SlideShare une entreprise Scribd logo
1  sur  16
~Computer Virus~

The things you MUST know


                    Brought to You By
                    Sumanta Majumdar
                  Dept. Of Electrical Engg.
                        2010,GNIT




   http://powerpointpresentationon.blogspot.com/
Introduction
         • About Virus
• Computer virus have become
  today’s headline news.

 • With the increasing use of the
internet, it has become easier for
virus to spread.

• Virus show us loopholes in
  software.

• Most virus are targeted at the MS
  Windows OS
~ Classifying
                            Computer Virus ~
•   A program designed to attach       •   File Virus: A computer virus that
    itself to a file, reproduce, and       infects executable files, that is
                                           programs with exe filename
    spread from one file to                extensions
    another, destroying data,          •   Payload: The disruptive
    displaying an irritating               instructions or message delivered
    message, or otherwise                  by a computer virus. Payloads can
    disrupting computer                    range from just being annoying to
    operations.                            destroying data and files on a
                                           computer system.
                                       •   Boot Sector Virus: A computer
                                           virus that infects the sectors on a
                                           disk that contain the data a
                                           computer uses during the boot
                                           process. The virus spreads every
                                           time the infected disk is in the
                                           computer when it boots.
                                       •   Macro Virus: A computer virus
                                           that infects the macros that are
                                           attached to documents and
                                           spreadsheets.
                                       •   Trojan Horse: A computer
                                           program that appears to perform
                                           one function while actually doing
                                           something else, such as inserting a
* Virus through the
        Internet *

Today almost 87% of all viruses
are spread through the internet.
Transmission time to a new host
  is relatively low, on the order
          of hours to days
           “Latent virus”
Symptoms of Virus Attack
•   Computer no longer boots up.
•   Screen sometimes flicker.
•   Computer runs slower then usual.
•   PC speaker beeps periodically.
•   System crashes for no reason.
•   Files/directories sometimes disappear.
•   Denial of service (dos)….. & Many More.
~Computer Virus~
                        How They Spread
•   A virus runs first when a legitimate        •   Unfortunately, the virus has now
    program is executed.                            reproduced itself, so two programs
•   The virus loads itself into memory              are infected.
    and looks to see if it can find any         •   The next time either of those
    other programs on the disk.                     programs gets executed, they infect
•   If it can find one, it modifies it to add       other programs, and the cycle
    the virus's code to the new program.            continues.
•   Then the virus launches the "real           •   When the infected program
    program“.                                        o is distributed by
•   The user has no way to know that                       floppy disk
    the virus ever ran.                                    uploaded to a bulletin board
                                                           zipped and delivered as an
                                                            executable.

                                                •   then other programs get infected.
~Computer Virus~
How To Prevent Them
• Security features keep viruses away.
• Buy virus protection software.
• Avoid programs from unknown sources (like
  the Internet).
• Stick with commercial software purchased on
  CDs.
~Computer Virus~
         How To Prevent Them
• With E-mail viruses
  o   defense is personal discipline
        Never double-click on an attachment that contains
         an executable program
        Attachments that come in as
          Word files (.DOC), spreadsheets (.XLS), images (.GIF
           and .JPG), etc., are data files
          and they can do no damage
~Computer Virus~
            How To Prevent Them
• Don’t victimize yourself
  o   learn where to find legitimate information on
      hoaxes, myths etc.
        do not forward warnings if you haven’t personally
         checked them out!
~Computer Virus~
   How To Prevent Them
Don’t fall for the
• "False Authority Syndrome”
   o   Most people who claim to speak with authority
       about computer viruses have little or no genuine
       expertise.
         The person feels competent to discuss viruses because of
            his job title,
            because of expertise in another computer field,
            simply because he knows how to use a computer.
~Computer Virus~
How To Prevent Them
• E-mail is clearly the predominant vulnerability
  point for viruses
  o   Current viruses are spread via security holes in
      Microsoft Outlook and Outlook Express
        Free patches are available from Microsoft to address these
         problems
           many people are reluctant to apply them.
• First, update your system with Windows Update
  and Office Update
  o   or, buy a Mac
• Buy virus protection software
~Computer Virus~
 How To Scan?
~Computer Virus~
Anti-Virus Is Scanning
~Computer Virus~
Finding Out A Virus
Computer Virus
            • Acknowledgement
• My special thanks goes to Sri Supriyo Ghosh
  (Dept. of BCA,Techno India, Sec. V) for
  helping & suggesting me about different kind
  of computer viruses & their characteristics.
Computer Virus
• Be Original Kill Piracy.

Contenu connexe

Tendances (20)

Virus project
Virus projectVirus project
Virus project
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Virusppt
ViruspptVirusppt
Virusppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus
VirusVirus
Virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
viruses
virusesviruses
viruses
 

Similaire à Computer virus_the_things_u_must_know_

Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus workschinmay kelkar
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxglainAE
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their typesNeha Kurale
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 

Similaire à Computer virus_the_things_u_must_know_ (20)

Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Proyecto7
Proyecto7Proyecto7
Proyecto7
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Malicious
MaliciousMalicious
Malicious
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 

Dernier

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 

Dernier (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Computer virus_the_things_u_must_know_

  • 1. ~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT http://powerpointpresentationon.blogspot.com/
  • 2. Introduction • About Virus • Computer virus have become today’s headline news. • With the increasing use of the internet, it has become easier for virus to spread. • Virus show us loopholes in software. • Most virus are targeted at the MS Windows OS
  • 3. ~ Classifying Computer Virus ~ • A program designed to attach • File Virus: A computer virus that itself to a file, reproduce, and infects executable files, that is programs with exe filename spread from one file to extensions another, destroying data, • Payload: The disruptive displaying an irritating instructions or message delivered message, or otherwise by a computer virus. Payloads can disrupting computer range from just being annoying to operations. destroying data and files on a computer system. • Boot Sector Virus: A computer virus that infects the sectors on a disk that contain the data a computer uses during the boot process. The virus spreads every time the infected disk is in the computer when it boots. • Macro Virus: A computer virus that infects the macros that are attached to documents and spreadsheets. • Trojan Horse: A computer program that appears to perform one function while actually doing something else, such as inserting a
  • 4. * Virus through the Internet * Today almost 87% of all viruses are spread through the internet. Transmission time to a new host is relatively low, on the order of hours to days “Latent virus”
  • 5. Symptoms of Virus Attack • Computer no longer boots up. • Screen sometimes flicker. • Computer runs slower then usual. • PC speaker beeps periodically. • System crashes for no reason. • Files/directories sometimes disappear. • Denial of service (dos)….. & Many More.
  • 6. ~Computer Virus~ How They Spread • A virus runs first when a legitimate • Unfortunately, the virus has now program is executed. reproduced itself, so two programs • The virus loads itself into memory are infected. and looks to see if it can find any • The next time either of those other programs on the disk. programs gets executed, they infect • If it can find one, it modifies it to add other programs, and the cycle the virus's code to the new program. continues. • Then the virus launches the "real • When the infected program program“. o is distributed by • The user has no way to know that  floppy disk the virus ever ran.  uploaded to a bulletin board  zipped and delivered as an executable. • then other programs get infected.
  • 7. ~Computer Virus~ How To Prevent Them • Security features keep viruses away. • Buy virus protection software. • Avoid programs from unknown sources (like the Internet). • Stick with commercial software purchased on CDs.
  • 8. ~Computer Virus~ How To Prevent Them • With E-mail viruses o defense is personal discipline  Never double-click on an attachment that contains an executable program  Attachments that come in as  Word files (.DOC), spreadsheets (.XLS), images (.GIF and .JPG), etc., are data files  and they can do no damage
  • 9. ~Computer Virus~ How To Prevent Them • Don’t victimize yourself o learn where to find legitimate information on hoaxes, myths etc.  do not forward warnings if you haven’t personally checked them out!
  • 10. ~Computer Virus~ How To Prevent Them Don’t fall for the • "False Authority Syndrome” o Most people who claim to speak with authority about computer viruses have little or no genuine expertise.  The person feels competent to discuss viruses because of  his job title,  because of expertise in another computer field,  simply because he knows how to use a computer.
  • 11. ~Computer Virus~ How To Prevent Them • E-mail is clearly the predominant vulnerability point for viruses o Current viruses are spread via security holes in Microsoft Outlook and Outlook Express  Free patches are available from Microsoft to address these problems  many people are reluctant to apply them. • First, update your system with Windows Update and Office Update o or, buy a Mac • Buy virus protection software
  • 15. Computer Virus • Acknowledgement • My special thanks goes to Sri Supriyo Ghosh (Dept. of BCA,Techno India, Sec. V) for helping & suggesting me about different kind of computer viruses & their characteristics.
  • 16. Computer Virus • Be Original Kill Piracy.