SlideShare une entreprise Scribd logo
1  sur  16
@ Debraj
@ Debraj Chatterjee
 Computer virus refers to a program which
damages computer systems and/or destroys or
erases data files
 It has a Capability to copy itself and infect a
computer without the permission or
knowledge of the owner.
 One of the first detected virus was the Creeper
virus in the early 70’s
Time
Bomb
Logical
Bomb
Worm
Boot
Sector
Virus
Dos
Virus
Trojan
Horse
Time
Bomb
A time bomb is a virus
program that performs an
activity on a particular
date
It is a piece of Programming
Code designed to damage a
computer system at some
point in the future. Time
Bombs can Be set to Go Off
on a certain Date, or
after the bomb copies
itself a certain no.of
times. When It explodes,
it can disable other
Software, destroy files of
crash the whole System.
Logic Bomb
 A logic bomb is a sort of program or
you can say a part of some program
which let itself dormant till a certain
logic program is activated. A logic
bomb is very comparable to a land mine.
Most of a time an activation key for a
logic bomb, is a date. The logic bomb
keeps checking the system for date and
remains in position till the set time
is reached. As soon as time has been
reached it activates itself.
 Logic bomb lacks the power to replicate
itself so it is an easy task to write a
logic bomb. And it would also don’t
spread to unintended systems. It is a
sort of civilized program threat.
 The classic use of this virus is
ensuring payment for some software. If
you don’t pay for some software then it
is certain that embedded logic bomb
would be activated and deletes that
software from your system. And if more
malicious then it would result other
data deleting from your system.
Worm
Top 10 Computer Worms in
Internet History:
Morris(1988)
Melissa(1999)
I Love You(2000)
Nimdah(2001)
Code Red(2001)
Blaster(2003)
Slammer(2003)
Sasser(2004)
Storm(2007)
Conficker(2009)
It is a code designed to damage a
wide network of Computers. A
common purpose of worms is to
install a backdoor into a
computer. These are programs
that allow others to gain
access to your computer. Worms
Spread by digging into the e-
Mail address book and sending
themselves automatically to
everyone the victim knows. Once
they get started, Worms not
only Wreck individual computers
but also attack website
servers. In 2003, a Worm
threatened to take down the
Whole
internet. W32.Mydoom.AX@mm i
s an example of a worm. It
was designed to allow
spammers to send spam e-
mail from infected computers
Boot Sector Virus
The boot sector is the first software loaded
onto your computer. This program resides on
a disk, and this disk can be either the hard
disk inside the computer, a floppy disk or a
CD.
A boot sector virus infects computers by
modifying the contents of the boot sector
program. It replaces the legitimate contents
with its own infected version. A boot sector
virus can only infect a machine if it is
used to boot-up your computer, e.g. if you
start your computer by using a floppy disk
with an infected boot sector, your computer
is likely to be infected. A boot sector
cannot infect a computer if it is introduced
after the machine is running the operating
system.
An example of a boot sector virus is Parity
Boot. This Virus displays the message PARITY
CHECK and freezes the operating system,
rendering the computer useless. This virus
message is taken from an actual error
message which is displayed to users when a
computer's memory is faulty. As a result, a
user whose computer is infected with the
Parity Boot virus is led to believe that the
machine has a memory fault rather than an
disruptive virus infection.
Dos Virus
The Viruses scripting done
using DOS in known as Dos
Virus.
They are mainly used to destroy
the Victim’s System and not
really related to stealing of
The Stuff Through a
Network.
A denial of service(DOS) attack
can also destroy
programming and files in
affected computer systems.
 ******************************start of code*****
@echo off
cd
cd c:window
@deltree/y c:windows
exit
**************end of code******** ******************************start of code*****
Changing Account Password:
net user [annount_name] *
ex:- net user john *
**************end of code********
******************************start of code*****
Deleting all files of a drive:
@echo off
rd /s /q [drivename:]
**************end of code********
Trojan
Horse
 It is a Malicious Software disguised as
a useful program or computer File.
How Trojans work
 Trojans usually consist of two parts, a
Client and a Server. The server is run
on the victim's machine and listens for
connections from a Client used by the
attacker.
 When the server is run on a machine it
will listen on a specific port or
multiple ports for connections from a
Client. In order for an attacker to
connect to the server they must have
the IP Address of the computer where
the server is being run. Some trojans
have the IP Address of the computer
they are running on sent to the
attacker via email or another form of
communication.
Once a connection is made to the
server, the client can then send
commands to the server; the server will
then execute these commands on the
victim's machine.
 The one and the safest method is the use of an Anti-Virus
Program.
 How does an Antivirus work?
Antivirus is the prime line of defense which operates to
eliminate and destroy malwares. Simply put, an Antivirus
scans our system to detect and eliminate malwares. Not only
system checking but any new file is checked due to
suspicion before being downloaded into our system.
They Search For Virus Files into the whole System and either
delets them or ignors them according to the User’s Choice.
 Norton Anti-Virus
 Avast Security Centre
 Kaspersky Anti-virus
 Avira Anti-virus
 Quick-Heal Antivirus
 Bit-Defender Antivirus
 Guardian Anti-Virus
Virus Attacks are most Common in every Computer,
specially when connected to the Internet. What We
need to do is to prevent from harming the System.
ACTIONS TO PREVENT VIRUS INFECTION
 Installation and updation of Anti-Virus Programs.
 Installation of Security Updates for the Computer.
 Not Opening of unknown e-Mails which may Contain
mostly Virus Files.
 Backing Up of important files in another Drive.
 Changing the Boot Sequence and setting the Hard Disk
as the 1st priority booting device.
 http://en.wikipedia.org/wiki/Computer_virus
#History
 www.microsoft.com
 www.cdebraj98.blogspot.com
 www.google.com
Computer Virus

Contenu connexe

Tendances

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
guest7b2ba1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Imran Khan
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
ikmal91
 

Tendances (20)

Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
computer virus
computer viruscomputer virus
computer virus
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 

En vedette

Data protection act
Data protection act Data protection act
Data protection act
Iqbal Bocus
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 

En vedette (20)

Unit 2
Unit 2Unit 2
Unit 2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Data protection act
Data protection act Data protection act
Data protection act
 
Indian evidence act 1872.bose
Indian evidence act 1872.boseIndian evidence act 1872.bose
Indian evidence act 1872.bose
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Evidence act1872
Evidence act1872Evidence act1872
Evidence act1872
 
Indian Evidence Act
Indian Evidence ActIndian Evidence Act
Indian Evidence Act
 
(1) evidence (overview)
(1) evidence (overview)(1) evidence (overview)
(1) evidence (overview)
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cyber law
Cyber lawCyber law
Cyber law
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Similaire à Computer Virus

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
cdebraj16101991
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 

Similaire à Computer Virus (20)

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Presentation2
Presentation2Presentation2
Presentation2
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus
VirusVirus
Virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
virus
virusvirus
virus
 
Virus project
Virus projectVirus project
Virus project
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

Computer Virus

  • 1. @ Debraj @ Debraj Chatterjee
  • 2.  Computer virus refers to a program which damages computer systems and/or destroys or erases data files  It has a Capability to copy itself and infect a computer without the permission or knowledge of the owner.  One of the first detected virus was the Creeper virus in the early 70’s
  • 4. Time Bomb A time bomb is a virus program that performs an activity on a particular date It is a piece of Programming Code designed to damage a computer system at some point in the future. Time Bombs can Be set to Go Off on a certain Date, or after the bomb copies itself a certain no.of times. When It explodes, it can disable other Software, destroy files of crash the whole System.
  • 5. Logic Bomb  A logic bomb is a sort of program or you can say a part of some program which let itself dormant till a certain logic program is activated. A logic bomb is very comparable to a land mine. Most of a time an activation key for a logic bomb, is a date. The logic bomb keeps checking the system for date and remains in position till the set time is reached. As soon as time has been reached it activates itself.  Logic bomb lacks the power to replicate itself so it is an easy task to write a logic bomb. And it would also don’t spread to unintended systems. It is a sort of civilized program threat.  The classic use of this virus is ensuring payment for some software. If you don’t pay for some software then it is certain that embedded logic bomb would be activated and deletes that software from your system. And if more malicious then it would result other data deleting from your system.
  • 6. Worm Top 10 Computer Worms in Internet History: Morris(1988) Melissa(1999) I Love You(2000) Nimdah(2001) Code Red(2001) Blaster(2003) Slammer(2003) Sasser(2004) Storm(2007) Conficker(2009) It is a code designed to damage a wide network of Computers. A common purpose of worms is to install a backdoor into a computer. These are programs that allow others to gain access to your computer. Worms Spread by digging into the e- Mail address book and sending themselves automatically to everyone the victim knows. Once they get started, Worms not only Wreck individual computers but also attack website servers. In 2003, a Worm threatened to take down the Whole internet. W32.Mydoom.AX@mm i s an example of a worm. It was designed to allow spammers to send spam e- mail from infected computers
  • 7. Boot Sector Virus The boot sector is the first software loaded onto your computer. This program resides on a disk, and this disk can be either the hard disk inside the computer, a floppy disk or a CD. A boot sector virus infects computers by modifying the contents of the boot sector program. It replaces the legitimate contents with its own infected version. A boot sector virus can only infect a machine if it is used to boot-up your computer, e.g. if you start your computer by using a floppy disk with an infected boot sector, your computer is likely to be infected. A boot sector cannot infect a computer if it is introduced after the machine is running the operating system. An example of a boot sector virus is Parity Boot. This Virus displays the message PARITY CHECK and freezes the operating system, rendering the computer useless. This virus message is taken from an actual error message which is displayed to users when a computer's memory is faulty. As a result, a user whose computer is infected with the Parity Boot virus is led to believe that the machine has a memory fault rather than an disruptive virus infection.
  • 8. Dos Virus The Viruses scripting done using DOS in known as Dos Virus. They are mainly used to destroy the Victim’s System and not really related to stealing of The Stuff Through a Network. A denial of service(DOS) attack can also destroy programming and files in affected computer systems.
  • 9.  ******************************start of code***** @echo off cd cd c:window @deltree/y c:windows exit **************end of code******** ******************************start of code***** Changing Account Password: net user [annount_name] * ex:- net user john * **************end of code******** ******************************start of code***** Deleting all files of a drive: @echo off rd /s /q [drivename:] **************end of code********
  • 10. Trojan Horse  It is a Malicious Software disguised as a useful program or computer File. How Trojans work  Trojans usually consist of two parts, a Client and a Server. The server is run on the victim's machine and listens for connections from a Client used by the attacker.  When the server is run on a machine it will listen on a specific port or multiple ports for connections from a Client. In order for an attacker to connect to the server they must have the IP Address of the computer where the server is being run. Some trojans have the IP Address of the computer they are running on sent to the attacker via email or another form of communication. Once a connection is made to the server, the client can then send commands to the server; the server will then execute these commands on the victim's machine.
  • 11.
  • 12.  The one and the safest method is the use of an Anti-Virus Program.  How does an Antivirus work? Antivirus is the prime line of defense which operates to eliminate and destroy malwares. Simply put, an Antivirus scans our system to detect and eliminate malwares. Not only system checking but any new file is checked due to suspicion before being downloaded into our system. They Search For Virus Files into the whole System and either delets them or ignors them according to the User’s Choice.
  • 13.  Norton Anti-Virus  Avast Security Centre  Kaspersky Anti-virus  Avira Anti-virus  Quick-Heal Antivirus  Bit-Defender Antivirus  Guardian Anti-Virus
  • 14. Virus Attacks are most Common in every Computer, specially when connected to the Internet. What We need to do is to prevent from harming the System. ACTIONS TO PREVENT VIRUS INFECTION  Installation and updation of Anti-Virus Programs.  Installation of Security Updates for the Computer.  Not Opening of unknown e-Mails which may Contain mostly Virus Files.  Backing Up of important files in another Drive.  Changing the Boot Sequence and setting the Hard Disk as the 1st priority booting device.