SlideShare a Scribd company logo
1 of 15
COMPUTERVIRUS
What is computer virus?
Computer virus refers to a
program which damages
computer systems and/or
destroys or erases data files.
Types of Computer Virus
• Boot SectorVirus
• Program virus
• Macro viruses
Boot Sector Virus
 This type of virus affects the boot
sector of a hard disk.
 This is a crucial part of the disk, in
which information of the disk itself is
stored along with a program that
makes it possible to boot (start) the
computer from the disk.
Program virus
 These viruses infects program files
which have extensions such as
.COM,.EXE,.SYS,.DLL,.OVL or.SCR .
 Program files are attractive targets
for computer virus because they are
widely used and have relativity
,simple formats to which viruses can
attach themselves.
Macro viruses
 Macro viruses as the name implies, will
infect files of programs that use macros
in the program itself.The most common
of these are the Microsoft Office files
created in Excel spreadsheets, Word
documents, Access databases,
PowerPoint presentations and these type
of files from AmiPro and Corel Draw and
others.
What a computer virus do?
 A virus tries to take control of computer
system it has infected at the first opportunity
available.
 It makes copies of itself and also try to carry
harmful task written in its program.
 This process can happen so quickly that the
user is not even aware of the presence of a
virus in his/her computer.
Best antivirus software
 Norton antivirus.
 McAfee virus scan
 Kaspersky antivirus
 Avast Antivirus
 Panda Cloud Antivirus
 Avira Antivirus
Norton antivirus
 Norton antivirus is a product of Symantec
corporation founded in 1982.
 Norton check the following program
• Boot records
• Programs(at the time you used them)
• All local hard drives,
• Files download from internet,
• USBs (when in use)
MacAfee virus scan
 McAfee Inc. is an antivirus software
headquartered in Santa Clara, California.
 The company was founded in 1987 as McAfee
Associates, named for its founder John
McAfee who resigned from the company in
1994.
 In February 28, 2011, McAfee is wholly
owned subsidiary of Intel.
Kaspersky antivirus
 KasperskyAnti-Virus is an antivirus program
developed by Kaspersky Lab
 It is designed to protect user
from malware and is primarily designed for
computers running Microsoft
Windows and Mac OS X
 KasperskyAnti-Virus features include real-
time protection, detection and removal
of viruses,trojans,worms
Avast Antivirus
 Avast is a freemium antivirus computer
program available to Microsoft
Windows, Mac OS X and Linux users, with
a user interface available in 41 languages.
 AVAST Software has headquartered
in Prague, Czech Republic, with offices
in Linz, Austria, Germany and San Mateo,
California
Panda Cloud Antivirus
 Panda Cloud Antivirus is antivirus software
by Panda Security which are available in a
free and a paid version
 According to Panda Security, Panda Cloud
Antivirus is able to detect viruses,Trojans,
worms, spyware, dialers, hacking tools, jokes
and other security risks.
Avira Antivirus
 Over 100 million customers,Avira is
considered the sixth largest antivirus vendor
worldwide.
 Avira periodically "cleans out" the virus
definition files, by replacing specific
signatures with generic ones, resulting in a
general increase in performance and
scanning speed.
Presented by:
Neeraj Bhandari
Kishan Sarraf

More Related Content

What's hot (20)

Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Virus
VirusVirus
Virus
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Antivirus
AntivirusAntivirus
Antivirus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 

Similar to Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )

Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................vndoon
 
virus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdfvirus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdfSamiAAli44
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.QuratNaeem
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
computer virus, presented by Carin Maharjan
computer virus, presented by Carin Maharjancomputer virus, presented by Carin Maharjan
computer virus, presented by Carin MaharjanSuvamMaharjan1
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 

Similar to Computer Virus by Neeraj Bhandari ( Surkhet.Nepal ) (20)

Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................
 
virus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdfvirus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdf
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
computer virus, presented by Carin Maharjan
computer virus, presented by Carin Maharjancomputer virus, presented by Carin Maharjan
computer virus, presented by Carin Maharjan
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 

More from Neeraj Bhandari

Dividend tax by Neeraj Bhandari (Surkhet, Nepal)
Dividend tax by Neeraj Bhandari (Surkhet, Nepal)Dividend tax by Neeraj Bhandari (Surkhet, Nepal)
Dividend tax by Neeraj Bhandari (Surkhet, Nepal)Neeraj Bhandari
 
Summer Internship Report Project - NIC ASIA BANK Nepal by Neeraj Bhandari (Su...
Summer Internship Report Project - NIC ASIA BANK Nepal by Neeraj Bhandari (Su...Summer Internship Report Project - NIC ASIA BANK Nepal by Neeraj Bhandari (Su...
Summer Internship Report Project - NIC ASIA BANK Nepal by Neeraj Bhandari (Su...Neeraj Bhandari
 
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)Neeraj Bhandari
 
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)Neeraj Bhandari
 
Retail Management by Neeraj Bhandari (Surkhet, Nepal)
Retail Management by Neeraj Bhandari (Surkhet, Nepal)Retail Management by Neeraj Bhandari (Surkhet, Nepal)
Retail Management by Neeraj Bhandari (Surkhet, Nepal)Neeraj Bhandari
 
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet, Nepal)
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet, Nepal)Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet, Nepal)
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet, Nepal)Neeraj Bhandari
 
Introduction to Body Language by Neeraj Bhandari (Surkhet, Nepal)
Introduction to Body Language by Neeraj Bhandari (Surkhet, Nepal)Introduction to Body Language by Neeraj Bhandari (Surkhet, Nepal)
Introduction to Body Language by Neeraj Bhandari (Surkhet, Nepal)Neeraj Bhandari
 
Importance of Communication in Business by Neeraj Bhandari (Surkhet, Nepal)
Importance of Communication in Business by Neeraj Bhandari (Surkhet, Nepal)Importance of Communication in Business by Neeraj Bhandari (Surkhet, Nepal)
Importance of Communication in Business by Neeraj Bhandari (Surkhet, Nepal)Neeraj Bhandari
 
Introduction to Planning by Neeraj Bhandari (Surkhet,Nepal)
Introduction to Planning by Neeraj Bhandari (Surkhet,Nepal)Introduction to Planning by Neeraj Bhandari (Surkhet,Nepal)
Introduction to Planning by Neeraj Bhandari (Surkhet,Nepal)Neeraj Bhandari
 
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)Neeraj Bhandari
 
Project Report on Bajaj and Hero Honda by Neeraj Bhandari (Surkhet,Nepal)
Project Report on Bajaj and Hero Honda by Neeraj Bhandari (Surkhet,Nepal)Project Report on Bajaj and Hero Honda by Neeraj Bhandari (Surkhet,Nepal)
Project Report on Bajaj and Hero Honda by Neeraj Bhandari (Surkhet,Nepal)Neeraj Bhandari
 
Body Languagge by Neeraj Bhandari (Surkhet,Nepal)
Body Languagge by Neeraj Bhandari (Surkhet,Nepal)Body Languagge by Neeraj Bhandari (Surkhet,Nepal)
Body Languagge by Neeraj Bhandari (Surkhet,Nepal)Neeraj Bhandari
 
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet,Nepal)
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet,Nepal)Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet,Nepal)
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet,Nepal)Neeraj Bhandari
 
Office Etiquette by Neeraj Bhandari (Surkhet,Nepal)
Office Etiquette by Neeraj Bhandari (Surkhet,Nepal)Office Etiquette by Neeraj Bhandari (Surkhet,Nepal)
Office Etiquette by Neeraj Bhandari (Surkhet,Nepal)Neeraj Bhandari
 
Business Plan by Neeraj Bhandari (Surkhet,Nepal)
Business Plan by Neeraj Bhandari (Surkhet,Nepal)Business Plan by Neeraj Bhandari (Surkhet,Nepal)
Business Plan by Neeraj Bhandari (Surkhet,Nepal)Neeraj Bhandari
 
Organizational Structure by Neeraj Bhandari (Surkhet,Nepal)
Organizational Structure by Neeraj Bhandari (Surkhet,Nepal)Organizational Structure by Neeraj Bhandari (Surkhet,Nepal)
Organizational Structure by Neeraj Bhandari (Surkhet,Nepal)Neeraj Bhandari
 
Print Marketing by Neeraj Bhandari (Surkhet,Nepal)
Print Marketing by Neeraj Bhandari (Surkhet,Nepal)Print Marketing by Neeraj Bhandari (Surkhet,Nepal)
Print Marketing by Neeraj Bhandari (Surkhet,Nepal)Neeraj Bhandari
 
Retail Management by Neeraj bhandari (Surkhet Nepal)
Retail Management by Neeraj bhandari (Surkhet Nepal)Retail Management by Neeraj bhandari (Surkhet Nepal)
Retail Management by Neeraj bhandari (Surkhet Nepal)Neeraj Bhandari
 
International Trade and Policy- Introduction by Neeraj Bhandari (Surkhet Nepal)
International Trade and Policy- Introduction by Neeraj Bhandari (Surkhet Nepal)International Trade and Policy- Introduction by Neeraj Bhandari (Surkhet Nepal)
International Trade and Policy- Introduction by Neeraj Bhandari (Surkhet Nepal)Neeraj Bhandari
 
NBFCs and Cooperative Banks by Neeraj Bhandari (Surkhet Nepal)
NBFCs and Cooperative Banks by Neeraj Bhandari (Surkhet Nepal)NBFCs and Cooperative Banks by Neeraj Bhandari (Surkhet Nepal)
NBFCs and Cooperative Banks by Neeraj Bhandari (Surkhet Nepal)Neeraj Bhandari
 

More from Neeraj Bhandari (20)

Dividend tax by Neeraj Bhandari (Surkhet, Nepal)
Dividend tax by Neeraj Bhandari (Surkhet, Nepal)Dividend tax by Neeraj Bhandari (Surkhet, Nepal)
Dividend tax by Neeraj Bhandari (Surkhet, Nepal)
 
Summer Internship Report Project - NIC ASIA BANK Nepal by Neeraj Bhandari (Su...
Summer Internship Report Project - NIC ASIA BANK Nepal by Neeraj Bhandari (Su...Summer Internship Report Project - NIC ASIA BANK Nepal by Neeraj Bhandari (Su...
Summer Internship Report Project - NIC ASIA BANK Nepal by Neeraj Bhandari (Su...
 
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)
 
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)
Introducing Nepal by Neeraj Bhandari (Surkhet Nepal)
 
Retail Management by Neeraj Bhandari (Surkhet, Nepal)
Retail Management by Neeraj Bhandari (Surkhet, Nepal)Retail Management by Neeraj Bhandari (Surkhet, Nepal)
Retail Management by Neeraj Bhandari (Surkhet, Nepal)
 
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet, Nepal)
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet, Nepal)Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet, Nepal)
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet, Nepal)
 
Introduction to Body Language by Neeraj Bhandari (Surkhet, Nepal)
Introduction to Body Language by Neeraj Bhandari (Surkhet, Nepal)Introduction to Body Language by Neeraj Bhandari (Surkhet, Nepal)
Introduction to Body Language by Neeraj Bhandari (Surkhet, Nepal)
 
Importance of Communication in Business by Neeraj Bhandari (Surkhet, Nepal)
Importance of Communication in Business by Neeraj Bhandari (Surkhet, Nepal)Importance of Communication in Business by Neeraj Bhandari (Surkhet, Nepal)
Importance of Communication in Business by Neeraj Bhandari (Surkhet, Nepal)
 
Introduction to Planning by Neeraj Bhandari (Surkhet,Nepal)
Introduction to Planning by Neeraj Bhandari (Surkhet,Nepal)Introduction to Planning by Neeraj Bhandari (Surkhet,Nepal)
Introduction to Planning by Neeraj Bhandari (Surkhet,Nepal)
 
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)
 
Project Report on Bajaj and Hero Honda by Neeraj Bhandari (Surkhet,Nepal)
Project Report on Bajaj and Hero Honda by Neeraj Bhandari (Surkhet,Nepal)Project Report on Bajaj and Hero Honda by Neeraj Bhandari (Surkhet,Nepal)
Project Report on Bajaj and Hero Honda by Neeraj Bhandari (Surkhet,Nepal)
 
Body Languagge by Neeraj Bhandari (Surkhet,Nepal)
Body Languagge by Neeraj Bhandari (Surkhet,Nepal)Body Languagge by Neeraj Bhandari (Surkhet,Nepal)
Body Languagge by Neeraj Bhandari (Surkhet,Nepal)
 
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet,Nepal)
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet,Nepal)Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet,Nepal)
Entrepreneurial Barriers and Challenges by Neeraj Bhandari (Surkhet,Nepal)
 
Office Etiquette by Neeraj Bhandari (Surkhet,Nepal)
Office Etiquette by Neeraj Bhandari (Surkhet,Nepal)Office Etiquette by Neeraj Bhandari (Surkhet,Nepal)
Office Etiquette by Neeraj Bhandari (Surkhet,Nepal)
 
Business Plan by Neeraj Bhandari (Surkhet,Nepal)
Business Plan by Neeraj Bhandari (Surkhet,Nepal)Business Plan by Neeraj Bhandari (Surkhet,Nepal)
Business Plan by Neeraj Bhandari (Surkhet,Nepal)
 
Organizational Structure by Neeraj Bhandari (Surkhet,Nepal)
Organizational Structure by Neeraj Bhandari (Surkhet,Nepal)Organizational Structure by Neeraj Bhandari (Surkhet,Nepal)
Organizational Structure by Neeraj Bhandari (Surkhet,Nepal)
 
Print Marketing by Neeraj Bhandari (Surkhet,Nepal)
Print Marketing by Neeraj Bhandari (Surkhet,Nepal)Print Marketing by Neeraj Bhandari (Surkhet,Nepal)
Print Marketing by Neeraj Bhandari (Surkhet,Nepal)
 
Retail Management by Neeraj bhandari (Surkhet Nepal)
Retail Management by Neeraj bhandari (Surkhet Nepal)Retail Management by Neeraj bhandari (Surkhet Nepal)
Retail Management by Neeraj bhandari (Surkhet Nepal)
 
International Trade and Policy- Introduction by Neeraj Bhandari (Surkhet Nepal)
International Trade and Policy- Introduction by Neeraj Bhandari (Surkhet Nepal)International Trade and Policy- Introduction by Neeraj Bhandari (Surkhet Nepal)
International Trade and Policy- Introduction by Neeraj Bhandari (Surkhet Nepal)
 
NBFCs and Cooperative Banks by Neeraj Bhandari (Surkhet Nepal)
NBFCs and Cooperative Banks by Neeraj Bhandari (Surkhet Nepal)NBFCs and Cooperative Banks by Neeraj Bhandari (Surkhet Nepal)
NBFCs and Cooperative Banks by Neeraj Bhandari (Surkhet Nepal)
 

Recently uploaded

Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 

Recently uploaded (20)

Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 

Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )

  • 2. What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
  • 3. Types of Computer Virus • Boot SectorVirus • Program virus • Macro viruses
  • 4. Boot Sector Virus  This type of virus affects the boot sector of a hard disk.  This is a crucial part of the disk, in which information of the disk itself is stored along with a program that makes it possible to boot (start) the computer from the disk.
  • 5. Program virus  These viruses infects program files which have extensions such as .COM,.EXE,.SYS,.DLL,.OVL or.SCR .  Program files are attractive targets for computer virus because they are widely used and have relativity ,simple formats to which viruses can attach themselves.
  • 6. Macro viruses  Macro viruses as the name implies, will infect files of programs that use macros in the program itself.The most common of these are the Microsoft Office files created in Excel spreadsheets, Word documents, Access databases, PowerPoint presentations and these type of files from AmiPro and Corel Draw and others.
  • 7. What a computer virus do?  A virus tries to take control of computer system it has infected at the first opportunity available.  It makes copies of itself and also try to carry harmful task written in its program.  This process can happen so quickly that the user is not even aware of the presence of a virus in his/her computer.
  • 8. Best antivirus software  Norton antivirus.  McAfee virus scan  Kaspersky antivirus  Avast Antivirus  Panda Cloud Antivirus  Avira Antivirus
  • 9. Norton antivirus  Norton antivirus is a product of Symantec corporation founded in 1982.  Norton check the following program • Boot records • Programs(at the time you used them) • All local hard drives, • Files download from internet, • USBs (when in use)
  • 10. MacAfee virus scan  McAfee Inc. is an antivirus software headquartered in Santa Clara, California.  The company was founded in 1987 as McAfee Associates, named for its founder John McAfee who resigned from the company in 1994.  In February 28, 2011, McAfee is wholly owned subsidiary of Intel.
  • 11. Kaspersky antivirus  KasperskyAnti-Virus is an antivirus program developed by Kaspersky Lab  It is designed to protect user from malware and is primarily designed for computers running Microsoft Windows and Mac OS X  KasperskyAnti-Virus features include real- time protection, detection and removal of viruses,trojans,worms
  • 12. Avast Antivirus  Avast is a freemium antivirus computer program available to Microsoft Windows, Mac OS X and Linux users, with a user interface available in 41 languages.  AVAST Software has headquartered in Prague, Czech Republic, with offices in Linz, Austria, Germany and San Mateo, California
  • 13. Panda Cloud Antivirus  Panda Cloud Antivirus is antivirus software by Panda Security which are available in a free and a paid version  According to Panda Security, Panda Cloud Antivirus is able to detect viruses,Trojans, worms, spyware, dialers, hacking tools, jokes and other security risks.
  • 14. Avira Antivirus  Over 100 million customers,Avira is considered the sixth largest antivirus vendor worldwide.  Avira periodically "cleans out" the virus definition files, by replacing specific signatures with generic ones, resulting in a general increase in performance and scanning speed.