SlideShare une entreprise Scribd logo
1  sur  15
Computer Virus
What is computer virus?
Computer virus refers to a
program which damages computer
systems and/or destroys or erases
data files
Types of Computer Virus
Time Bomb
Logical Bomb
Worm
Boot Sector Virus
Macros Virus
Trojan Horse
Script Virus
Time Bomb
A time bomb is a virus program
that performs an activity on a
particular date
Logical Bomb
A logical bomb is a destructive
program that performs an activity
when a certain action has occurred.
Worm Virus
A worm is also a destructive
program that fills a computer
system with self-replicating
information, clogging the system so
that its operations are slowed down
or stopped
Boot Sector Virus
A boot sector virus infects boot
sector of computers. During system
boot, boot sector virus is loaded
into main memory and destroys
data stored in hard disk
Macro Virus
A macro virus is associated with
application software like word and
excel. When opening the infected
document, macro virus is loaded
into main memory and destroys the
data stored in hard disk
Script Virus
Commonly found script viruses are
written using the Visual Basic
Scripting edition (VBS) and the
JavaScript programming languages
Trojan Horse
Trojan Horse is a destructive
program. It usually pretends as
computer games or application
software. If executed, computer
system will be damaged.
Trojan Horse
Trojan Horse usually comes with
monitoring tools and key loggers
How to prevent virus infection
1. Always update your anti-virus
software at least weekly.
2. Back up your important files and
ensure that they can be restored.
3. Change the computer's boot
sequence to always start the PC
from its hard drive
How to prevent virus infection
4. Don't share Drive C: without a
password and without read-only
restrictions.
5. Empty floppy drives of diskettes
before turning on computers,
especially laptops.
How to prevent virus infection
6. Forget opening unexpected e-
mail attachments, even if they're
from friends
7. Get trained on your computer's
anti-virus software and use it.
8. Have multiple backups of
important files. This lowers the
chance that all are infected.
How to prevent virus infection
9. Install security updates for your
operating system and programs as
soon as possible.
10. Jump at the chance to learn
more about your computer. This
will help you spot viruses.

Contenu connexe

Tendances

As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Virus presentation1
Virus presentation1Virus presentation1
Virus presentation1Sameep Sood
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Computer viruses
Computer virusesComputer viruses
Computer virusesBilliyan
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spreadwenxin
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virusAbrish06
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignmentainmz
 
Computer Virus
Computer VirusComputer Virus
Computer Virusjangezkhan
 

Tendances (20)

As computer virus
As computer virusAs computer virus
As computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus presentation1
Virus presentation1Virus presentation1
Virus presentation1
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Computer vrise
Computer vriseComputer vrise
Computer vrise
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 

En vedette

Speech Recognition
Speech Recognition Speech Recognition
Speech Recognition Goa App
 
Erp introduction
Erp introductionErp introduction
Erp introductionGoa App
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingGoa App
 
Mobile phones
Mobile phonesMobile phones
Mobile phonesGoa App
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingGoa App
 
Hidden Markov Model Toolkit (HTK) www.redicals.com
Hidden Markov Model Toolkit (HTK) www.redicals.comHidden Markov Model Toolkit (HTK) www.redicals.com
Hidden Markov Model Toolkit (HTK) www.redicals.comGoa App
 
UV rays
UV rays UV rays
UV rays Goa App
 
Lamborghini
LamborghiniLamborghini
LamborghiniGoa App
 
Capital market
Capital marketCapital market
Capital marketGoa App
 
Spectrofluorimetry (www.redicals.com)
Spectrofluorimetry (www.redicals.com)Spectrofluorimetry (www.redicals.com)
Spectrofluorimetry (www.redicals.com)Goa App
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...UltraUploader
 
Binomial Heap
Binomial HeapBinomial Heap
Binomial HeapGoa App
 
Compressor and compressed_air_systems
Compressor and compressed_air_systemsCompressor and compressed_air_systems
Compressor and compressed_air_systemsGoa App
 
Memory cards
Memory cardsMemory cards
Memory cardsGoa App
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoorsjibinmanjooran
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)ainizbahari97
 
Spectrofluorimetry or fluorimetry (www.Redicals.com)
Spectrofluorimetry or fluorimetry (www.Redicals.com)Spectrofluorimetry or fluorimetry (www.Redicals.com)
Spectrofluorimetry or fluorimetry (www.Redicals.com)Goa App
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 

En vedette (20)

Speech Recognition
Speech Recognition Speech Recognition
Speech Recognition
 
Erp introduction
Erp introductionErp introduction
Erp introduction
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Mobile phones
Mobile phonesMobile phones
Mobile phones
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Hidden Markov Model Toolkit (HTK) www.redicals.com
Hidden Markov Model Toolkit (HTK) www.redicals.comHidden Markov Model Toolkit (HTK) www.redicals.com
Hidden Markov Model Toolkit (HTK) www.redicals.com
 
UV rays
UV rays UV rays
UV rays
 
Lamborghini
LamborghiniLamborghini
Lamborghini
 
Capital market
Capital marketCapital market
Capital market
 
Spectrofluorimetry (www.redicals.com)
Spectrofluorimetry (www.redicals.com)Spectrofluorimetry (www.redicals.com)
Spectrofluorimetry (www.redicals.com)
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...
 
Binomial Heap
Binomial HeapBinomial Heap
Binomial Heap
 
Compressor and compressed_air_systems
Compressor and compressed_air_systemsCompressor and compressed_air_systems
Compressor and compressed_air_systems
 
Memory cards
Memory cardsMemory cards
Memory cards
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
 
Malware
MalwareMalware
Malware
 
Spectrofluorimetry or fluorimetry (www.Redicals.com)
Spectrofluorimetry or fluorimetry (www.Redicals.com)Spectrofluorimetry or fluorimetry (www.Redicals.com)
Spectrofluorimetry or fluorimetry (www.Redicals.com)
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 

Similaire à Computer virus

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
 

Similaire à Computer virus (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer virus
Computer virusComputer virus
Computer virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus
VirusVirus
Virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Virus project
Virus projectVirus project
Virus project
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Plus de Goa App

web development in 2024 - website development
web development in 2024 - website developmentweb development in 2024 - website development
web development in 2024 - website developmentGoa App
 
unit test in node js - test cases in node
unit test in node js - test cases in nodeunit test in node js - test cases in node
unit test in node js - test cases in nodeGoa App
 
web development full stack
web development full stackweb development full stack
web development full stackGoa App
 
Angular interview questions
Angular interview questionsAngular interview questions
Angular interview questionsGoa App
 
UV ray spectrophotometer
UV ray spectrophotometerUV ray spectrophotometer
UV ray spectrophotometerGoa App
 
Atomic Absorption Spectroscopy (www.Redicals.com)
Atomic Absorption Spectroscopy (www.Redicals.com)Atomic Absorption Spectroscopy (www.Redicals.com)
Atomic Absorption Spectroscopy (www.Redicals.com)Goa App
 
Cash Budget
Cash BudgetCash Budget
Cash BudgetGoa App
 
Social Network Analysis Using Gephi
Social Network Analysis Using Gephi Social Network Analysis Using Gephi
Social Network Analysis Using Gephi Goa App
 
Magnetic memory
Magnetic memoryMagnetic memory
Magnetic memoryGoa App
 
E governance
E governanceE governance
E governanceGoa App
 
Enterprise resource planning in manufacturing
Enterprise resource planning in manufacturingEnterprise resource planning in manufacturing
Enterprise resource planning in manufacturingGoa App
 
Enterprise application integration
Enterprise application integrationEnterprise application integration
Enterprise application integrationGoa App
 
Capital marketing
Capital marketingCapital marketing
Capital marketingGoa App
 
Types of gears
Types of gearsTypes of gears
Types of gearsGoa App
 
Pollution
PollutionPollution
PollutionGoa App
 
Inventory control & management
Inventory control & managementInventory control & management
Inventory control & managementGoa App
 
Industrial boilers
Industrial boilersIndustrial boilers
Industrial boilersGoa App
 

Plus de Goa App (18)

web development in 2024 - website development
web development in 2024 - website developmentweb development in 2024 - website development
web development in 2024 - website development
 
unit test in node js - test cases in node
unit test in node js - test cases in nodeunit test in node js - test cases in node
unit test in node js - test cases in node
 
web development full stack
web development full stackweb development full stack
web development full stack
 
Angular interview questions
Angular interview questionsAngular interview questions
Angular interview questions
 
UV ray spectrophotometer
UV ray spectrophotometerUV ray spectrophotometer
UV ray spectrophotometer
 
Atomic Absorption Spectroscopy (www.Redicals.com)
Atomic Absorption Spectroscopy (www.Redicals.com)Atomic Absorption Spectroscopy (www.Redicals.com)
Atomic Absorption Spectroscopy (www.Redicals.com)
 
Cash Budget
Cash BudgetCash Budget
Cash Budget
 
Social Network Analysis Using Gephi
Social Network Analysis Using Gephi Social Network Analysis Using Gephi
Social Network Analysis Using Gephi
 
Blu ray
Blu rayBlu ray
Blu ray
 
Magnetic memory
Magnetic memoryMagnetic memory
Magnetic memory
 
E governance
E governanceE governance
E governance
 
Enterprise resource planning in manufacturing
Enterprise resource planning in manufacturingEnterprise resource planning in manufacturing
Enterprise resource planning in manufacturing
 
Enterprise application integration
Enterprise application integrationEnterprise application integration
Enterprise application integration
 
Capital marketing
Capital marketingCapital marketing
Capital marketing
 
Types of gears
Types of gearsTypes of gears
Types of gears
 
Pollution
PollutionPollution
Pollution
 
Inventory control & management
Inventory control & managementInventory control & management
Inventory control & management
 
Industrial boilers
Industrial boilersIndustrial boilers
Industrial boilers
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Computer virus

  • 2. What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files
  • 3. Types of Computer Virus Time Bomb Logical Bomb Worm Boot Sector Virus Macros Virus Trojan Horse Script Virus
  • 4. Time Bomb A time bomb is a virus program that performs an activity on a particular date
  • 5. Logical Bomb A logical bomb is a destructive program that performs an activity when a certain action has occurred.
  • 6. Worm Virus A worm is also a destructive program that fills a computer system with self-replicating information, clogging the system so that its operations are slowed down or stopped
  • 7. Boot Sector Virus A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk
  • 8. Macro Virus A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk
  • 9. Script Virus Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages
  • 10. Trojan Horse Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.
  • 11. Trojan Horse Trojan Horse usually comes with monitoring tools and key loggers
  • 12. How to prevent virus infection 1. Always update your anti-virus software at least weekly. 2. Back up your important files and ensure that they can be restored. 3. Change the computer's boot sequence to always start the PC from its hard drive
  • 13. How to prevent virus infection 4. Don't share Drive C: without a password and without read-only restrictions. 5. Empty floppy drives of diskettes before turning on computers, especially laptops.
  • 14. How to prevent virus infection 6. Forget opening unexpected e- mail attachments, even if they're from friends 7. Get trained on your computer's anti-virus software and use it. 8. Have multiple backups of important files. This lowers the chance that all are infected.
  • 15. How to prevent virus infection 9. Install security updates for your operating system and programs as soon as possible. 10. Jump at the chance to learn more about your computer. This will help you spot viruses.