SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
CONTENTS
 VIRUS
 PREVENTION FROMVIRUSES
 WORMS
 PREVENTION FROMWORMS
 DIFFERENCE
VIRUS
 DEFINATION :
VIRUS IS A PROGRAM CODE THAT
ATTACHES TO APPLICATION
PROGRAM i.e. AN .exe FILE. AND
WHEN APPLICATION PROGRAM
RUNS IT RUNS ALONG WITH IT.
EXAMPLE :
MELISSA V/E.
HOW TO KNOW WETHER YOU
ARE INFECTED OR NOT ?
 SYMPTOMS :
UNUSUALVISUAL ORVFX (SOUND
EFFECTS).
LOSS OR CORRUPTION OF DATA ON
SYSTEM.
COMPUTER RESTARTING
UNEXPECTEDLY.
WHAT CAN A VIRUS DO ?
 IT CAN DELETE OR CORRUPTTHE DATA
ON SYSTEM.
 DISABLETHE COMPUTER BY DAMAGING
OS SYSTEM FILES.
PREVENTION
 BESTWAYTO PREVENTTHEVIRUS ATTACK
ON SYSTEM IS BY BUYING A GENUINE
COPY OFANTIVIRUS.
 ALSO GETTHE LATEST SECURITY PATCH
INSTALLED ON SYSTEM FOR MSWINDOWS
OS.
WORMS
 DEFINATION
IT IS A CODETHAT REPLICATE ITSELF IN
ORDERTO CONSUME RESOURCESTO
BRINGTHE SYSTEM DOWN
E.G :
CODE REDWORM
HOW TO KNOW WETHER
INFECTED BY WORM OR NOT ?
 WHEN INFECTED SYSTEM BECOMESVERY
SLOW.
 UNWANTED FOLDERSAPPEARS FROM
NOWHERE.
 E.G :
$RECYCLE.BIN
SystemVolume Information
WHAT DOES WORM DO ?
 IT REPLICATESTHE DATA FILES ONTHE
SYSTEMSTHUS USING A LARGEAMMOUNT
OF STORAGE SPACE.
 CAUSES A SERVERTO SLOW DOWN.
PREVENTION
 TO PREVENT ITWE NEEDTO USE LATEST
ANTIVIRUS ORANTI-MALWARE
SOFTWARE.
 GETTHE LATEST SECURITYPATCH
INSTALLED.
 WE CANALSO USETHE FIREWALL.
ANY DIFFERENCE ?
VIRUS WORM
 IT INSERTS ITSELF
INTOA FILE OR
EXECUTABLE
PROGRAM.
 IT RELAYS ONTHE
USERTOTRANSFER
TO OTHER SYSTEM.
 IT HARMS i.e.
DELETES OR
MODIFIES FILES.
 IT EXPLOITSWEAKNESS
INAPPLICATION OR OS
BY REPLICATING
ITSELF.
 IT USES NETWORKTO
TRANSFERWITHOUT
INTERVENTION OF
USER.
 IT GENERALLY
MONOPOLIES CPU &
MEMORY.
THANK YOU

Contenu connexe

Tendances (20)

virus
virusvirus
virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computer virus
computer viruscomputer virus
computer virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
The Giant Black Book Of Computer Viruses
The Giant Black Book Of Computer VirusesThe Giant Black Book Of Computer Viruses
The Giant Black Book Of Computer Viruses
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 

Similaire à Virus & Worms(20120628)

Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ictmakanaya
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
does avast remove malware
does avast remove malwaredoes avast remove malware
does avast remove malwaressuser1eca7d
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaILAKIA
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewallsJay Shah
 
Computer virus presenatation
Computer virus presenatationComputer virus presenatation
Computer virus presenatationrarediamond_2012
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityUltraUploader
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 
Social impacts of it
Social impacts of it Social impacts of it
Social impacts of it Amit Jaglan
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIROTakagi Kun
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptxdianemullin2
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer virusestheonlineguru
 

Similaire à Virus & Worms(20120628) (20)

Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
Malware
MalwareMalware
Malware
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
does avast remove malware
does avast remove malwaredoes avast remove malware
does avast remove malware
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Virus
VirusVirus
Virus
 
Computer virus presenatation
Computer virus presenatationComputer virus presenatation
Computer virus presenatation
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Social impacts of it
Social impacts of it Social impacts of it
Social impacts of it
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIRO
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptx
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer viruses
 

Dernier

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Dernier (20)

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 

Virus & Worms(20120628)

  • 1.
  • 2. CONTENTS  VIRUS  PREVENTION FROMVIRUSES  WORMS  PREVENTION FROMWORMS  DIFFERENCE
  • 3. VIRUS  DEFINATION : VIRUS IS A PROGRAM CODE THAT ATTACHES TO APPLICATION PROGRAM i.e. AN .exe FILE. AND WHEN APPLICATION PROGRAM RUNS IT RUNS ALONG WITH IT. EXAMPLE : MELISSA V/E.
  • 4. HOW TO KNOW WETHER YOU ARE INFECTED OR NOT ?  SYMPTOMS : UNUSUALVISUAL ORVFX (SOUND EFFECTS). LOSS OR CORRUPTION OF DATA ON SYSTEM. COMPUTER RESTARTING UNEXPECTEDLY.
  • 5. WHAT CAN A VIRUS DO ?  IT CAN DELETE OR CORRUPTTHE DATA ON SYSTEM.  DISABLETHE COMPUTER BY DAMAGING OS SYSTEM FILES.
  • 6. PREVENTION  BESTWAYTO PREVENTTHEVIRUS ATTACK ON SYSTEM IS BY BUYING A GENUINE COPY OFANTIVIRUS.  ALSO GETTHE LATEST SECURITY PATCH INSTALLED ON SYSTEM FOR MSWINDOWS OS.
  • 7. WORMS  DEFINATION IT IS A CODETHAT REPLICATE ITSELF IN ORDERTO CONSUME RESOURCESTO BRINGTHE SYSTEM DOWN E.G : CODE REDWORM
  • 8. HOW TO KNOW WETHER INFECTED BY WORM OR NOT ?  WHEN INFECTED SYSTEM BECOMESVERY SLOW.  UNWANTED FOLDERSAPPEARS FROM NOWHERE.  E.G : $RECYCLE.BIN SystemVolume Information
  • 9. WHAT DOES WORM DO ?  IT REPLICATESTHE DATA FILES ONTHE SYSTEMSTHUS USING A LARGEAMMOUNT OF STORAGE SPACE.  CAUSES A SERVERTO SLOW DOWN.
  • 10. PREVENTION  TO PREVENT ITWE NEEDTO USE LATEST ANTIVIRUS ORANTI-MALWARE SOFTWARE.  GETTHE LATEST SECURITYPATCH INSTALLED.  WE CANALSO USETHE FIREWALL.
  • 11. ANY DIFFERENCE ? VIRUS WORM  IT INSERTS ITSELF INTOA FILE OR EXECUTABLE PROGRAM.  IT RELAYS ONTHE USERTOTRANSFER TO OTHER SYSTEM.  IT HARMS i.e. DELETES OR MODIFIES FILES.  IT EXPLOITSWEAKNESS INAPPLICATION OR OS BY REPLICATING ITSELF.  IT USES NETWORKTO TRANSFERWITHOUT INTERVENTION OF USER.  IT GENERALLY MONOPOLIES CPU & MEMORY.