SlideShare une entreprise Scribd logo
1  sur  11
Computer Viruses
And
Hacking
Created By .Bilal Hamid
9-1
Computer Viruses
Computer Virus is a malware
(file/method/software) designed to crash the
operating system and also designed to modify
the computer.
Types Of Viruses
• There are many types of computer viruses
Some are listed below
1. Trojan Horse Viruses
Trojan (Trojan Horse) viruses are the malware
which gain access to operating system and crash
the computer in few days.
2. Win32/Simile Viruses
Win32/Simile is a metamorphic computer
virus written in assembly language for Microsoft
Windows . It affects the executable file.
3. AGI-Plan Viruses
AGI-Plan virus is a virus which finds memory
resident DOS-File and infect it . This way the PC
will crash.
4. Ambulance Virus
Ambulance Virus or Ambulance Car Virus is a virus
which locate for MS-DOS Files , then overwrites in
it.
5. Stoned Virus
It is the part of BOOT SECTOR VIRUS(1987) . This
virus affects only the screen and the pc stoned
How To Protect
1. Use Antivirus Programs
2. Use Firewalls
3. Make Passwords Encrypted
4. Scan your PC Daily
5. Switch off net when not using
6. Use Chrome Explorer for safe download
7. Don’t download software from unknown source
8. Disable Auto run
9. Deploy DNS Protection
10.Download anti-spyware program
How To Make A Virus Using Notepad
Number One- (Harmless Virus)
(Can be DELETED)
Open Notepad And Write
Set oWMP = CreateObject("WMPlayer.OCX.7“
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Save this in notepad as virus.vbs in documents and
after every 2 mins the CD inserted will eject.
Number Two- (Harmful Virus)]
(Can't be DELETED)
Open Notepad And
Write
@echo off
:start
And save as .bat
Double click and your pc will crash
Note : @Echo is the code word for
computer to listen command
Computer Hacking
Hacking is the process of gaining
access to Passwords , Keys ,
Documents , OR accessing the
Computer Files without knowing
owner.
Types Of Hacking
1. Phishing
It is a method to send email and Hack
2. Smishing
It is a method to send messages and Hack
3. Malware
It is a method to download software's without
permission and Hack
How To Protect
1. Use Antivirus Programs
2. Use Firewalls
3. Make Passwords Encrypted
4. Scan your PC Daily
5. Switch off net when not using
6. Use Chrome Explorer for safe download
7. Don’t download software from unknown source
8. Disable Auto run
9. Deploy DNS Protection
10.Download anti-spyware program
THANK YOU
Created By : BILAL
HAMID
Grade : 9-1
A . C . I . S . J

Contenu connexe

Tendances

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
Rakibul islam
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
 

Tendances (20)

Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Virus
Virus  Virus
Virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Similaire à Computer viruses

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
cdebraj16101991
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
NORTHCUSTOMS
 
Nimda Wor Mv2
Nimda Wor Mv2Nimda Wor Mv2
Nimda Wor Mv2
Goaway96
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
Sim_Dhillon
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 

Similaire à Computer viruses (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Virus project
Virus projectVirus project
Virus project
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Nimda Wor Mv2
Nimda Wor Mv2Nimda Wor Mv2
Nimda Wor Mv2
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Malware
MalwareMalware
Malware
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Computer viruses

  • 2. Computer Viruses Computer Virus is a malware (file/method/software) designed to crash the operating system and also designed to modify the computer.
  • 3. Types Of Viruses • There are many types of computer viruses Some are listed below 1. Trojan Horse Viruses Trojan (Trojan Horse) viruses are the malware which gain access to operating system and crash the computer in few days. 2. Win32/Simile Viruses Win32/Simile is a metamorphic computer virus written in assembly language for Microsoft Windows . It affects the executable file.
  • 4. 3. AGI-Plan Viruses AGI-Plan virus is a virus which finds memory resident DOS-File and infect it . This way the PC will crash. 4. Ambulance Virus Ambulance Virus or Ambulance Car Virus is a virus which locate for MS-DOS Files , then overwrites in it. 5. Stoned Virus It is the part of BOOT SECTOR VIRUS(1987) . This virus affects only the screen and the pc stoned
  • 5. How To Protect 1. Use Antivirus Programs 2. Use Firewalls 3. Make Passwords Encrypted 4. Scan your PC Daily 5. Switch off net when not using 6. Use Chrome Explorer for safe download 7. Don’t download software from unknown source 8. Disable Auto run 9. Deploy DNS Protection 10.Download anti-spyware program
  • 6. How To Make A Virus Using Notepad Number One- (Harmless Virus) (Can be DELETED) Open Notepad And Write Set oWMP = CreateObject("WMPlayer.OCX.7“ Set colCDROMs = oWMP.cdromCollection do if colCDROMs.Count >= 1 then For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next End If wscript.sleep 5000 loop Save this in notepad as virus.vbs in documents and after every 2 mins the CD inserted will eject.
  • 7. Number Two- (Harmful Virus)] (Can't be DELETED) Open Notepad And Write @echo off :start And save as .bat Double click and your pc will crash Note : @Echo is the code word for computer to listen command
  • 8. Computer Hacking Hacking is the process of gaining access to Passwords , Keys , Documents , OR accessing the Computer Files without knowing owner.
  • 9. Types Of Hacking 1. Phishing It is a method to send email and Hack 2. Smishing It is a method to send messages and Hack 3. Malware It is a method to download software's without permission and Hack
  • 10. How To Protect 1. Use Antivirus Programs 2. Use Firewalls 3. Make Passwords Encrypted 4. Scan your PC Daily 5. Switch off net when not using 6. Use Chrome Explorer for safe download 7. Don’t download software from unknown source 8. Disable Auto run 9. Deploy DNS Protection 10.Download anti-spyware program
  • 11. THANK YOU Created By : BILAL HAMID Grade : 9-1 A . C . I . S . J