of computer viruses: boot
sector viruses, parasitic viruses, multi-partite viruses,
companion viruses, link viruses and macro viruses. These
classifications take into account the different ways in which the
virus can infect different parts of a system. The manner in which
each of these types operates has one thing in common: any virus
has to be executed in order to operate.
Most viruses are pretty harmless. The user might not even notice
the virus for years. Sometimes viruses might cause random
damage to data files and over a long period they might destroy
files and disks. Even benign viruses cause damage by occupying
disk space and main memory, by using up CPU processing time.
There is also the time and expense wasted in detecting and
removing viruses.
Trojan
A Trojan Horse is a program that does something else that the
user thought it would do. It is mostly done to someone on
purpose. The Trojan Horses are usually masked so that they
look interesting, for example a saxophone.wav file that interests
a person collecting sound samples of instruments. A Trojan
Horse differs from a destructive virus in that it doesn't
reproduce. There has been a password trojan out in AOL land
(the American On Line). Password30 and Pasword50 which
some people thought were wav. files, but they were disguised
and people did not know that they had the trojan in their
systems until they tried to change their passwords.
According to an administrator of AOL, the Trojan steals
passwords and sends an E-mail to the hackers fake name and
then the hacker has your account in his hands.

Worm
A worm is a program which spreads usually over network
connections. Unlike a virus which attach itself to a host program,
worms always need a host program to spread. In practice, worms are
not normally associated with one person computer systems. They are
mostly found in multi-user systems such as Unix environments. A
classic example of a worm is Robert Morrisis Internet-worm 1988.
Other types of Virus
Bacteria
Bacteria, also known as rabbits, are programs that do not
directly damage the the system. Instead they replicate
themselves until they monopolize CPU, memory or disk space.
This constitutes a denial of service attack.
Bombs
A bomb is actually a type of Trojan horse that can be used to
release a virus or bacteria. Bombs work by causing an
unauthorized action at a specified date, time or when a particular
condition occurs. There are two types of bombs; logic and time.
Logic bombs are set to go off when a particular event occurs.
Time bombs go off at a specified time, date or after a set amount
of time elapses.
Salami
Salamis cut away tiny pieces of data. They can be particularly
dangerous as the damage they do is small and can be attributed
to some truncation of the system. It is possible for a salami to do
a great deal of damage before it is found.
HOW VIRUSES ACTIVE?
We are always afraid that viruses do something harmful to files when
they get active, but not all the viruses activate. Some viruses just
spread out, but when viruses activate they do very different things.
Might play a part of melody or play music in the background, show a
picture or animated picture, show text, format hard disk or do changes
to files.
As an example, in one unnamed company: over a long period of time,
the files in a server were corrupted just a bit. So backup copies were
taken from the corrupted files. And after they noticed that something
was wrong, it was too late to get back the data from the backups. That
kind of event is the worst that can happen for the uses.
Conclusion
There are lots of viruses in the world and new viruses are
coming up every day. There are new anti-virus programs and
techniques developed too. It is good to be aware of viruses and
other malware and it is cheaper to protect you environment from
them rather then being sorry.
There might be a virus in your computer if it starts acting
differently. There is no reason to panic if the computer virus is
found.
It is good to be a little suspicious of malware when you surf in
the Internet and download files. Some files that look interesting
might hide a malware.
A computer virus is a program that reproduces itself and its
mission is to spread out. Most viruses are harmless and some
viruses might cause random damage to data files.
A trojan horse is not a virus because it doesn't reproduce. The
trojan horses are usually masked so that they look interesting.
There are trojan horses that steal passwords and formats hard
disks.
Reference
http://en.wikipedia.org/wiki/Computer_virus
http://windows.microsoft.com/enmy/windows7/how-do-i-remove-a-computer-virus

Contenu connexe

Tendances

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Computer virus
Computer virusComputer virus
Computer virusarif srk
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.QuratNaeem
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 

Tendances (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Computer virus
Computer virusComputer virus
Computer virus
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Malware
MalwareMalware
Malware
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 

Similaire à Computer virus (Microsoft Word)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
IS project virus (1).pptx
IS project virus (1).pptxIS project virus (1).pptx
IS project virus (1).pptxNaveenK432671
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Computer Virus
Computer Virus Computer Virus
Computer Virus bebo
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 

Similaire à Computer virus (Microsoft Word) (20)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus
VirusVirus
Virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Information security
Information securityInformation security
Information security
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
IS project virus (1).pptx
IS project virus (1).pptxIS project virus (1).pptx
IS project virus (1).pptx
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
virus
virusvirus
virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 

Dernier

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Dernier (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Computer virus (Microsoft Word)

  • 1. qwertyuiopasdfghjklzxcvbnmqwertyi uiopasdfghjklzxcvbnmqwertyuiopasd fghjklzxcvbnmqwertyuiopasdfghjklzx cvbnmqwertyuiopasdfghjklzxcvbnmq Computer Virus wertyuiopasdfghjklzxcvbnmqwertyui Name: Siti Ainiz Binti Bahari Class : 4 Iswara opasdfghjklzxcvbnmqwertyuiopasdfg 2013 hjklzxcvbnmqwertyuiopasdfghjklzxc vbnmqwertyuiopasdfghjklzxcvbnmq wertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfg hjklzxcvbnmqwertyuiopasdfghjklzxc vbnmqwertyuiopasdfghjklzxcvbnmq wertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfg hjklzxcvbnmrtyuiopasdfghjklzxcvbn mqwertyuiopasdfghjklzxcvbnmqwert yuiopasdfghjklzxcvbnmqwertyuiopas
  • 2. What is virus? Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. To help avoid viruses, it's essential that you keep your computer current with the latest updates and antivirus tools , stay informed about recent threats , and that you follow a few basic rules when you surf the Internet, download files, and open attachments. Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection .
  • 3. A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The virus may also be purposly planted in order to cause confusion. The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus . A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk , CD , or USB drive . Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses . A worm, however, can spread itself to other computers without needing to be transferred as part of a host. A Trojan horse is a file that appears harmless until executed. In contrast to viruses, Trojan horses do not insert their code into other computer files. Many personal computers are now connected to the Internet and to local-area networks, facilitating their spread. Today's viruses may also take advantage of network services such as the World Wide Web , e-mail , and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of selfreplicating malware .
  • 4. How do I remove a computer virus? If your computer is infected with a virus, you'll want to remove it as quickly as possible. A fast way to check for viruses is to use an online scanner, such as the Microsoft Safety Scanner. The scanner is a free online service that helps you identify and remove viruses, clean up your hard disk, and generally improve your computer's performance. If you're not sure whether your computer has a virus, see How can I tell if my computer has a virus? to check for some telltale signs. To try a different online scanner, follow the links to other companies that provide them on the Windows Security software providers webpage. To run the Microsoft Safety Scanner 1. Go to the Microsoft Safety Scanner webpage to download the scanner. 2. Click Download Now, and then follow the instructions on the screen. If you can't connect to the Internet If you can't get to the Microsoft Safety Scanner online, try restarting your computer in safe mode with networking enabled. To restart in Safe Mode with networking enabled 1. Restart your computer. 2. When you see the computer manufacturer's logo, press and hold the F8 key. 3. On the Advanced Boot Options screen, use the arrow keys to highlight Safe Mode with Networking, and then press Enter.
  • 5. 4. Log on to your computer with a user account that has administrator rights. 5. Follow the steps above to run the Microsoft Safety Scanner. General Information About Computer Virus Different Malware Types Malware is a general name for all programs that are harmful; viruses, trojan, worms and all other similar programs. Viruses A computer virus is a program, a block of executable code, which attach itself to, overwrite or otherwise replace another program in order to reproduce itself without a knowledge of a PC user. There are a couple of different types of computer viruses: boot sector viruses, parasitic viruses, multi-partite viruses, companion viruses, link viruses and macro viruses. These classifications take into account the different ways in which the virus can infect different parts of a system. The manner in which each of these types operates has one thing in common: any virus has to be executed in order to operate. Most viruses are pretty harmless. The user might not even notice the virus for years. Sometimes viruses might cause random damage to data files and over a long period they might destroy files and disks. Even benign viruses cause damage by occupying disk space and main memory, by using up CPU processing time. There is also the time and expense wasted in detecting and removing viruses.
  • 6. Trojan A Trojan Horse is a program that does something else that the user thought it would do. It is mostly done to someone on purpose. The Trojan Horses are usually masked so that they look interesting, for example a saxophone.wav file that interests a person collecting sound samples of instruments. A Trojan Horse differs from a destructive virus in that it doesn't reproduce. There has been a password trojan out in AOL land (the American On Line). Password30 and Pasword50 which some people thought were wav. files, but they were disguised and people did not know that they had the trojan in their systems until they tried to change their passwords. According to an administrator of AOL, the Trojan steals passwords and sends an E-mail to the hackers fake name and then the hacker has your account in his hands. Worm A worm is a program which spreads usually over network connections. Unlike a virus which attach itself to a host program, worms always need a host program to spread. In practice, worms are not normally associated with one person computer systems. They are mostly found in multi-user systems such as Unix environments. A classic example of a worm is Robert Morrisis Internet-worm 1988.
  • 7. Other types of Virus Bacteria Bacteria, also known as rabbits, are programs that do not directly damage the the system. Instead they replicate themselves until they monopolize CPU, memory or disk space. This constitutes a denial of service attack. Bombs A bomb is actually a type of Trojan horse that can be used to release a virus or bacteria. Bombs work by causing an unauthorized action at a specified date, time or when a particular condition occurs. There are two types of bombs; logic and time. Logic bombs are set to go off when a particular event occurs. Time bombs go off at a specified time, date or after a set amount of time elapses. Salami Salamis cut away tiny pieces of data. They can be particularly dangerous as the damage they do is small and can be attributed to some truncation of the system. It is possible for a salami to do a great deal of damage before it is found.
  • 8. HOW VIRUSES ACTIVE? We are always afraid that viruses do something harmful to files when they get active, but not all the viruses activate. Some viruses just spread out, but when viruses activate they do very different things. Might play a part of melody or play music in the background, show a picture or animated picture, show text, format hard disk or do changes to files. As an example, in one unnamed company: over a long period of time, the files in a server were corrupted just a bit. So backup copies were taken from the corrupted files. And after they noticed that something was wrong, it was too late to get back the data from the backups. That kind of event is the worst that can happen for the uses.
  • 9. Conclusion There are lots of viruses in the world and new viruses are coming up every day. There are new anti-virus programs and techniques developed too. It is good to be aware of viruses and other malware and it is cheaper to protect you environment from them rather then being sorry. There might be a virus in your computer if it starts acting differently. There is no reason to panic if the computer virus is found. It is good to be a little suspicious of malware when you surf in the Internet and download files. Some files that look interesting might hide a malware. A computer virus is a program that reproduces itself and its mission is to spread out. Most viruses are harmless and some viruses might cause random damage to data files. A trojan horse is not a virus because it doesn't reproduce. The trojan horses are usually masked so that they look interesting. There are trojan horses that steal passwords and formats hard disks.