SlideShare une entreprise Scribd logo
1  sur  16
COMPUTER
 *VIRUS *
                  Compiled By:
                      Sanmitha Rao
                       B.Sc 4th sem
  Karnatak Science College Dharwad    1
CONTENTS
   Introduction
   Origin of Viruses
   Symptoms of virus attack
   General Virus Types
   Prevention is the best cure
   Working of antivirus software
   Practice safe Computing



                      Karnatak Science College Dharwad   2
What is a virus?
   Virus is a Computer program like any other
    Program
   It gives Instructions to your computer to do
    the things which you don’t want it to do.
   It spreads.
   It can be destructive.
   It could format your hard drive boot sector
    or delete your files and render your machine
    inoperable.


    Karnatak Science College Dharwad          3
*ORIGIN *
   People normally create viruses by writing a
    code .
   Generally people create viruses just for thrill
    or fun.
   In early days viruses were pieces of code
    attached to a program.
   There are estimated 30,000 viruses, over 300
    viruses are created each month.
   First virus was created to show loopholes in
    software.

                          Karnatak Science College Dharwad   4
Symptoms of Virus attack
   Computer runs slower than usual
   Computer no longer boots up
   Screen sometimes flicker
   PC speaker beeps periodically
   System crashes for no reason
   Files /directories sometimes disappear
   Denial of Service (Dos)



                       Karnatak Science College Dharwad   5
TYPES OF VIRUSES
1.   Boot Sector Virus
2.   Macro Virus
3.   Multipartite Virus
4.   Polymorphic Virus
5.   E-mail Viruses
6.   Worms
7.   Trojan horses etc.




                          Karnatak Science College Dharwad   6
   Traditional Virus
   Infect the boot on floppy disks and hard disks.
   By putting its code in the boot sector virus can guarantee it
    gets executed.
   Load itself into the memory and it is able to run whenever
    the computer is on.




                       Karnatak Science College Dharwad             7
   Written using a simplified programming language
    these viruses can effect your Microsoft applications
    like word and excel
   A document infected with the Macro Virus generally
    modifies a pre-existing commonly used command (such
    as save) to trigger its payload upon execution of that
    command.


                    Karnatak Science College Dharwad     8
   This can infect both your files and boot sector
   It can infect thousands of times to your system
    before it is caught.
   It is a dangerous virus.




                   Karnatak Science College Dharwad   9
   Changes code whenever it passes to
    another machine.



               Karnatak Science College Dharwad   10
   It moves around in the email messages.

   Usually replicates itself by automatically
    mailing itself to the dozens of people in the
    victims e-mail address book.




        Karnatak Science College Dharwad            11
   It has the ability to copy itself from
    machine to machine.
   Eat up storage space and slows down
    the computer.
   Normally move around and infect other
    machine through computer networks.
   But worms don’t alter or delete files.




                      Karnatak Science College Dharwad   12
   It is basically a computer program that
    claims to do one thing, but instead it
    damages the computer.
   It can capture information from your
    system such as user name and password or
    could allow a malicious hacker to remotely
    control your system.
   It has no way to replicate automatically.

                    Karnatak Science College Dharwad   13
PREVENTION IS THE BEST
        CURE
1.   Install a virus protection software.
2.   Run a secure operating system like Unix or NT.
3.   Avoid programs from unknown sources.
4.   Disable floppy disk booting.
5.   Macro virus protection is enabled in all Microsoft
     applications.
6.   Never double click on the attachment that comes as an
     executable that arrives as an email attachment.




               Karnatak Science College Dharwad         14
Working of Antivirus Software
   There are two ways in which a antivirus
    software works-scanning software kooks
    for a virus,scanning software looks for a
    unusual virus.
   For a known virus software will look for a
    virus signature and will zap it from the
    system.
   For an unknown virus the software
    quarantines the questionable program and
    will inform you about what the program
    may be trying to do.

                      Karnatak Science College Dharwad   15
Sanmi's first pp

Contenu connexe

Tendances

Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
cheauyih
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
drewz lin
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
amoY91
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
cdebraj16101991
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
makanaya
 

Tendances (20)

Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Antivirus
AntivirusAntivirus
Antivirus
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Viruses
VirusesViruses
Viruses
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24
 
Anti virus
Anti virusAnti virus
Anti virus
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
virus
virusvirus
virus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 

Similaire à Sanmi's first pp

Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
ILAKIA
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 

Similaire à Sanmi's first pp (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Virus
VirusVirus
Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Virus project
Virus projectVirus project
Virus project
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
viruses
virusesviruses
viruses
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus
VirusVirus
Virus
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computervirus
Computervirus Computervirus
Computervirus
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 

Dernier

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Dernier (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 

Sanmi's first pp

  • 1. COMPUTER *VIRUS * Compiled By: Sanmitha Rao B.Sc 4th sem Karnatak Science College Dharwad 1
  • 2. CONTENTS  Introduction  Origin of Viruses  Symptoms of virus attack  General Virus Types  Prevention is the best cure  Working of antivirus software  Practice safe Computing Karnatak Science College Dharwad 2
  • 3. What is a virus?  Virus is a Computer program like any other Program  It gives Instructions to your computer to do the things which you don’t want it to do.  It spreads.  It can be destructive.  It could format your hard drive boot sector or delete your files and render your machine inoperable. Karnatak Science College Dharwad 3
  • 4. *ORIGIN *  People normally create viruses by writing a code .  Generally people create viruses just for thrill or fun.  In early days viruses were pieces of code attached to a program.  There are estimated 30,000 viruses, over 300 viruses are created each month.  First virus was created to show loopholes in software. Karnatak Science College Dharwad 4
  • 5. Symptoms of Virus attack  Computer runs slower than usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files /directories sometimes disappear  Denial of Service (Dos) Karnatak Science College Dharwad 5
  • 6. TYPES OF VIRUSES 1. Boot Sector Virus 2. Macro Virus 3. Multipartite Virus 4. Polymorphic Virus 5. E-mail Viruses 6. Worms 7. Trojan horses etc. Karnatak Science College Dharwad 6
  • 7. Traditional Virus  Infect the boot on floppy disks and hard disks.  By putting its code in the boot sector virus can guarantee it gets executed.  Load itself into the memory and it is able to run whenever the computer is on. Karnatak Science College Dharwad 7
  • 8. Written using a simplified programming language these viruses can effect your Microsoft applications like word and excel  A document infected with the Macro Virus generally modifies a pre-existing commonly used command (such as save) to trigger its payload upon execution of that command. Karnatak Science College Dharwad 8
  • 9. This can infect both your files and boot sector  It can infect thousands of times to your system before it is caught.  It is a dangerous virus. Karnatak Science College Dharwad 9
  • 10. Changes code whenever it passes to another machine. Karnatak Science College Dharwad 10
  • 11. It moves around in the email messages.  Usually replicates itself by automatically mailing itself to the dozens of people in the victims e-mail address book. Karnatak Science College Dharwad 11
  • 12. It has the ability to copy itself from machine to machine.  Eat up storage space and slows down the computer.  Normally move around and infect other machine through computer networks.  But worms don’t alter or delete files. Karnatak Science College Dharwad 12
  • 13. It is basically a computer program that claims to do one thing, but instead it damages the computer.  It can capture information from your system such as user name and password or could allow a malicious hacker to remotely control your system.  It has no way to replicate automatically. Karnatak Science College Dharwad 13
  • 14. PREVENTION IS THE BEST CURE 1. Install a virus protection software. 2. Run a secure operating system like Unix or NT. 3. Avoid programs from unknown sources. 4. Disable floppy disk booting. 5. Macro virus protection is enabled in all Microsoft applications. 6. Never double click on the attachment that comes as an executable that arrives as an email attachment. Karnatak Science College Dharwad 14
  • 15. Working of Antivirus Software  There are two ways in which a antivirus software works-scanning software kooks for a virus,scanning software looks for a unusual virus.  For a known virus software will look for a virus signature and will zap it from the system.  For an unknown virus the software quarantines the questionable program and will inform you about what the program may be trying to do. Karnatak Science College Dharwad 15