SlideShare une entreprise Scribd logo
1  sur  15
welcome to
What is a Computer Virus
 What is a Computer Virus? :: A Computer Virus is a
program or programming codes and set of codes which are
composed, designed and written by software Developers or
programming engineer to hurt or infect other computers
locally or in PC systems network.
 They are capable of contaminating and infecting other PC
by duplicating or reproducing itself as a natural biological
virus. A portion of them are innocuous while different
viruses can harm or damage computer system seriously
and can harm computer client and users to an extent.
 Computer viruses can replicate itself and infect different
computer shockingly and without any information to
computer user or client, they can hide themselves and
attack aggressively when comes in contact to "HOST“
 They are spread by utilizing infected or contaminated
media when these infected media is taken to uninfected
computer it get infected or by downloading Documents,
videos, pictures, and content from the internet which
contains malicious programs.
 The Known First computer virus was developed by two
Pakistani Brothers from Lahore in 1986 and named it
as 'BRAIN VIRUS'
Different Types Of Computer Viruses
The computer viruses can be
classified in Following types ::
 System Virus
 File Viruses
 Boot Sector or Boot Record
Viruses
System Virus
 System Viruses are computer program or software codes
which resides and lives inside the system area of the hard
disk or any other media which contains MBR (Master Boot
Record),they infects the boot area of system, and various
other locations of the Operating systems.
 They mainly try to infect or contaminate boot files namely
command.com,Io.sys and Msdos.sys these are the
system files which carries out the boot process of a
working operating system.
 They are computer program which resides inside the system
area of the hard disk or any other media which contains
MBR (Master Boot Record),they infects the boot area of
system, and various other locations of the Operating
systems.
 They mainly try to infect boot files namely
command.com,Io.sys and Msdos.sys these are the system
files which carries out the boot process of an operating
system.
 They basically try to infect the input and output functions of
computer systems. They even can remain or dwell in the
system area & can do its work of contaminating and infecting
other system records which are critical and cruical to run the
boot procedure of computer system
Trojan Viruses
 Trojan Horses is a malicious program designed,
developed, planned and created to harm the computer
system. The codes are customized such that when it
interacts with some other program or documents it
changes them into Trojan virus.
 They control and perform the task of controlling and
manipulating the critical files of working system it infect
and harms File Allocation Table of HARD DISK DRIVES
which contains important and crucial data of Computer
system [PC].
Macro Viruses
 These are a tiny program which is composed inside
information files . Which can be attached to any files, for
example, text or even graphics, for example, pictures,
images or videos which are not harmful as different other
types of viruses.
 These types of viruses don't infect program files, for
example, .EXE or.COM they contaminate application
program, for example, word or speed sheets. They are
the most widely recognized viruses seen nowadays. They
are created to harm application program.
 Regular scanning of hard disk must be done, checking
and scanning of viruses from removable disk such as
DVD CD and pen drives or external computer hard disk
must be done periodically.
Worms
 A worm is a bit of code which is customized such that it
replicates itself when interacts with other different
computers in the network.
 Worm more often that not harm computers when
connected to each other via networking.
 These type of viruses which are attached to files or
programs and harm or manipulate the system files which
are available in your computer systems.
File Viruses
 These programs infect executable files and records such
as .EXE and.COM. They at times change the extension of
the file and make them useless.
 These viruses are attached to the start or the end of the
executable files and records, they don't harm data files
and do not make any manipulation Inside the files and
usually, change the functionality and performance of the
executable files.
 They change the programmed code of the executable
files and documents. which are written and composed for
a specific, particular and special task to perform and
hence abnormal set of instruction is executed when
someone runs them
Boot Sector or Boot Record Viruses
 The Boot sector or Boot Record Viruses are additionally
called as "PARTITION VIRUS“. The computer starts from
the boot area of the hard disk which is 0, 0.1 sector of
computer hard disk drive [HDD].
 In this sector, vital boot records are stacked which causes
a computer to start or boot the operating system. This
code in boot sector stacks in partition table and PC hard
drives have partition table which is a basic part which
loads the working operating system.
 As they stay active in memory, therefore, they can be
called as 'MEMORY RESIDENCE VIRUS' these
programs or codes contaminate clean startup records and
executable files to wreck the boot procedure of operating
system and even can erase the information present in the
computer hard disk.
Removal and Precautions Taken
Against Computer Viruses?
 They have become smarter these days, and even can
make a fool of good antivirus software and are developed
by the programmers who want to harm the computer
system.
 They reside in the memory and do all the functions they
have been developed for. They tend to hide themselves in
such a fashion that it is very difficult to eliminate them
after infection
 Never ever try to open or copy data from an unknown
source before doing so scan it with good antivirus
program which is updated and can eliminate or remove
any malicious program or virus-like activity from your
computer system.
 One Should always use legal antivirus Software.
 Regular Update of such antivirus must be done periodically.
 Never try to open or download from unknown Websites or
copy any files, documents, images, videos and content from
infected USB Drives and CD's or DVD's.
 Never visit pornographic websites as they contain malicious
program which can hurt or damage system files or operating
system.
 One must not download pirated software which may contain
malicious program.
 You must scan any USB medium before using.
 Always beware of phishing attacks generally happens when
clicked on websites which are not authenticated.
Thank you All
Resource:
• http://www.chtips.com/computer-fundamentals/what-is-a-computer-
virus
• http://www.chtips.com/computer-fundamentals/what-is-a-computer

Contenu connexe

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

En vedette

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

What is a computer virus

  • 1. welcome to What is a Computer Virus
  • 2.  What is a Computer Virus? :: A Computer Virus is a program or programming codes and set of codes which are composed, designed and written by software Developers or programming engineer to hurt or infect other computers locally or in PC systems network.  They are capable of contaminating and infecting other PC by duplicating or reproducing itself as a natural biological virus. A portion of them are innocuous while different viruses can harm or damage computer system seriously and can harm computer client and users to an extent.  Computer viruses can replicate itself and infect different computer shockingly and without any information to computer user or client, they can hide themselves and attack aggressively when comes in contact to "HOST“
  • 3.  They are spread by utilizing infected or contaminated media when these infected media is taken to uninfected computer it get infected or by downloading Documents, videos, pictures, and content from the internet which contains malicious programs.  The Known First computer virus was developed by two Pakistani Brothers from Lahore in 1986 and named it as 'BRAIN VIRUS'
  • 4. Different Types Of Computer Viruses The computer viruses can be classified in Following types ::  System Virus  File Viruses  Boot Sector or Boot Record Viruses
  • 5. System Virus  System Viruses are computer program or software codes which resides and lives inside the system area of the hard disk or any other media which contains MBR (Master Boot Record),they infects the boot area of system, and various other locations of the Operating systems.  They mainly try to infect or contaminate boot files namely command.com,Io.sys and Msdos.sys these are the system files which carries out the boot process of a working operating system.
  • 6.  They are computer program which resides inside the system area of the hard disk or any other media which contains MBR (Master Boot Record),they infects the boot area of system, and various other locations of the Operating systems.  They mainly try to infect boot files namely command.com,Io.sys and Msdos.sys these are the system files which carries out the boot process of an operating system.  They basically try to infect the input and output functions of computer systems. They even can remain or dwell in the system area & can do its work of contaminating and infecting other system records which are critical and cruical to run the boot procedure of computer system
  • 7. Trojan Viruses  Trojan Horses is a malicious program designed, developed, planned and created to harm the computer system. The codes are customized such that when it interacts with some other program or documents it changes them into Trojan virus.  They control and perform the task of controlling and manipulating the critical files of working system it infect and harms File Allocation Table of HARD DISK DRIVES which contains important and crucial data of Computer system [PC].
  • 8. Macro Viruses  These are a tiny program which is composed inside information files . Which can be attached to any files, for example, text or even graphics, for example, pictures, images or videos which are not harmful as different other types of viruses.  These types of viruses don't infect program files, for example, .EXE or.COM they contaminate application program, for example, word or speed sheets. They are the most widely recognized viruses seen nowadays. They are created to harm application program.  Regular scanning of hard disk must be done, checking and scanning of viruses from removable disk such as DVD CD and pen drives or external computer hard disk must be done periodically.
  • 9. Worms  A worm is a bit of code which is customized such that it replicates itself when interacts with other different computers in the network.  Worm more often that not harm computers when connected to each other via networking.  These type of viruses which are attached to files or programs and harm or manipulate the system files which are available in your computer systems.
  • 10. File Viruses  These programs infect executable files and records such as .EXE and.COM. They at times change the extension of the file and make them useless.  These viruses are attached to the start or the end of the executable files and records, they don't harm data files and do not make any manipulation Inside the files and usually, change the functionality and performance of the executable files.  They change the programmed code of the executable files and documents. which are written and composed for a specific, particular and special task to perform and hence abnormal set of instruction is executed when someone runs them
  • 11. Boot Sector or Boot Record Viruses  The Boot sector or Boot Record Viruses are additionally called as "PARTITION VIRUS“. The computer starts from the boot area of the hard disk which is 0, 0.1 sector of computer hard disk drive [HDD].  In this sector, vital boot records are stacked which causes a computer to start or boot the operating system. This code in boot sector stacks in partition table and PC hard drives have partition table which is a basic part which loads the working operating system.
  • 12.  As they stay active in memory, therefore, they can be called as 'MEMORY RESIDENCE VIRUS' these programs or codes contaminate clean startup records and executable files to wreck the boot procedure of operating system and even can erase the information present in the computer hard disk.
  • 13. Removal and Precautions Taken Against Computer Viruses?  They have become smarter these days, and even can make a fool of good antivirus software and are developed by the programmers who want to harm the computer system.  They reside in the memory and do all the functions they have been developed for. They tend to hide themselves in such a fashion that it is very difficult to eliminate them after infection  Never ever try to open or copy data from an unknown source before doing so scan it with good antivirus program which is updated and can eliminate or remove any malicious program or virus-like activity from your computer system.
  • 14.  One Should always use legal antivirus Software.  Regular Update of such antivirus must be done periodically.  Never try to open or download from unknown Websites or copy any files, documents, images, videos and content from infected USB Drives and CD's or DVD's.  Never visit pornographic websites as they contain malicious program which can hurt or damage system files or operating system.  One must not download pirated software which may contain malicious program.  You must scan any USB medium before using.  Always beware of phishing attacks generally happens when clicked on websites which are not authenticated.
  • 15. Thank you All Resource: • http://www.chtips.com/computer-fundamentals/what-is-a-computer- virus • http://www.chtips.com/computer-fundamentals/what-is-a-computer