SlideShare une entreprise Scribd logo
1  sur  22
COMPUTER
VIRUS
PREPARED BY
NAME -
CLASS-
SUBMITED TO –
WHAT IS COMPUTER VIRUS ?
 It is a computer program that can copy itself and infect a
computer without permission or knowledge of the user .
 It is a piece of code that is secretly introduced into a system
in order to corrupt it or destroy data .
 A program which can be transmitted between computers via
networks (especially the internet ) or removable storage such
as CDs, USB drives, floopy disk etc.
 It is a potentially damaging computer programme that affects
or infects a computer negatively by altering the way the
computer works .
 The original virus may modify the copies,
or the copies may modify themselves, as
occurs in a matamorphic virus (it is a code
that can reprogram itself ) .
HISTORY
 “Rother J “ is thought to be the first computer virus to appear "in the
wild" — that is, outside the single computer or lab where it was
created, but that claim is false. It was however the first virus to
infect computers "in the home". Written in 1982 by Richard Skrenta,
it attached itself to the Apple DOS 3.3 operating system and spread
by floppy disk .This virus was originally a joke, created by a high
school student and put onto a game on floppy disk. On its 50th use
the Elk cloner virus would be activated, infecting the computer and
displaying a short poem beginning "Elk Cloner: The program with a
personality .
 The first PC virus in the wild was a boot sector virus called (c)
Brain, created in 1986 by the Farooq Alvi Brothers , operating out of
Lahore, Pakistan. The brothers reportedly created the virus to deter
pirated copies of software they had written. However, analysts have
claimed that the Ashar virus, a variant of Brain, possibly predated it
based on code within the virus.[
 Before computer networks became widespread, most viruses
spread on removable media, particularly floppy disk. In the early
days of the personal computer, many users regularly exchanged
information and programs on floppies. Some viruses spread by
infecting programs stored on these disks, while others installed
themselves into the disk boot sector, ensuring that they would be
run when the user booted the computer from the disk, usually
inadvertently. PCs of the era would attempt to boot first from a
floppy if one had been left in the drive. This was the most
successful infection strategy until floppy disks fell from favour,
making boot sector viruses the most common in the wild .
 Traditional computer viruses emerged in the 1980s, driven by the
spread of personal computers and the resultant increase in BBS
and modem use, and software sharing. Bulletin board driven
software sharing contributed directly to the spread of Trojan horse
programs, and viruses were written to infect popularly traded
software. Shareware and bootleg software were equally common
vectors for viruses on BBS's. Within the "pirate scene" of hobbyists
trading illicit copies of retail softwares, traders in a hurry to obtain
the latest applications and games were easy targets for viruses .
 Since the mid-1990s, macro viruses have become common. Most
of these viruses are written in the scripting languages for Microsoft
programs such as Word and Excel. These viruses spread in
Microsoft office by infecting documents and spreadsheets. Since
Word and Excel were also available for Mac OS, most of these
viruses were able to spread on Macintosh computers as well. Most
of these viruses did not have the ability to send infected e-mail.
Those viruses which did spread through e-mail took advantage of
the Microsoft Outlook COM interface .
 Macro viruses pose unique problems for detection software. For
example, some versions of Microsoft Word allowed macros to
replicate themselves with additional blank lines. The virus behaved
identically but would be misidentified as a new virus. In another
example, if two macro viruses simultaneously infect a document,
the combination of the two, if also self-replicating, can appear as a
"mating" of the two and would likely be detected as a virus unique
from the "parents
TYPES OF COMPUTER VIRUS
 There are different types of computer virus depending upon the area of
infection and amount of damage . Some basic category of viruses are :-
1. Boot viruses:-
These viruses infect floppy disk boot records in hard disks.
They replace the boot record program (which is responsible for loading the
operating system in memory) copying it elsewhere on the disk or overwriting
it. Boot viruses load into memory if the computer tries to read the disk while it
is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone virus
2. Program viruses:
These infect executable program files, such as those
with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device
driver). These programs are loaded in memory during execution, taking the
virus with them. The virus becomes active in memory, making copies of itself
and infecting files on disk.
Examples: Sunday, Cascade
3. Multipartite viruses: A hybrid of Boot and Program viruses. They infect
program files and when the infected program is executed, these viruses
infect the boot record. When you boot the computer next time the virus from
the boot record loads in memory and then starts infecting other program
files on disk.
Examples: Invader, Flip, and Tequila
4. Stealth viruses: These viruses use certain techniques to avoid
detection. They may either redirect the disk head to read another sector
instead of the one in which they reside or they may alter the reading of the
infected file’s size shown in the directory listing. For instance, the Whale
virus adds 9216 bytes to an infected file; then the virus subtracts the same
number of bytes (9216) from the size given in the directory.
Examples: Frodo, Joshi, Whale
5. Polymorphic viruses:
A virus that can encrypt its code in different ways so that it
appears differently in each infection. These viruses are more
difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil,
Proud, Virus 101
6. Macro Viruses:
A macro virus is a new type of computer virus that infects the
macros within a document or template. When you open a
word processing or spreadsheet document, the macro virus
is activated and it infects the Normal template (Normal.dot)-a
general purpose file that stores default document formatting
settings. Every document you open refers to the Normal
template, and hence gets infected with the macro virus.
Since this virus attaches itself to documents, the infection
can spread if such documents are opened on other
computers.
Examples: DMV, Nuclear, Word Concept.
HOW COMPUTER VIRUS WORKS OR
SPREADS ?
 Viruses begin to work and spread when you start up the
program or application of which the virus is present. For
example, a word processing program that contains a virus will
place the virus in memory every time the word processing
program is run.
 Once in memory, one of a number of things can happen. The
virus may be programmed to attach to other applications,
disks or folders. It may infect a network if given the
opportunity.
 Viruses behave in different ways. Some viruses stay active
only when the application it is part of is running. Turn the
computer off and the virus is inactive. Other viruses will
operate every time you turn on your computer after infecting
a system file or network.
HOW DOES A COMPUTER
GET VIRUS
 A computer virus is passed from computer to computer, just
as a human virus is passed from person to person . A virus
can be attached to any file that you copy to your computer. If
you download files from the Internet or copy programs or files
from friends on floppy disks, you are very susceptible to
viruses. Actually, anytime that you download files or put a
floppy disk into your computer, you are susceptible to viruses.
 Many viruses are spread through e-mail. Generally, you
cannot get a virus from simply reading e-mail. Certain types
of today's viruses, like Klez, are different. They are very
dangerous because you do not even have to open an e-mail
attachment to release the virus. Just opening the e-mail itself
can release the dangerous bug.
How Do I Know If My PC Has a
Virus?
 The trigger that activates the virus can be almost
anything. For instance, the virus can be activated
the minute it is installed. On the other hand, it may
initiate its dirty work the next time you start your
computer. In many cases, a virus resides inside your
computer in an inactive state, waiting for a certain
event to happen. Like having a physical virus in your
body, you can have a virus in your computer system
and not even know it. A virus can wait patiently in
your system and attack only on a certain date. Of
course, in the time between the moment you
contracted the virus and the time it made itself
known to you, you may have innocently spread the
virus to others
VIRUS PROPERTIES
 Your computer can be infected even if files are
just copied. Because some viruses are memory
resident, as soon as a diskette or program is
loaded into memory, the virus then attaches itself
into memory and then is capable of infecting any
file on the computer you have access to.
 Can be Polymorphic. Some viruses have the
capability of modifying their code, which means
one virus could have various amounts of similar
variants. This is also true with e-mail viruses that
change the subject or body of the message to
help from being detected.
 Can be a stealth virus. Stealth viruses will first
attach itself to files on the computer and then
attack the computer; this causes the virus to
spread more rapidly.
 Can stay on the computer even if the
computer is formatted. Some Viruses have the
capability of infecting different portions of the
computer such as the CMOS battery or master
boot record. Finally, if a computer is completely
erased and the virus is on a backup disk it can
easily re-infect the computer.
 Viruses can carry other viruses. Because
viruses are only software programs a virus may
also carry other viruses making the virus more
lethal and help the primary virus hide or assist the
primary virus with infecting a particular section of
the computer
WHAT VIRUSES MAY DO TO A
COMPUTER
 Deleted files.
 Various messages in files or on programs.
 Changes volume label.
 Marks clusters as bad in the FAT.
 Randomly overwrites sectors on the hard
disk.
 Replaces the MBR with own code.
 Create more than one partition.
 Causes cross-linked files.
 Causes a "sector not found" error.
 Cause the system to run slow.
 Logical partitions created, partitions decrease in
size.
 A directory may be displayed as garbage.
 Directory order may be modified so files, such as
COM files, will start at the beginning of the
directory.
 Caused keyboard keys to be remapped.
WHAT VIRUSES DON’T DO !
 Computer viruses can not infect write protected disks or infect
written documents. Viruses do not infect compressed files, unless
the file was infected prior to the compression. [Compressed files are
programs or files with its common characters, etc. removed to take
up less space on a disk.] Viruses do not infect computer hardware,
such as monitors or computer chips; they only infect software.
 In addition, Macintosh viruses do not infect DOS / Window
computer software and vice versa. For example, the Melissa virus
incident of late 1998 and the ILOVEYOU virus of 2000 worked only
on Window based machines and could not operate on Macintosh
computers.
 One further note-> viruses do not necessarily let you know they are
present in your machine, even after being destructive. If your
computer is not operating properly, it is a good practice to check for
viruses with a current "virus checking" program
Stop Viruses Before
They Attack
 A computer virus can do extensive damage.
It can crash your hard disk. It can destroy all
or some of your data. Many viruses do weird
little things that adversely affect your
computer. The most usual symptom of a
computer virus is erratic behavior. The
destruction can happen at any rate of speed
and can affect almost any part of the
computer. Viruses can spread quickly
through today's intricate cyber world. If your
computer starts to act a little weird, the first
thing to do is to check for a virus
 You will stop viruses before they enter your
computer. You can do this by purchasing a
good virus protection program. Such a
program will check all files for viruses. Once
installed, an antivirus program can be set to
work in the background. It will check all files
before they enter your computer and will alert
you if a virus is detected before it
contaminates your system. If a virus is
detected, your antivirus program will
quarantine or eliminate it so that it cannot
harm your computer
 You should be very careful to purchase a
virus protection program that matches
your operating system. If you use a Mac,
buy a virus protection program made
especially for Macintosh computers. If you
use Windows 98 or Me or XP, select a
program that was written specifically for
your operating system. Don't try to use a
virus protection program that was written
for Windows 95 on a Windows XP
machine; this will really mess up your
computer
THE
END
COPUTER VIRUS
Computer virus

Contenu connexe

Tendances (20)

Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Viruses And Hacking
Viruses And HackingViruses And Hacking
Viruses And Hacking
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Virus09
Virus09Virus09
Virus09
 
Viruses
VirusesViruses
Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Virus
VirusVirus
Virus
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
Computervirus
Computervirus Computervirus
Computervirus
 
viruses
virusesviruses
viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Chapter iv computer virus
Chapter iv  computer virusChapter iv  computer virus
Chapter iv computer virus
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
Module 16 (virus)
Module 16 (virus)Module 16 (virus)
Module 16 (virus)
 

Similaire à Computer virus (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 

Dernier

Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 

Dernier (20)

Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 

Computer virus

  • 2. WHAT IS COMPUTER VIRUS ?  It is a computer program that can copy itself and infect a computer without permission or knowledge of the user .  It is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data .  A program which can be transmitted between computers via networks (especially the internet ) or removable storage such as CDs, USB drives, floopy disk etc.  It is a potentially damaging computer programme that affects or infects a computer negatively by altering the way the computer works .
  • 3.  The original virus may modify the copies, or the copies may modify themselves, as occurs in a matamorphic virus (it is a code that can reprogram itself ) .
  • 4. HISTORY  “Rother J “ is thought to be the first computer virus to appear "in the wild" — that is, outside the single computer or lab where it was created, but that claim is false. It was however the first virus to infect computers "in the home". Written in 1982 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread by floppy disk .This virus was originally a joke, created by a high school student and put onto a game on floppy disk. On its 50th use the Elk cloner virus would be activated, infecting the computer and displaying a short poem beginning "Elk Cloner: The program with a personality .  The first PC virus in the wild was a boot sector virus called (c) Brain, created in 1986 by the Farooq Alvi Brothers , operating out of Lahore, Pakistan. The brothers reportedly created the virus to deter pirated copies of software they had written. However, analysts have claimed that the Ashar virus, a variant of Brain, possibly predated it based on code within the virus.[
  • 5.  Before computer networks became widespread, most viruses spread on removable media, particularly floppy disk. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. PCs of the era would attempt to boot first from a floppy if one had been left in the drive. This was the most successful infection strategy until floppy disks fell from favour, making boot sector viruses the most common in the wild .  Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS and modem use, and software sharing. Bulletin board driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBS's. Within the "pirate scene" of hobbyists trading illicit copies of retail softwares, traders in a hurry to obtain the latest applications and games were easy targets for viruses .
  • 6.  Since the mid-1990s, macro viruses have become common. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel. These viruses spread in Microsoft office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most of these viruses were able to spread on Macintosh computers as well. Most of these viruses did not have the ability to send infected e-mail. Those viruses which did spread through e-mail took advantage of the Microsoft Outlook COM interface .  Macro viruses pose unique problems for detection software. For example, some versions of Microsoft Word allowed macros to replicate themselves with additional blank lines. The virus behaved identically but would be misidentified as a new virus. In another example, if two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a "mating" of the two and would likely be detected as a virus unique from the "parents
  • 7. TYPES OF COMPUTER VIRUS  There are different types of computer virus depending upon the area of infection and amount of damage . Some basic category of viruses are :- 1. Boot viruses:- These viruses infect floppy disk boot records in hard disks. They replace the boot record program (which is responsible for loading the operating system in memory) copying it elsewhere on the disk or overwriting it. Boot viruses load into memory if the computer tries to read the disk while it is booting. Examples: Form, Disk Killer, Michelangelo, and Stone virus 2. Program viruses: These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk. Examples: Sunday, Cascade
  • 8. 3. Multipartite viruses: A hybrid of Boot and Program viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then starts infecting other program files on disk. Examples: Invader, Flip, and Tequila 4. Stealth viruses: These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For instance, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory. Examples: Frodo, Joshi, Whale
  • 9. 5. Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect. Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101 6. Macro Viruses: A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spreadsheet document, the macro virus is activated and it infects the Normal template (Normal.dot)-a general purpose file that stores default document formatting settings. Every document you open refers to the Normal template, and hence gets infected with the macro virus. Since this virus attaches itself to documents, the infection can spread if such documents are opened on other computers. Examples: DMV, Nuclear, Word Concept.
  • 10. HOW COMPUTER VIRUS WORKS OR SPREADS ?  Viruses begin to work and spread when you start up the program or application of which the virus is present. For example, a word processing program that contains a virus will place the virus in memory every time the word processing program is run.  Once in memory, one of a number of things can happen. The virus may be programmed to attach to other applications, disks or folders. It may infect a network if given the opportunity.  Viruses behave in different ways. Some viruses stay active only when the application it is part of is running. Turn the computer off and the virus is inactive. Other viruses will operate every time you turn on your computer after infecting a system file or network.
  • 11. HOW DOES A COMPUTER GET VIRUS  A computer virus is passed from computer to computer, just as a human virus is passed from person to person . A virus can be attached to any file that you copy to your computer. If you download files from the Internet or copy programs or files from friends on floppy disks, you are very susceptible to viruses. Actually, anytime that you download files or put a floppy disk into your computer, you are susceptible to viruses.  Many viruses are spread through e-mail. Generally, you cannot get a virus from simply reading e-mail. Certain types of today's viruses, like Klez, are different. They are very dangerous because you do not even have to open an e-mail attachment to release the virus. Just opening the e-mail itself can release the dangerous bug.
  • 12. How Do I Know If My PC Has a Virus?  The trigger that activates the virus can be almost anything. For instance, the virus can be activated the minute it is installed. On the other hand, it may initiate its dirty work the next time you start your computer. In many cases, a virus resides inside your computer in an inactive state, waiting for a certain event to happen. Like having a physical virus in your body, you can have a virus in your computer system and not even know it. A virus can wait patiently in your system and attack only on a certain date. Of course, in the time between the moment you contracted the virus and the time it made itself known to you, you may have innocently spread the virus to others
  • 13. VIRUS PROPERTIES  Your computer can be infected even if files are just copied. Because some viruses are memory resident, as soon as a diskette or program is loaded into memory, the virus then attaches itself into memory and then is capable of infecting any file on the computer you have access to.  Can be Polymorphic. Some viruses have the capability of modifying their code, which means one virus could have various amounts of similar variants. This is also true with e-mail viruses that change the subject or body of the message to help from being detected.
  • 14.  Can be a stealth virus. Stealth viruses will first attach itself to files on the computer and then attack the computer; this causes the virus to spread more rapidly.  Can stay on the computer even if the computer is formatted. Some Viruses have the capability of infecting different portions of the computer such as the CMOS battery or master boot record. Finally, if a computer is completely erased and the virus is on a backup disk it can easily re-infect the computer.  Viruses can carry other viruses. Because viruses are only software programs a virus may also carry other viruses making the virus more lethal and help the primary virus hide or assist the primary virus with infecting a particular section of the computer
  • 15. WHAT VIRUSES MAY DO TO A COMPUTER  Deleted files.  Various messages in files or on programs.  Changes volume label.  Marks clusters as bad in the FAT.  Randomly overwrites sectors on the hard disk.  Replaces the MBR with own code.  Create more than one partition.
  • 16.  Causes cross-linked files.  Causes a "sector not found" error.  Cause the system to run slow.  Logical partitions created, partitions decrease in size.  A directory may be displayed as garbage.  Directory order may be modified so files, such as COM files, will start at the beginning of the directory.  Caused keyboard keys to be remapped.
  • 17. WHAT VIRUSES DON’T DO !  Computer viruses can not infect write protected disks or infect written documents. Viruses do not infect compressed files, unless the file was infected prior to the compression. [Compressed files are programs or files with its common characters, etc. removed to take up less space on a disk.] Viruses do not infect computer hardware, such as monitors or computer chips; they only infect software.  In addition, Macintosh viruses do not infect DOS / Window computer software and vice versa. For example, the Melissa virus incident of late 1998 and the ILOVEYOU virus of 2000 worked only on Window based machines and could not operate on Macintosh computers.  One further note-> viruses do not necessarily let you know they are present in your machine, even after being destructive. If your computer is not operating properly, it is a good practice to check for viruses with a current "virus checking" program
  • 18. Stop Viruses Before They Attack  A computer virus can do extensive damage. It can crash your hard disk. It can destroy all or some of your data. Many viruses do weird little things that adversely affect your computer. The most usual symptom of a computer virus is erratic behavior. The destruction can happen at any rate of speed and can affect almost any part of the computer. Viruses can spread quickly through today's intricate cyber world. If your computer starts to act a little weird, the first thing to do is to check for a virus
  • 19.  You will stop viruses before they enter your computer. You can do this by purchasing a good virus protection program. Such a program will check all files for viruses. Once installed, an antivirus program can be set to work in the background. It will check all files before they enter your computer and will alert you if a virus is detected before it contaminates your system. If a virus is detected, your antivirus program will quarantine or eliminate it so that it cannot harm your computer
  • 20.  You should be very careful to purchase a virus protection program that matches your operating system. If you use a Mac, buy a virus protection program made especially for Macintosh computers. If you use Windows 98 or Me or XP, select a program that was written specifically for your operating system. Don't try to use a virus protection program that was written for Windows 95 on a Windows XP machine; this will really mess up your computer