SlideShare une entreprise Scribd logo
1  sur  17
Computer Virus and Antivirus
A presentation by
Rajul jain
X ‘B’
1
Computer virus concept
• Definition of Computer Virus
• Types of Computer Virus
• Causes & Effects of computer Virus
• Prevention &cure of Computer Virus
• Conclusion
2
Computer virus concept
What is Computer Virus?
• Definition -- Virus: A self-replicating piece of computer code that
can partially or fully attach itself to files or applications, and can
cause your computer to do something you don't want it to do.
• Similarities between biological virus (like " HIV " )
and computer virus:
• Need a host for residence.
• Capable of self-replicate
• Cause damage to the host.
• Difference: Computer viruses are created by human.
3
Computer virus concept
Types of Computer Virus
• Resident Viruses
• Direct Action Viruses
• Overwrite Viruses
• Boot-sector Virus
• Macro Virus
• Directory Virus
• Polymorphic Virus
4
Computer virus concept
Virus Characteristics
• Memory Resident:
Loads in memory where it can easily replicate itself into programs of boot
sectors. Most common.
• Non-Resident:
Does not stay in memory after the host program is closed, thus can only
infect while the program is open. Not as common.
• Stealth:
The ability to hide from detection and repair in two ways.
- Virus redirects disk reads to avoid detection.
- Disk directory data is altered to hide the additional bytes of the virus.
5
Computer Virus Concept
Virus Characteristics
• Encrypting:
Technique of hiding by transformation. Virus code converts itself into
cryptic symbols. However, in order to launch (execute) and spread the
virus must decrypt and can then be detected.
• Polymorphic:
Ability to change code segments to look different from one infection to
another. This type of virus is a challenge for ant-virus detection
methods.
6
Computer virus concept
How does computer virus work?
• The Basic Rule: A virus is inactive until the infected program is run or boot
record is read. As the virus is activated, it loads into the computers memory
where it can spread itself.
• Boot Infectors: If the boot code on the drive is infected, the virus will be
loaded into memory on every startup. From memory, the boot virus can
travel to every disk that is read and the infection spreads.
• Program Infectors: When an infected application is run, the virus activates
and is loaded into memory. While the virus is in memory, any program file
subsequently run becomes infected.
7
Causes & Effect of Computer Virus
A computer viruses can infect the program and it
may lead to loss of important data
These viruses are transfers to our data through
any floppy or cd
If any infected file is copy in your system then it
will infect the other files and function too
8
Analyze three common viruses
Macro Virus
• What is Macro virus
• A type of computer virus that is encoded as a macro embedded in a
document.
• According to some estimates, 75% of all viruses today are macro
viruses.
• Once a macro virus gets onto your machine, it can embed itself in all
future documents you create with the application.
• In many cases macro viruses cause no damage to data; but in some
cases malicious macros have been written that can damage your work.
• The first macro virus was discovered in the summer of 1995. Since that
time, other macro viruses have appeared.
9
Analyze three common viruses
Macro Virus
• How does it spread?
• When you share the file with another user, the attached macro or script
goes with the file. Most macro viruses are designed to run, or attack, when
you first open the file. If the file is opened into its related application, the
macro virus is executed and infect other documents.
• The infection process of the macro virus can be triggered by opening a
Microsoft Office document or even Office Application itself, like Word,
Excel. The virus can attempt to avoid detection by changing or disabling the
built-in macro warnings, or by removing menu commands
10
Antivirus Technologies
• How to detect virus?
• How to clean virus?
• Best Practices
11
Antivirus technology
Prevention &cure of Computer Virus
• Some Symptoms
• Program takes longer to load.
• The program size keeps changing.
• The drive light keeps flashing when you are not doing
anything.
• User created files have strange names.
• The computer doesn't remember CMOS settings.
12
Antivirus technology
How to detect virus?
• Use Antivirus Software to scan the computer memory and
disks.
• A memory-resident anti-virus software can be used to
continuously monitor the computer for viruses.
• Scan your hard disk with an anti-virus software. You should
make sure that an up-to-date virus definition data have been
applied.
• Use server-based anti-virus software to protect your
network.
13
Antivirus Technology
How to clean virus?
• All activities on infected machine should be stopped and it
should be detached from the network.
• Recover from backup is the most secure and effective way to
recover the system and files.
• In some cases, you may recover the boot sector, partition table
and even the BIOS data using the emergency recovery disk.
• In case you do not have the latest backup of your files, you
may try to remove the virus using anti-virus software.
14
Antivirus Technology
How to clean virus?
The steps to reinstall the whole system –
1. Reboot the PC using a clean startup disk.
2. Type in MBR to rewrite the Master Boot Record.
3. Format DOS partitions.
4. Reinstall Windows XP or other os and other applications.
5. Install Antivirus Software and apply the latest virus definition
data.
15
Conclusion
• I think we should not use the pc without any
antivirus security as it may cause damage to our
important data
Do not copy or transfer any data or file without
scanning the disk
16
Thank You
17

Contenu connexe

Tendances

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virusKriti kohli
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 

Tendances (20)

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

En vedette

Speech Recognition by Iqbal
Speech Recognition by IqbalSpeech Recognition by Iqbal
Speech Recognition by IqbalIqbal
 
Speech recognition an overview
Speech recognition   an overviewSpeech recognition   an overview
Speech recognition an overviewVarun Jain
 
Speech recognition system seminar
Speech recognition system seminarSpeech recognition system seminar
Speech recognition system seminarDiptimaya Sarangi
 
Speech Recognition Technology
Speech Recognition TechnologySpeech Recognition Technology
Speech Recognition TechnologySeminar Links
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentationhimanshubhatti
 
Artificial intelligence Speech recognition system
Artificial intelligence Speech recognition systemArtificial intelligence Speech recognition system
Artificial intelligence Speech recognition systemREHMAT ULLAH
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognitionCharu Joshi
 
Speech recognition project report
Speech recognition project reportSpeech recognition project report
Speech recognition project reportSarang Afle
 
Automatic speech recognition
Automatic speech recognitionAutomatic speech recognition
Automatic speech recognitionRichie
 
Automatic speech recognition
Automatic speech recognitionAutomatic speech recognition
Automatic speech recognitionboddu syamprasad
 
Automatic speech recognition system
Automatic speech recognition systemAutomatic speech recognition system
Automatic speech recognition systemAlok Tiwari
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYIJCERT
 
Automatic speech recognition
Automatic speech recognitionAutomatic speech recognition
Automatic speech recognitionManthan Gandhi
 
Dev Days, Speech Recognition, LM Aubert
Dev Days, Speech Recognition, LM AubertDev Days, Speech Recognition, LM Aubert
Dev Days, Speech Recognition, LM Aubertaubertlm
 
Viruses summary
Viruses summaryViruses summary
Viruses summaryrhkelso
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkCisco Canada
 
Computer network
Computer network Computer network
Computer network Shreya Shah
 

En vedette (20)

An Introduction To Speech Recognition
An Introduction To Speech RecognitionAn Introduction To Speech Recognition
An Introduction To Speech Recognition
 
Speech Recognition by Iqbal
Speech Recognition by IqbalSpeech Recognition by Iqbal
Speech Recognition by Iqbal
 
Speech recognition an overview
Speech recognition   an overviewSpeech recognition   an overview
Speech recognition an overview
 
Speech recognition system seminar
Speech recognition system seminarSpeech recognition system seminar
Speech recognition system seminar
 
Speech Recognition Technology
Speech Recognition TechnologySpeech Recognition Technology
Speech Recognition Technology
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentation
 
Artificial intelligence Speech recognition system
Artificial intelligence Speech recognition systemArtificial intelligence Speech recognition system
Artificial intelligence Speech recognition system
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognition
 
Speech recognition project report
Speech recognition project reportSpeech recognition project report
Speech recognition project report
 
Automatic speech recognition
Automatic speech recognitionAutomatic speech recognition
Automatic speech recognition
 
Automatic speech recognition
Automatic speech recognitionAutomatic speech recognition
Automatic speech recognition
 
Automatic speech recognition system
Automatic speech recognition systemAutomatic speech recognition system
Automatic speech recognition system
 
Automatic speech recognition
Automatic speech recognitionAutomatic speech recognition
Automatic speech recognition
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEY
 
Automatic speech recognition
Automatic speech recognitionAutomatic speech recognition
Automatic speech recognition
 
Dev Days, Speech Recognition, LM Aubert
Dev Days, Speech Recognition, LM AubertDev Days, Speech Recognition, LM Aubert
Dev Days, Speech Recognition, LM Aubert
 
Viruses summary
Viruses summaryViruses summary
Viruses summary
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your Network
 
Computer network
Computer network Computer network
Computer network
 
Virus
VirusVirus
Virus
 

Similaire à Computer Virus and Antivirus Presentation

Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxsachingwalani24
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasuresprawinrajanIT
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfkd123is123live
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studydilsherece
 

Similaire à Computer Virus and Antivirus Presentation (20)

Anti virus
Anti virusAnti virus
Anti virus
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
 
anti_virus
anti_virusanti_virus
anti_virus
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Dilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_studyDilsher idrees mustafa_6_a_vulnerabilities_study
Dilsher idrees mustafa_6_a_vulnerabilities_study
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Dernier

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Dernier (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Computer Virus and Antivirus Presentation

  • 1. Computer Virus and Antivirus A presentation by Rajul jain X ‘B’ 1
  • 2. Computer virus concept • Definition of Computer Virus • Types of Computer Virus • Causes & Effects of computer Virus • Prevention &cure of Computer Virus • Conclusion 2
  • 3. Computer virus concept What is Computer Virus? • Definition -- Virus: A self-replicating piece of computer code that can partially or fully attach itself to files or applications, and can cause your computer to do something you don't want it to do. • Similarities between biological virus (like " HIV " ) and computer virus: • Need a host for residence. • Capable of self-replicate • Cause damage to the host. • Difference: Computer viruses are created by human. 3
  • 4. Computer virus concept Types of Computer Virus • Resident Viruses • Direct Action Viruses • Overwrite Viruses • Boot-sector Virus • Macro Virus • Directory Virus • Polymorphic Virus 4
  • 5. Computer virus concept Virus Characteristics • Memory Resident: Loads in memory where it can easily replicate itself into programs of boot sectors. Most common. • Non-Resident: Does not stay in memory after the host program is closed, thus can only infect while the program is open. Not as common. • Stealth: The ability to hide from detection and repair in two ways. - Virus redirects disk reads to avoid detection. - Disk directory data is altered to hide the additional bytes of the virus. 5
  • 6. Computer Virus Concept Virus Characteristics • Encrypting: Technique of hiding by transformation. Virus code converts itself into cryptic symbols. However, in order to launch (execute) and spread the virus must decrypt and can then be detected. • Polymorphic: Ability to change code segments to look different from one infection to another. This type of virus is a challenge for ant-virus detection methods. 6
  • 7. Computer virus concept How does computer virus work? • The Basic Rule: A virus is inactive until the infected program is run or boot record is read. As the virus is activated, it loads into the computers memory where it can spread itself. • Boot Infectors: If the boot code on the drive is infected, the virus will be loaded into memory on every startup. From memory, the boot virus can travel to every disk that is read and the infection spreads. • Program Infectors: When an infected application is run, the virus activates and is loaded into memory. While the virus is in memory, any program file subsequently run becomes infected. 7
  • 8. Causes & Effect of Computer Virus A computer viruses can infect the program and it may lead to loss of important data These viruses are transfers to our data through any floppy or cd If any infected file is copy in your system then it will infect the other files and function too 8
  • 9. Analyze three common viruses Macro Virus • What is Macro virus • A type of computer virus that is encoded as a macro embedded in a document. • According to some estimates, 75% of all viruses today are macro viruses. • Once a macro virus gets onto your machine, it can embed itself in all future documents you create with the application. • In many cases macro viruses cause no damage to data; but in some cases malicious macros have been written that can damage your work. • The first macro virus was discovered in the summer of 1995. Since that time, other macro viruses have appeared. 9
  • 10. Analyze three common viruses Macro Virus • How does it spread? • When you share the file with another user, the attached macro or script goes with the file. Most macro viruses are designed to run, or attack, when you first open the file. If the file is opened into its related application, the macro virus is executed and infect other documents. • The infection process of the macro virus can be triggered by opening a Microsoft Office document or even Office Application itself, like Word, Excel. The virus can attempt to avoid detection by changing or disabling the built-in macro warnings, or by removing menu commands 10
  • 11. Antivirus Technologies • How to detect virus? • How to clean virus? • Best Practices 11
  • 12. Antivirus technology Prevention &cure of Computer Virus • Some Symptoms • Program takes longer to load. • The program size keeps changing. • The drive light keeps flashing when you are not doing anything. • User created files have strange names. • The computer doesn't remember CMOS settings. 12
  • 13. Antivirus technology How to detect virus? • Use Antivirus Software to scan the computer memory and disks. • A memory-resident anti-virus software can be used to continuously monitor the computer for viruses. • Scan your hard disk with an anti-virus software. You should make sure that an up-to-date virus definition data have been applied. • Use server-based anti-virus software to protect your network. 13
  • 14. Antivirus Technology How to clean virus? • All activities on infected machine should be stopped and it should be detached from the network. • Recover from backup is the most secure and effective way to recover the system and files. • In some cases, you may recover the boot sector, partition table and even the BIOS data using the emergency recovery disk. • In case you do not have the latest backup of your files, you may try to remove the virus using anti-virus software. 14
  • 15. Antivirus Technology How to clean virus? The steps to reinstall the whole system – 1. Reboot the PC using a clean startup disk. 2. Type in MBR to rewrite the Master Boot Record. 3. Format DOS partitions. 4. Reinstall Windows XP or other os and other applications. 5. Install Antivirus Software and apply the latest virus definition data. 15
  • 16. Conclusion • I think we should not use the pc without any antivirus security as it may cause damage to our important data Do not copy or transfer any data or file without scanning the disk 16