SlideShare une entreprise Scribd logo
1  sur  19
Presented by:
Bennette Osae Addo.
ICT Teacher-GCIHS
COMPUTER VIRUS
What are Computer Viruses
Computer Viruses are small
software programs that are
designed to spread from one
computer to another and to
interfere with computer
operation.
Why people create computer
viruses
 Computer viruses do not come into existence
spontaneously. They are deliberately created
by programmers, or by people who use virus
creation software.
Virus writers can have various reasons for creating and
spreading malware. Viruses have been written as
research projects, pranks, to attack the products of
specific companies, to distribute political messages, and
financial gain from identity theft, spyware, and cryptoviral
extortion. Some virus writers consider their creations to be
works of art, and see virus writing as a creative hobby.
Ways computer viruses enter your computer
 Viruses are most easily spread by
attachments in e-mail messages or instant
messaging messages. That is why it is
essential that you never open e-mail
attachments unless you know who it's from
and you are expecting it.
 Viruses can be disguised as attachments of
funny images, greeting cards, or audio
and video files. Viruses also spread
through downloads on the Internet. They
can be hidden in illicit software or other
files or programs you might download.

How to detect virus?
Some Symptoms
q Program takes longer to load.
q The program size keeps changing.
q The drive light keeps flashing when you are
not doing anything.
q User created files have strange names.
q The computer doesn't remember CMOS
settings.
Examples of computer viruses
 Trojan Horse:
A destructive program that
masquerades as a benign
application. Unlike viruses, Trojan
horses do not replicate themselves
but they can be just as destructive.

One of the most insidious types of
Trojan horse is a program that claims
to rid your computer of viruses but
instead introduces viruses onto your
computer.

 Worm:
A worm is similar to a virus by its design,
and is considered to be a sub-class of a
virus. Worms spread from computer to
computer, but unlike a virus, it has the
capability to travel without any help from
a person. A worm takes advantage of file
or information transport features on your
system, which allows it to travel unaided.
 The biggest danger with a worm is its
capability to replicate itself on your
system, so rather than your computer
sending out a single worm, it could send
out hundreds or thousands of copies of
itself, creating a huge devastating effect.
 Boot sector Virus :
A virus which attaches itself to the first part
of the hard disk that is read by the
computer upon boot up. These are
normally spread by floppy disks.
Macro Virus:
Macro viruses are viruses that use another
application's macro programming
language to distribute themselves. They
infect documents such as MS Word or MS
Excel and are typically spread to other
similar documents.
Memory Resident Viruses:
Memory Resident Viruses reside in a
computers volatile memory (RAM). They
are initiated from a virus which runs on the
computer and they stay in memory after
it's initiating program closes.
Spy ware
 Spyware, on the other hand, is generally not
designed to damage your computer. Spyware
is broadly defined as any program that gets
into your computer without permission and
hides in the background while it makes
unwanted changes to your user experience.
 Most spyware targets only the Windows
operating system. Some of the more
notorious spyware companies include Gator,
Bonzi Buddy, 180 Solutions, DirectRevenue,
Cydoor, CoolWebSearch, Xupiter, XXXDial
and Euniverse.

How Did it Get on Your Computer?
 Spyware usually gets onto your machine
because of something you do, like clicking a
button on a pop-up window, installing a
software package or agreeing to add
functionality to your Web browser

How Did it Get on Your Computer?
 Drive-by download - This is when a Web site or
pop-up window automatically tries to download
and install spyware on your machine
 Browser add-ons - These are pieces of software
that add enhancements to your Web browser,
like a toolbar, animated pal or additional search
box.
 browser hijackers -- these embed themselves
deeply in your machine and take quite a bit of
work to get rid of.
Steps to avoid virus
 Don’t open e-mail that you are not sure.
 All thumb drive(Pendrive) need to scan by
anti-virus software.

 Always scan your PC with anti-virus software.
How to protect your computer from
computer viruses
 Only open e-mail attachments received
from sources you trust and that you are
expecting.

 Back up your hard drive files frequently and
maintain multiple backup sets.

 If you are experiencing unusually slow
performance, apparent file loss or
damage, or other abnormalities,
immediately check your hard drives and
diskettes for infection.
•Delete chain emails and junk email. Do not
forward or reply to any to them.
These types of email are considered spam, which is
unsolicited, intrusive mail that clogs up the
network.
•
•Download software only from sites you are
familiar with, and immediately check it with your
anti-virus software.
•
•Don't spread hoaxes and rumors.
TOP 10 ANTIVIRUS OF 2017
1. McAfee AntiVirus Plus
2. Symantec Norton AntiVirus Basic
3. Webroot SecureAnywhere AntiVirus
4. Bitdefender Antivirus Plus
5. Kaspersky Anti-Virus
6. Avast Pro Antivirus 2017
7. Emsisoft Anti-Malware 2017
8. ESET NOD32 Antivirus
9. F-Secure Anti-Virus (2017)
10.Trend Micro Antivirus+ Security
End
References
 http://www.webopedia.com/DidYouKnow/Internet/2004/vi
- The Difference Between a Virus, Worm, and
Trojan Horse.
 http://en.wikipedia.org/wiki/Computer_virus -
Computer Virus
 http://www.microsoft.com/protect/computer/basics/virus.m
- What is Computer Viruses
 http://www.soe.umich.edu/computingnetwork/howto/avo
- How To Avoid Computer Viruses

Contenu connexe

Tendances

Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer Virus
Computer VirusComputer Virus
Computer VirusAritra Das
 
Computer Virus
Computer Virus Computer Virus
Computer Virus Study Hub
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer VirusYo Maruf
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.QuratNaeem
 

Tendances (20)

Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus
computer viruscomputer virus
computer virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Virus
VirusVirus
Virus
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 

Similaire à Computer virus (20)

Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Sowmya
SowmyaSowmya
Sowmya
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus
VirusVirus
Virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
virus
virusvirus
virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Dernier

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Dernier (20)

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Computer virus

  • 1. Presented by: Bennette Osae Addo. ICT Teacher-GCIHS COMPUTER VIRUS
  • 2.
  • 3. What are Computer Viruses Computer Viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
  • 4. Why people create computer viruses  Computer viruses do not come into existence spontaneously. They are deliberately created by programmers, or by people who use virus creation software. Virus writers can have various reasons for creating and spreading malware. Viruses have been written as research projects, pranks, to attack the products of specific companies, to distribute political messages, and financial gain from identity theft, spyware, and cryptoviral extortion. Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby.
  • 5. Ways computer viruses enter your computer  Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.  Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. 
  • 6. How to detect virus? Some Symptoms q Program takes longer to load. q The program size keeps changing. q The drive light keeps flashing when you are not doing anything. q User created files have strange names. q The computer doesn't remember CMOS settings.
  • 7. Examples of computer viruses  Trojan Horse: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.  One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. 
  • 8.  Worm: A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided.  The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.
  • 9.  Boot sector Virus : A virus which attaches itself to the first part of the hard disk that is read by the computer upon boot up. These are normally spread by floppy disks. Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volatile memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.
  • 10. Spy ware  Spyware, on the other hand, is generally not designed to damage your computer. Spyware is broadly defined as any program that gets into your computer without permission and hides in the background while it makes unwanted changes to your user experience.  Most spyware targets only the Windows operating system. Some of the more notorious spyware companies include Gator, Bonzi Buddy, 180 Solutions, DirectRevenue, Cydoor, CoolWebSearch, Xupiter, XXXDial and Euniverse. 
  • 11. How Did it Get on Your Computer?  Spyware usually gets onto your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser 
  • 12. How Did it Get on Your Computer?  Drive-by download - This is when a Web site or pop-up window automatically tries to download and install spyware on your machine  Browser add-ons - These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box.  browser hijackers -- these embed themselves deeply in your machine and take quite a bit of work to get rid of.
  • 13. Steps to avoid virus  Don’t open e-mail that you are not sure.  All thumb drive(Pendrive) need to scan by anti-virus software.   Always scan your PC with anti-virus software.
  • 14. How to protect your computer from computer viruses  Only open e-mail attachments received from sources you trust and that you are expecting.   Back up your hard drive files frequently and maintain multiple backup sets.   If you are experiencing unusually slow performance, apparent file loss or damage, or other abnormalities, immediately check your hard drives and diskettes for infection.
  • 15. •Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network. • •Download software only from sites you are familiar with, and immediately check it with your anti-virus software. • •Don't spread hoaxes and rumors.
  • 16. TOP 10 ANTIVIRUS OF 2017 1. McAfee AntiVirus Plus 2. Symantec Norton AntiVirus Basic 3. Webroot SecureAnywhere AntiVirus 4. Bitdefender Antivirus Plus 5. Kaspersky Anti-Virus 6. Avast Pro Antivirus 2017 7. Emsisoft Anti-Malware 2017 8. ESET NOD32 Antivirus 9. F-Secure Anti-Virus (2017) 10.Trend Micro Antivirus+ Security
  • 17.
  • 18. End
  • 19. References  http://www.webopedia.com/DidYouKnow/Internet/2004/vi - The Difference Between a Virus, Worm, and Trojan Horse.  http://en.wikipedia.org/wiki/Computer_virus - Computer Virus  http://www.microsoft.com/protect/computer/basics/virus.m - What is Computer Viruses  http://www.soe.umich.edu/computingnetwork/howto/avo - How To Avoid Computer Viruses