SlideShare une entreprise Scribd logo
1  sur  22
Antivirus Programs
Mr.Anuj B. Pawar.
Contents:
 What is Computer virus ?
 Types of viruses
 Introduction to Antivirus Program
 How an Antivirus works
 What to do when suspecting virus attack
 General precautions you should take
What is a Computer Virus?
 A computer virus is a small program written to alter the way a
computer operates, without the permission or knowledge of
the user.With an ability to replicate itself, thus continuing to
spread.Also, known as Malicious Software, a program that can
cause damage to a computer.
 The computer viruses can damage or corrupt data, modify
existing data, or degrade the performance of the system by
utilizing resources such as memory or disk space.
Classification of Computer viruses:
 Boot sector virus
 Master Boot Record virus (MBR)
 File infector virus
 Multipartite virus
 Macro virus
 Worms
 Trojans
Boot sector virus
 Boot sector viruses generally hide in the boot sector,
either in the bootable disk or the hard drive.
 Error message “Invalid system disk”
 E.g. Form, Disk Killer, Michelangelo, Stoned.
Master Boot Record (MBR) virus
 MBR viruses are memory-resident viruses that infect
disks in the same manner as boot sector viruses.
 E.g.AntiEXE, Unashamed, NYB
File infector virus
 File infector viruses infect program files.
 Normally infect executable code, such as .COM, .SYS,
.BAT and .EXE files.
 E.g. Snow.A, Jerusalem, Cascade
Multipartite virus
 Multipartite (also known as polypartite) viruses infect
both boot records and program files.
 E.g. One_Half, Emperor,Anthrax,Tequilla.
Macro virus
 Macro viruses infect files that are created using
certain applications or programs that contain macros.
 They infect documents created from Microsoft Office
Word, Excel, PowerPoint and Access files.
 E.g.W97M.Melissa, Bablas,WM.NiceDay,
W97M.Groov.
Computer Worms
 Worms are programs that replicate themselves from
system to system without the use of a host file.The
worms are spread through networks like LAN,WAN and
also through Internet.There are various ways by which a
worm spreads, through Internet like E-mails, Messaging
and Chats.
 Worms almost always cause harm to the network, like
consuming network bandwidth.
 E.g.W32.Mydoom.AX@mm
Computer Trojans
 Trojan horses are impostors: files that claim to be something
desirable but, in fact, are malicious.Trojan horse programs do
not replicate themselves.Trojan horses contain malicious code
that when triggered cause loss, or even theft, of data.
 E.g.Trojan.Vundo
 Retrieving user’s critical information. i.e. name, password.
 Spreading malware programs i.e.‘dropper’ or ‘vector’.
 Erasing or overwriting data on a computer.
 Spying on a user to gather his information like browsing habits,
sites visited etc.These are called Spyware.
Antivirus Software
 An antivirus software is a computer program that identify
and remove computer viruses, and other malicious
software like Worms andTrojans from an infected
computer. Not only this, an antivirus software also
protects the computer from further virus attacks.
 We should regularly run an antivirus program to scan and
remove any possible virus attacks from a computer.
Some popular Antivirus..
How an Antivirus works
 Using dictionary Approach:
 The antivirus software examines each and every file in a
computer and examines its content with the virus
definitions stored in its virus dictionary.
 A virus dictionary is an inbuilt file belonging to an
antivirus software that contains code identified as a virus
by the antivirus authors.
Using Suspicious Behavior Approach:
 Antivirus software will constantly monitors the activity of
all the programs.
 If any program tries to write data on an executable file,
the antivirus software will flag the program having a
suspicious behavior, means the suspected program will be
marked as a virus.
 The advantage of this approach is that it can safeguard the
computer against unknown viruses also.
 The disadvantage is that it may create several false alerts
too.
When selecting an Antivirus Software
 Real-Time Scanning
 The antivirus software is automatically running in the
background on a continuous basis, scanning files and
folders for possible virus attacks as they are opened or
executed, and checking e-mails as they are downloaded.
 Most commercial antivirus software provide real time
scanning.
Virus Updates
 Providing regular updates for the virus dictionary.You
should look for antivirus program that provides free virus
updates on a periodic basis.
 With the current outburst in macro and script-based
viruses, virus updates that address the latest threats are
essential.
 Most commercial antivirus software in today’s scenario
provide virus updates on daily basis.
Configuring your Antivirus software
 Adjust the settings to scan all (*all*) files.Also, ensure that
real time scanning is enabled by default.
 Create a recovery/reference/cure disk because if a boot
sector or MBR virus attack the system, it may fail to boot.
In that case, recovery cure disk can be used to boot the
system and remove the virus.
 Read the vendors manual.This will help you to
understand the advanced options and how to use them
according to your preference.
What to do on Suspecting Virus attack?
 Disconnect the suspected computer system from the
Internet as well as from the Local Network.
 Start the system in Safe Mode or from the Windows boot
disk, if it displays any problem in starting.
 Take backup of all crucial data to an external drive.
 Install antivirus software if you do not have it installed.
 Now, download the latest virus definitions updates from
the internet. (do it on a separate computer)
 Perform a full system scan.
General precautions you should take
 When inserting removable media (floppy, CD, flash drive
etc.) scan the whole device with the antivirus software
before opening it.
 If you have internet access, make sure you use internet
security software.
 Get Windows updates.
 From time to time, update your installed software to
their latest version. E.g. (MS Office,Adobe Reader, java,
Flash player etc.)
 Last but not least, you should have an updated antivirus
guarding your PC all time.
Thank You….
_ap

Contenu connexe

Tendances

Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
Amrit Kaur
 

Tendances (20)

Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Anti virus
Anti virusAnti virus
Anti virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Anti virus
Anti virusAnti virus
Anti virus
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus
 

En vedette

Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
ILAKIA
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 

En vedette (8)

Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
 
Virus y-antivirus-ppt leonardo
Virus y-antivirus-ppt leonardoVirus y-antivirus-ppt leonardo
Virus y-antivirus-ppt leonardo
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
39 Rules to Help You Rock Your Next Presentation
39 Rules to Help You Rock Your Next Presentation39 Rules to Help You Rock Your Next Presentation
39 Rules to Help You Rock Your Next Presentation
 

Similaire à Antivirus programs

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
jnnj
 

Similaire à Antivirus programs (20)

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 

Dernier

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Dernier (20)

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 

Antivirus programs

  • 2. Contents:  What is Computer virus ?  Types of viruses  Introduction to Antivirus Program  How an Antivirus works  What to do when suspecting virus attack  General precautions you should take
  • 3. What is a Computer Virus?  A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user.With an ability to replicate itself, thus continuing to spread.Also, known as Malicious Software, a program that can cause damage to a computer.  The computer viruses can damage or corrupt data, modify existing data, or degrade the performance of the system by utilizing resources such as memory or disk space.
  • 4. Classification of Computer viruses:  Boot sector virus  Master Boot Record virus (MBR)  File infector virus  Multipartite virus  Macro virus  Worms  Trojans
  • 5. Boot sector virus  Boot sector viruses generally hide in the boot sector, either in the bootable disk or the hard drive.  Error message “Invalid system disk”  E.g. Form, Disk Killer, Michelangelo, Stoned.
  • 6. Master Boot Record (MBR) virus  MBR viruses are memory-resident viruses that infect disks in the same manner as boot sector viruses.  E.g.AntiEXE, Unashamed, NYB
  • 7. File infector virus  File infector viruses infect program files.  Normally infect executable code, such as .COM, .SYS, .BAT and .EXE files.  E.g. Snow.A, Jerusalem, Cascade
  • 8. Multipartite virus  Multipartite (also known as polypartite) viruses infect both boot records and program files.  E.g. One_Half, Emperor,Anthrax,Tequilla.
  • 9. Macro virus  Macro viruses infect files that are created using certain applications or programs that contain macros.  They infect documents created from Microsoft Office Word, Excel, PowerPoint and Access files.  E.g.W97M.Melissa, Bablas,WM.NiceDay, W97M.Groov.
  • 10. Computer Worms  Worms are programs that replicate themselves from system to system without the use of a host file.The worms are spread through networks like LAN,WAN and also through Internet.There are various ways by which a worm spreads, through Internet like E-mails, Messaging and Chats.  Worms almost always cause harm to the network, like consuming network bandwidth.  E.g.W32.Mydoom.AX@mm
  • 11. Computer Trojans  Trojan horses are impostors: files that claim to be something desirable but, in fact, are malicious.Trojan horse programs do not replicate themselves.Trojan horses contain malicious code that when triggered cause loss, or even theft, of data.  E.g.Trojan.Vundo  Retrieving user’s critical information. i.e. name, password.  Spreading malware programs i.e.‘dropper’ or ‘vector’.  Erasing or overwriting data on a computer.  Spying on a user to gather his information like browsing habits, sites visited etc.These are called Spyware.
  • 12. Antivirus Software  An antivirus software is a computer program that identify and remove computer viruses, and other malicious software like Worms andTrojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks.  We should regularly run an antivirus program to scan and remove any possible virus attacks from a computer.
  • 14.
  • 15. How an Antivirus works  Using dictionary Approach:  The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary.  A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.
  • 16. Using Suspicious Behavior Approach:  Antivirus software will constantly monitors the activity of all the programs.  If any program tries to write data on an executable file, the antivirus software will flag the program having a suspicious behavior, means the suspected program will be marked as a virus.  The advantage of this approach is that it can safeguard the computer against unknown viruses also.  The disadvantage is that it may create several false alerts too.
  • 17. When selecting an Antivirus Software  Real-Time Scanning  The antivirus software is automatically running in the background on a continuous basis, scanning files and folders for possible virus attacks as they are opened or executed, and checking e-mails as they are downloaded.  Most commercial antivirus software provide real time scanning.
  • 18. Virus Updates  Providing regular updates for the virus dictionary.You should look for antivirus program that provides free virus updates on a periodic basis.  With the current outburst in macro and script-based viruses, virus updates that address the latest threats are essential.  Most commercial antivirus software in today’s scenario provide virus updates on daily basis.
  • 19. Configuring your Antivirus software  Adjust the settings to scan all (*all*) files.Also, ensure that real time scanning is enabled by default.  Create a recovery/reference/cure disk because if a boot sector or MBR virus attack the system, it may fail to boot. In that case, recovery cure disk can be used to boot the system and remove the virus.  Read the vendors manual.This will help you to understand the advanced options and how to use them according to your preference.
  • 20. What to do on Suspecting Virus attack?  Disconnect the suspected computer system from the Internet as well as from the Local Network.  Start the system in Safe Mode or from the Windows boot disk, if it displays any problem in starting.  Take backup of all crucial data to an external drive.  Install antivirus software if you do not have it installed.  Now, download the latest virus definitions updates from the internet. (do it on a separate computer)  Perform a full system scan.
  • 21. General precautions you should take  When inserting removable media (floppy, CD, flash drive etc.) scan the whole device with the antivirus software before opening it.  If you have internet access, make sure you use internet security software.  Get Windows updates.  From time to time, update your installed software to their latest version. E.g. (MS Office,Adobe Reader, java, Flash player etc.)  Last but not least, you should have an updated antivirus guarding your PC all time.