Binisha.pptx

Prepared By :
Binisha Tamang
Shree Rudrayanee Secondary School
Lalitpur, Nepal
A computer virus is a program that can copy
itself and infect a computer without the
permission or knowledge of the user.
 Boot sector virus
 File or Program virus
 Macro virus
 Multipartite virus
 Stealth virus
 Boot sector virus replace or implant themselves
in the boot sector, the area of the hard drive (or
any other disk) accessed when you first turn on
your computer. This kind of virus can prevent
you from being able to boot your hard disk. For
example:
 Danish Boot
 Brain
 Disk killer
 Michelangelo
 File viruses infect application programs. They
may attach themselves to any executable file,
usually .COM and .EXE files. An application
program infector takes control after the initial
use of the infected program For example:
 Acid Rain
 Alien.298
 Crazy A
 Macro viruses are written by using a simplified
macro programming language. These viruses
affect a Microsoft office document created
using MS-Word, MSExcel, MSAccess, etc. The
viruses can spread if the infected document is
open in another computer. For example:
 Melissa
 Word Concept
 Multipartite viruses can infect both application
programs and the boot sector of a disk. They
infect program files and when the infected
program is executed; these viruses infect boot
record. Next time, The virus from the boot
record loads in the memory and then starts
infecting other program files on the disk. For
example:
 Invader
 File
 Tequila
 Stealth viruses actively hide themselves from
antiviral software by either masking the size of
the file that they hide in or temporarily
removing itself from the infected file and
placing a copy of itself in another location on
the drive. For example:
 Frodo
 Joshi
 Whale
 Booting processing becomes slow
 Size of files may be changed
 Location of file may be changed
 Computer gives unnecessary message and
produces sounds
 Internet
 Email
 Infected files
 Infected removable storage devices
 Pirated software
 Programs take a longer time to load. Memory-
resident operations take a lot of time to start.
 A change occurs in dates and time of saved
files.
 Hard disk is suddenly accessed without a
logical reason.
 Viruses increases the use of disk space and
growth in file size. They attach themselves to
many files.
 Unnecessary massages are display on the
monitor.
 Scan downloaded files of the internet before
copying to your computer.
 Use a good antivirus program to scan floppy
disks before copying files. Recommended once
are Total AV, Norton Antivirus and McAfee.
 Do not install pirated software.
 Scan your computer system and removable
storage devices before use.
1 sur 12

Recommandé

Viruses notes1 par
Viruses notes1Viruses notes1
Viruses notes1Dara Corporates
510 vues11 diapositives
Viruses notes par
Viruses notesViruses notes
Viruses notesDara Corporates
13.3K vues11 diapositives
Computer virus par
Computer virusComputer virus
Computer viruskiran_a_c
1.1K vues15 diapositives
Computer viruses and prevention techniques par
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
5.8K vues34 diapositives
Computer viruses by joy chakraborty par
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
1.7K vues9 diapositives
Computer virus par
Computer virusComputer virus
Computer virusdineshrwt911
57 vues22 diapositives

Contenu connexe

Similaire à Binisha.pptx

computer virus Report par
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
10.4K vues16 diapositives
Introductions To Malwares par
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
153 vues40 diapositives
Types of virus and saviour par
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
96 vues21 diapositives
Virus vs anti virus par
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
15.8K vues38 diapositives
Computer viruses par
Computer virusesComputer viruses
Computer virusesaagmansaini
2.6K vues18 diapositives
Viruses par
VirusesViruses
VirusesShahidaffridi
2.1K vues22 diapositives

Similaire à Binisha.pptx(20)

computer virus Report par rawaabdullah
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah10.4K vues
Introductions To Malwares par Cyber Vignan
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan153 vues
Types of virus and saviour par Yastee Shah
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
Yastee Shah96 vues
Virus vs anti virus par Xʎz ʞsɥ
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ15.8K vues
Itc lec 15 Computer security risks par AnzaDar3
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar331 vues
Introduction to Computer Virus par Imtiaz Ahmed
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed3.4K vues
Computer virus (Microsoft Powerpoint) par ainizbahari97
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari9799.4K vues
Computer virus par Goa App
Computer virusComputer virus
Computer virus
Goa App701 vues
Computer Virus par izzul
Computer VirusComputer Virus
Computer Virus
izzul23.6K vues
Computer Viruses- B S Kalyan Chakravarthy par Dipayan Sarkar
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan Chakravarthy
Dipayan Sarkar545 vues

Dernier

information par
informationinformation
informationkhelgishekhar
8 vues4 diapositives
Existing documentaries (1).docx par
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docxMollyBrown86
13 vues5 diapositives
google forms survey (1).pptx par
google forms survey (1).pptxgoogle forms survey (1).pptx
google forms survey (1).pptxMollyBrown86
14 vues10 diapositives
WEB 2.O TOOLS: Empowering education.pptx par
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptxnarmadhamanohar21
16 vues16 diapositives
UiPath Document Understanding_Day 2.pptx par
UiPath Document Understanding_Day 2.pptxUiPath Document Understanding_Day 2.pptx
UiPath Document Understanding_Day 2.pptxRohitRadhakrishnan8
292 vues21 diapositives
We see everywhere that many people are talking about technology.docx par
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docxssuserc5935b
6 vues2 diapositives

Dernier(20)

Existing documentaries (1).docx par MollyBrown86
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docx
MollyBrown8613 vues
google forms survey (1).pptx par MollyBrown86
google forms survey (1).pptxgoogle forms survey (1).pptx
google forms survey (1).pptx
MollyBrown8614 vues
We see everywhere that many people are talking about technology.docx par ssuserc5935b
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docx
ssuserc5935b6 vues
UiPath Document Understanding_Day 3.pptx par UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity101 vues
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf par RIPE NCC
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfIGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
RIPE NCC15 vues
Building trust in our information ecosystem: who do we trust in an emergency par Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat92 vues
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf par RIPE NCC
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfOpportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
RIPE NCC9 vues

Binisha.pptx

  • 1. Prepared By : Binisha Tamang Shree Rudrayanee Secondary School Lalitpur, Nepal
  • 2. A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.
  • 3.  Boot sector virus  File or Program virus  Macro virus  Multipartite virus  Stealth virus
  • 4.  Boot sector virus replace or implant themselves in the boot sector, the area of the hard drive (or any other disk) accessed when you first turn on your computer. This kind of virus can prevent you from being able to boot your hard disk. For example:  Danish Boot  Brain  Disk killer  Michelangelo
  • 5.  File viruses infect application programs. They may attach themselves to any executable file, usually .COM and .EXE files. An application program infector takes control after the initial use of the infected program For example:  Acid Rain  Alien.298  Crazy A
  • 6.  Macro viruses are written by using a simplified macro programming language. These viruses affect a Microsoft office document created using MS-Word, MSExcel, MSAccess, etc. The viruses can spread if the infected document is open in another computer. For example:  Melissa  Word Concept
  • 7.  Multipartite viruses can infect both application programs and the boot sector of a disk. They infect program files and when the infected program is executed; these viruses infect boot record. Next time, The virus from the boot record loads in the memory and then starts infecting other program files on the disk. For example:  Invader  File  Tequila
  • 8.  Stealth viruses actively hide themselves from antiviral software by either masking the size of the file that they hide in or temporarily removing itself from the infected file and placing a copy of itself in another location on the drive. For example:  Frodo  Joshi  Whale
  • 9.  Booting processing becomes slow  Size of files may be changed  Location of file may be changed  Computer gives unnecessary message and produces sounds
  • 10.  Internet  Email  Infected files  Infected removable storage devices  Pirated software
  • 11.  Programs take a longer time to load. Memory- resident operations take a lot of time to start.  A change occurs in dates and time of saved files.  Hard disk is suddenly accessed without a logical reason.  Viruses increases the use of disk space and growth in file size. They attach themselves to many files.  Unnecessary massages are display on the monitor.
  • 12.  Scan downloaded files of the internet before copying to your computer.  Use a good antivirus program to scan floppy disks before copying files. Recommended once are Total AV, Norton Antivirus and McAfee.  Do not install pirated software.  Scan your computer system and removable storage devices before use.