SlideShare une entreprise Scribd logo
1  sur  11
1. DEFINITION OF COMPUTER VIRUS
2. TYPES OF COMPUTER VIRUSES
3. EXPLANATION OF COMPUTER VIRUSES
4. DEFINITION OF COMPUTER ANTI-VIRUS
5. TYPES OF COMPUTER ANTI-VIRUSES
6. EXPLANATION OF ANTI-VIRUSES
7. TOP FIVE COMPUTER ANTI-VIRUSES
A computer virus has been defined as a set of
computer instructions that reproduces
itself and it may attach to other executable
code.
Usually this code is a short program that
may either embed in other code or stand on
it's own.
In essence, this computer program is
designed to infect some aspect of the host
computer and then copy itself as much and
as often as it has the chance.
COMPUTER
VIRUSES
BOOT
SECTO
R
VIRUS

FILE
INFECTIO
N VIRUS

MULTIPART
EMAI
NETWORK
ITE
L
VIRUS
VIRUS
VIRUS

MACR
O
VIRUS
BOOT VIRUS:
Viruses that aim at the boot sector of a hard drive are infecting
a very crucial component of the boot process.
Examples, Polyboot.B and AntiEXE.
FILE INFECTION VIRUS:
These infect executable program files, such as those with
extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and
.SYS (device driver).
Examples, Sunday and Cascade.
MULTIPARTITE VIRUS:
Viruses that are both a file virus and a boot sector virus. They
enter the computer via various sorts of media and then embed
themselves in the system memory. They then go into the hard
drive and infect the boot sector. Examples, Invader, Flip, and
NETWORK VIRUS:
A virus that is especially made for networks is uniquely created
to quickly spread throughout the local area network and
generally across the internet as well. Examples , Christmas
tree and wank worm.

EMAIL VIRUS:
A e-mail virus is one of those types of computer viruses that is
generally a macro virus and it will multiply itself by seeking out
the other contacts in a e-mail address book.
Examples , ILOVEYOU and Melissa.
MACRO VIRUS;
A macro virus is a new type of computer virus that infects the
macros within a document or template. When you open a word
processing or spread sheet document, the macro virus is
Antivirus software is used to
prevent, detect, and remove malware and
other computer viruses. Anti virus software
systems detections involve searching for
known malicious patterns in executable code.
It is possible for a user to be infected with
new viruses that have no sign or symptoms or
existence.
CONVENTIONAL DISK SCANNERS:
This is the standard virus check program. It is run when the user
requests it, and it scans the contents of the disks, directories or
files that the user wants, for any boot sectors and/or files that
contain viruses that it recognizes, based on the virus description
information in its virus definition files.

MEMORY RESIDENT SCANNERS:
Some antivirus software now comes with a special program that
sits in the background while you use your PC and automatically
scans for viruses based on different triggers.

START UP SCANNERS:
Antivirus products often come with a special program that is
designed to be run every time the PC is booted up.

INOCULATION:
This is a totally different approach to virus detection. Instead of
looking for the viruses themselves, this technique looks for the
changes that the viruses make to files and boot sectors.
1.
2.
3.
4.
5.

AVG.
McAFEE.
NORTON (SYMANTEC).
KASPERSKY.
AD AWARE.
viruses and anti-viruses, computer battles

Contenu connexe

Plus de Muhammad Ali Bhalli Zada

Plus de Muhammad Ali Bhalli Zada (6)

Thermal Fatigue Analysis of steel plate
Thermal Fatigue Analysis of steel plateThermal Fatigue Analysis of steel plate
Thermal Fatigue Analysis of steel plate
 
Differential equations
Differential equationsDifferential equations
Differential equations
 
Induction motor
Induction motorInduction motor
Induction motor
 
Design and fabrication of hydraulic lift
Design and fabrication of hydraulic liftDesign and fabrication of hydraulic lift
Design and fabrication of hydraulic lift
 
Four stroke petrol engine
Four stroke petrol engineFour stroke petrol engine
Four stroke petrol engine
 
Wedding project management
Wedding project managementWedding project management
Wedding project management
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

viruses and anti-viruses, computer battles

  • 1.
  • 2. 1. DEFINITION OF COMPUTER VIRUS 2. TYPES OF COMPUTER VIRUSES 3. EXPLANATION OF COMPUTER VIRUSES 4. DEFINITION OF COMPUTER ANTI-VIRUS 5. TYPES OF COMPUTER ANTI-VIRUSES 6. EXPLANATION OF ANTI-VIRUSES 7. TOP FIVE COMPUTER ANTI-VIRUSES
  • 3. A computer virus has been defined as a set of computer instructions that reproduces itself and it may attach to other executable code. Usually this code is a short program that may either embed in other code or stand on it's own. In essence, this computer program is designed to infect some aspect of the host computer and then copy itself as much and as often as it has the chance.
  • 5. BOOT VIRUS: Viruses that aim at the boot sector of a hard drive are infecting a very crucial component of the boot process. Examples, Polyboot.B and AntiEXE. FILE INFECTION VIRUS: These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). Examples, Sunday and Cascade. MULTIPARTITE VIRUS: Viruses that are both a file virus and a boot sector virus. They enter the computer via various sorts of media and then embed themselves in the system memory. They then go into the hard drive and infect the boot sector. Examples, Invader, Flip, and
  • 6. NETWORK VIRUS: A virus that is especially made for networks is uniquely created to quickly spread throughout the local area network and generally across the internet as well. Examples , Christmas tree and wank worm. EMAIL VIRUS: A e-mail virus is one of those types of computer viruses that is generally a macro virus and it will multiply itself by seeking out the other contacts in a e-mail address book. Examples , ILOVEYOU and Melissa. MACRO VIRUS; A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spread sheet document, the macro virus is
  • 7. Antivirus software is used to prevent, detect, and remove malware and other computer viruses. Anti virus software systems detections involve searching for known malicious patterns in executable code. It is possible for a user to be infected with new viruses that have no sign or symptoms or existence.
  • 8.
  • 9. CONVENTIONAL DISK SCANNERS: This is the standard virus check program. It is run when the user requests it, and it scans the contents of the disks, directories or files that the user wants, for any boot sectors and/or files that contain viruses that it recognizes, based on the virus description information in its virus definition files. MEMORY RESIDENT SCANNERS: Some antivirus software now comes with a special program that sits in the background while you use your PC and automatically scans for viruses based on different triggers. START UP SCANNERS: Antivirus products often come with a special program that is designed to be run every time the PC is booted up. INOCULATION: This is a totally different approach to virus detection. Instead of looking for the viruses themselves, this technique looks for the changes that the viruses make to files and boot sectors.