SlideShare une entreprise Scribd logo
1  sur  24
GL

BAL

Institute of Information Technology
A Presentation on
Computer Virus

Group Name:- G3
Group Members :-

Rohitash kumar
Rahul Baghla
Ravikant Verma
Contents

:-

 What is a virus
 Types of virus
 Indications of Virus Attack
 Creating a virus


Protecting from virus



Remove some common virus



Conclusion
What is a virus?
• A computer virus is a computer program that can
copy itself and infect a computer without permission or
knowledge of the user.
• A virus can only spread from one computer to another
when its host is taken to the uninfected computer, for
instance by a user sending it over a network or the
Internet, or by carrying it on a removable medium such
as a floppy disk, CD, or USB drive.
Types of Viruses
 Trojan Horse

 Memory Resident Virus

 Worms

 Root kit Virus

 Boot sector Virus

 Polymorphic Virus

 Macro Virus

 Logic Bombs
What are Trojan Horses ?
• A Trojan horse is a computer program that is hiding a
virus or other potentially damaging program. A
Trojan horse can be a program that purports to do one
action when, in fact, it is performing a malicious
action on your computer. Trojan horses can be
included in software that you download for free or as
attachments in email messages.
What is a Worm?
• A computer worm is a self-replicating computer program.
It uses a network to send copies of itself to other nodes
(computer terminals on the network) and it may do so
without any user intervention.
• Unlike a virus, it does not need to attach itself to an
existing program. Worms almost always cause harm to the
network, if only by consuming bandwidth, whereas viruses
almost always corrupt or modify files on a targeted
computer.
Boot Sector Virus :-

A boot sector virus infects boot
sector of computers. During system boot, boot sector virus is
loaded into main memory and destroys data stored in hard
disk.

Macro Virus :-

Macro viruses are viruses that use another
application's macro programming language to distribute themselves. They
infect documents such as MS Word or MS Excel and are typically spread
to other similar documents.
Memory Resident Virus :-

Memory Resident Viruses reside in a computers
volatile memory (RAM). They are initiated from a virus which runs on the
computer and they stay in memory after it's initiating program closes.

Root kit Virus :A root kit virus is an undetectable virus which
attempts to allow someone to gain control of a computer system. The term
root kit comes from the Linux administrator root user. These viruses are
usually installed by Trojans and are normally disguised as operating
system files.
Polymorphic Virus :Polymorphic viruses contain complex
instructions that enable them to mutate into new and different viruses.
This makes it impossible for anti-viruses to find them using string or
signature searches (because they are different in each encryption). The
virus then goes on creating a large number of copies.

Logic Bombs :Logic bombs are often attached to a working
program but do not replicate. They are only executed when a certain
predefined condition is met. Their objective is to destroy data on the
computer once certain conditions have been met.
Indications of Virus Attack
 Computer runs slower then usual
 Computer no longer boots up
 Screen sometimes flicker
 PC speaker beeps periodically
 System crashes for no reason
 Files/directories sometimes disappear
How To Create a Virus
As we know, Virus is nothing it
is just a program which are created for
malicious purpose. If it occurs in a
system & user is unaware of from it
then it can destroy or damage our
system.
Continued..
Open Notepad and write the following code
@Echo off
Start virus.bat
virus.bat
save it as .bat and run it.
It will hang our computer & we have to shut
down the computer forcibly...
Protection from Virus
 Install reliable anti-virus software
 Update our anti-virus software regularly
 Don't automatically open attachments
 Scan all incoming email attachments
 Delete chain emails and junk email
 Be careful when downloading files from the Internet
Continued…
 Always scan new files for viruses before we use them
 Backup our files on a regular basis
 If our computer is on a network, make sure we have
security steps in place to prevent unauthorized users
putting files on our computer
 Take care using USB flash cards, CDs, zip and floppy
disks
Examples of risky file types :• The following file types should be treated with
suspicion and be confirmed with the sender before
being opened:
– .exe
– .bat
– .vbs
Remove Some Common Viruses
• We can remove some of the common viruses
without help of any antivirus Program.
• e.g.- New Folder.exe
• Autorun.inf ( from PDs etc)
New Folder.exe
• It looks just like an folder but
actually it is a .exe file.
• Try to deleting the file.
• It will delete if you haven’t
executed it, if you’re unable
to delete it.
• Go to Task manager ( by
pressing ctrl+shift+esc )
Continued …
 Go to Process Tab and try
finding that the process for
the exe file and end the
process.
 Then Go to the same folder
containing the exe file and
delete it.
 Then Open Search and try
finding the .exe files of same
size and delete them all.
Removal of Autorun.inf
• Open Run dialog Box. Type in “CMD” press
ENTER.
Continued …
• The Command Prompt will Open Now. In Command
prompt go to the drive containing Autorun.inf
• Now Type In “ attrib –h –s –a” and press enter.
Continued …
• This will remove drives attributes for all Hidden,
System files.
• Now Type “ Del autorun.inf” and press ENTER.
• The Virus has been Successfully Removed.
“It is good to be aware of
viruses rather than being
sorry…..”
Thank You !!

Any Queries ??

Contenu connexe

Tendances (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Virus part2
Virus part2Virus part2
Virus part2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 

En vedette

The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationN V Amruth Varma
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 

En vedette (6)

The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint Presentation
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Similaire à Computer virus

Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | ExplainationBipulok
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 

Similaire à Computer virus (20)

Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Virus project
Virus projectVirus project
Virus project
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virus
VirusVirus
Virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 

Plus de Rahul Baghla

Plus de Rahul Baghla (10)

Holography
HolographyHolography
Holography
 
Sensor technology
Sensor technologySensor technology
Sensor technology
 
Lifi technology
Lifi technologyLifi technology
Lifi technology
 
Hacking
HackingHacking
Hacking
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 

Dernier

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Computer virus

  • 2. A Presentation on Computer Virus Group Name:- G3 Group Members :- Rohitash kumar Rahul Baghla Ravikant Verma
  • 3. Contents :-  What is a virus  Types of virus  Indications of Virus Attack  Creating a virus  Protecting from virus  Remove some common virus  Conclusion
  • 4. What is a virus? • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. • A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 5. Types of Viruses  Trojan Horse  Memory Resident Virus  Worms  Root kit Virus  Boot sector Virus  Polymorphic Virus  Macro Virus  Logic Bombs
  • 6. What are Trojan Horses ? • A Trojan horse is a computer program that is hiding a virus or other potentially damaging program. A Trojan horse can be a program that purports to do one action when, in fact, it is performing a malicious action on your computer. Trojan horses can be included in software that you download for free or as attachments in email messages.
  • 7. What is a Worm? • A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. • Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 8. Boot Sector Virus :- A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk. Macro Virus :- Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.
  • 9. Memory Resident Virus :- Memory Resident Viruses reside in a computers volatile memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes. Root kit Virus :A root kit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term root kit comes from the Linux administrator root user. These viruses are usually installed by Trojans and are normally disguised as operating system files.
  • 10. Polymorphic Virus :Polymorphic viruses contain complex instructions that enable them to mutate into new and different viruses. This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption). The virus then goes on creating a large number of copies. Logic Bombs :Logic bombs are often attached to a working program but do not replicate. They are only executed when a certain predefined condition is met. Their objective is to destroy data on the computer once certain conditions have been met.
  • 11. Indications of Virus Attack  Computer runs slower then usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files/directories sometimes disappear
  • 12. How To Create a Virus As we know, Virus is nothing it is just a program which are created for malicious purpose. If it occurs in a system & user is unaware of from it then it can destroy or damage our system.
  • 13. Continued.. Open Notepad and write the following code @Echo off Start virus.bat virus.bat save it as .bat and run it. It will hang our computer & we have to shut down the computer forcibly...
  • 14. Protection from Virus  Install reliable anti-virus software  Update our anti-virus software regularly  Don't automatically open attachments  Scan all incoming email attachments  Delete chain emails and junk email  Be careful when downloading files from the Internet
  • 15. Continued…  Always scan new files for viruses before we use them  Backup our files on a regular basis  If our computer is on a network, make sure we have security steps in place to prevent unauthorized users putting files on our computer  Take care using USB flash cards, CDs, zip and floppy disks
  • 16. Examples of risky file types :• The following file types should be treated with suspicion and be confirmed with the sender before being opened: – .exe – .bat – .vbs
  • 17. Remove Some Common Viruses • We can remove some of the common viruses without help of any antivirus Program. • e.g.- New Folder.exe • Autorun.inf ( from PDs etc)
  • 18. New Folder.exe • It looks just like an folder but actually it is a .exe file. • Try to deleting the file. • It will delete if you haven’t executed it, if you’re unable to delete it. • Go to Task manager ( by pressing ctrl+shift+esc )
  • 19. Continued …  Go to Process Tab and try finding that the process for the exe file and end the process.  Then Go to the same folder containing the exe file and delete it.  Then Open Search and try finding the .exe files of same size and delete them all.
  • 20. Removal of Autorun.inf • Open Run dialog Box. Type in “CMD” press ENTER.
  • 21. Continued … • The Command Prompt will Open Now. In Command prompt go to the drive containing Autorun.inf • Now Type In “ attrib –h –s –a” and press enter.
  • 22. Continued … • This will remove drives attributes for all Hidden, System files. • Now Type “ Del autorun.inf” and press ENTER. • The Virus has been Successfully Removed.
  • 23. “It is good to be aware of viruses rather than being sorry…..”
  • 24. Thank You !! Any Queries ??