1. College of Management & Computer Science,Yavatmal.
2010-
2011
Presented by :
Mohit Prakash Jaiswal
Computer Viruses
&
Antiviruses
Seminar
On
Guided by :
Nilesh Bhoyar Sir
MCM Final Year
2. Content :
INTRODUCTION
TYPES OF VIRUSES
VIRUSES: WHAT THEY INFECT
ANTI-VIRUS SOFTWARE
SAFE COMPUTING PRACTICES(SAFEHEX)
APPROACHES
ANTI- VIRUS RESEARCH
CONCLUSION
REFERENCE
3. INTRODUCTION
Computer viruses are called viruses because they share some of the traits of
biological viruses. A computer virus passes from computer to computer like a biological virus passes
from person to person.
The person might have a computer virus infection when the computer starts
acting differently. For instance getting slow or when they turn the computer on, it says that all the
data is erased or when they start writing a document, it looks different, some chapters might be
missing or something else abnormal has happened.
4. TYPES OF VIRUSES
1. E-MAIL VIRUSES :Moves around in e-mail messages.
2. WORMS: Computer program that copies itself from machine to machine.
3. TROJAN HORSES: Claims to do one thing, but does something else.
4. BOOT VIRUS : Infect floppy disk boot records or master boot records.
5. 1.E-MAIL VIRUSES :
An e-mail virus moves around in e-mail messages, and usually replicates
itself by automatically mailing itself to dozens of people in the victim's e-mail
address book.
Example : Melissa Virus(March 1999)
6. Open the Options dialog from the Tools menu in
Microsoft Word and make sure that Macro Virus Protection is
enabled. Newer versions of Word allow you to customize the
level of macro protection you use.
7. 2. WORMS :
A worm is a computer program that has the ability to copy itself from
machine to machine. Worms normally move around and infect other machines
through computer networks. Using a network, a worm can expand from a single
copy incredibly quickly.
8. 3. TROJAN HORSES:
A Trojan horse is simply a computer program. The program claims
to do one thing (it may claim to be a game) but instead does damage when you
run it (it may erase your hard disk). Trojan horses have no way to replicate
automatically.
9. 4. BOOT VIRUS :
These viruses infect floppy disk boot records or master boot records in
hard disks. They replace the boot record program (which is responsible for
loading the operating system in memory) copying it elsewhere on the disk or
overwriting it. Boot viruses load into memory if the computer tries to read the disk
while it is booting.
10. VIRUSES: WHAT THEY INFECT
1. System Sector Viruses
2. Macro Viruses
3. Companion Viruses
4. Cluster Viruses
5. Batch File Viruses
6. Source Code Viruses
11. ANTI-VIRUS SOFTWARE
PROTECTION FROM VIRUSES
•Scanning
•Integrity checking
•Interception
•Anti-virus product use guidelines
•Watch out for dangerous file extensions
17. ANTI- VIRUS
RESEARCH
IBM has been preparing a defense against fast spreading viruses
Built the first commercial-grade immune system
Can find, analyze and cure previously unknown viruses
End-to-end security of the system allows the safe
submission of virus samples and ensures
authentication of new virus definitions.
IBMVIRUS ANALYSIS
CENTER
18. There are lots of viruses in the world and new viruses are coming up every
day. There are new anti-virus programs and techniques developed too. It is
good to be aware of viruses and other malware and it is cheaper to protect
you environment from them rather then being sorry. Take Steps to prevent
infection and in case of infection proper and safe ways of dealing with the
infection.
CONCLUSIO
N :