SlideShare une entreprise Scribd logo
1  sur  38
Computer Virus
 Computer virus is a software program written with malicious
intentions.
 Computer virus is a harmful software program written intentionally to
enter a computer without the user's permission or knowledge. It has
the ability to replicate itself, thus continuing to spread. Some viruses
do little but replicate, while others can cause severe harm or adversely
affect the program and performance of the system. A virus should
never be assumed harmless and left on a system.
 There are different types of viruses which can be classified according
to their origin, techniques, types of files they infect,
where they hide, the kind of damage they cause,
the type of operating system, or platform they
attack.
Types of Computer Viruses
 There are number of computer viruses that can impede
the functioning of your computer system.
Memory Resident Virus
 These viruses fix themselves in the computer memory and
get activated whenever the OS runs and infects all the files
that are then opened.
 This type of virus hides in the RAM and stays there even
after the malicious code is executed. It gets control over
the system memory and allocate memory blocks through
which it runs its own code, and executes the code when
any function is executed.
 Examples: Randex, CMJ, Meve, and MrKlunky
Direct Action Viruses
 The main purpose of this virus is to replicate and take action
when it is executed. When a specific condition is met, the virus
will go into action and infect files in the directory or folder that
are specified in the AUTOEXEC.BAT file path. This batch file is
always located in the root directory of the hard disk and carries
out certain operations when the computer is booted.
 FindFirst/FindNext technique is used where the code selects a
few files as its victims. It also infects the external devices like pen
drives or hard disks by copying itself on them.
 The viruses keep changing their location into new
files whenever the code is executed, but are
generally found in the hard disk's root directory.
 Target: It can corrupt files. Basically, it is a
file-infecter virus.
 Examples: Vienna virus
Overwrite Viruses
 A virus of this kind is characterized by the fact that it
deletes the information contained in the files that it
infects, rendering them partially or totally useless once
they have been infected.
 The virus replaces the file content. However, it does not
change the file size.
 Examples: Way, Trj.Reboot, Trivial.88.D
Boot Sector Virus
 This type of virus affects the boot sector of a hard disk. This
is a crucial part of the disk, in which information of the disk
itself is stored along with a program that makes it possible
to boot (start) the computer from the disk. This type of
virus is also called Master Boot Sector Virus or Master Boot
Record Virus.
 It hides in the memory until DOS accesses the floppy
disk, and whichever boot data is accessed, the
virus infects it.
 Examples: Polyboot.B, AntiEXE
Macro Virus
 Macro viruses infect files that are created using certain
applications or programs that contain macros, like .doc, .xls,
.pps, .mdb, etc. These mini-programs make it possible to
automate series of operations so that they are performed
as a single action, thereby saving the user from having to
carry them out one by one. These viruses automatically
infect the file that contains macros, and also infects the
templates and documents that the filecontains. It is
referred to as a type of e-mail virus.
 These hide in documents that are
shared via e-mail or networks.
 Examples: Relax, Melissa.A, Bablas,
O97M/Y2K
Directory Virus
 Directory viruses (also called Cluster Virus/File System
Virus) infect the directory of your computer by changing the
path that indicates the location of a file. When you execute
a program file with an extension .EXE or .COM that has
been infected by a virus, you are unknowingly running the
virus program, while the original file and program is
previously moved by the virus. Once infected, it becomes
impossible to locate the original files.
 It is usually located in only one location of the
disk, but infects the entire program in the
directory.
 Examples: Dir-2 virus
Polymorphic Virus
 Polymorphic viruses encrypt or encode themselves in a
different way (using different algorithms and encryption
keys) every time they infect a system. This makes it
impossible for antivirus software to find them using string
or signature searches (because they are different in each
encryption). The virus then goes on to create a large
number of copies.
 Examples: Elkern, Marburg, Satan Bug
and Tuareg
Companion Viruses
 Companion viruses can be considered as a type of file
infector virus, like resident or direct action types. They are
known as companion viruses because once they get into the
system they 'accompany' the other files that already exist. In
other words, to carry out their infection routines,
companion viruses can wait in memory until a program is
run (resident virus), or act immediately by making copies of
themselves (direct action virus).
 These generally use the same filename and create a
different extension of it. For example: If there is a file
"Me.exe", the virus creates another file named "Me.com"
and hides in the new file. When the system calls the
filename "Me", the ".com" file gets executed (as ".com" has
higher priority than ".exe"), thus infecting the system.
 Examples: Stator, Asimov.1539 and Terrax.1069
FAT Virus
 The file allocation table (FAT) is the part of a disk used to
store all the information about the location of files,
available space, unusable space, etc.
 FAT virus attacks the FAT section and may damage crucial
information. It can be especially dangerous as it prevents
access to certain sections of the disk where important files
are stored. Damage caused can result in loss of information
from individual files or even entire directories.
 Examples: Link Virus
Web Scripting Virus
 Many web pages include complex codes in order to create
an interesting and interactive content. This code is often
exploited to bring about certain undesirable actions.
 The main sources of web scripting viruses are the web
browsers or infected web pages.
 Examples: JS.Fortnight is a virus that spreads through
malicious e-mails.
Worms
 A worm is a program very similar to a virus; it has the
ability to self-replicate and can lead to negative effects on
your system. But they can be detected and eliminated by
an antivirus software.
 These generally spread through e-mails and networks. They
do not infect files or damage them, but they replicate so
fast that the entire network may collapse.
 Examples: PSWBugbear.B, Lovgate.F, Trile.C,
Sobig.D, Mapson
Trojans
 Another unsavory breed of malicious code are Trojans or
Trojan horses, which unlike viruses, do not reproduce by
infecting other files, nor do they self-replicate like worms.
In fact, it is a program which disguises itself as a useful
program or application.
 These viruses copy files in your computer (when their
carrier program is executed) that can damage your
data, and even delete it. The attacker can also program the
trojans in such a manner that the
information in your computer is accessible
to them.
 Examples: Trojan.Vundo
Disadvantages od Viruses







Format hard disk
Copy, rename and delete files
Modify files dates and extensions
Display false message every few times
Damage data
Damage software
Disadvantages od Viruses









Computer runs slowly
Random restarts
Unknown and uninstalled icons on desktop
Icons change in appearance
System memory and disk space is reduced
New windows open up at an alarming rate
Error messages on regular basis
Files mysteriously disappear
Computer Anti-Virus
 Antivirus software is a computer program that
detects, prevents, and takes action to disarm or remove
malicious software programs, such as viruses and worms.
 There are certain types of anti-viruses.
Best Computer Anti-Viruses
 There are so many anti-viruses which works against viruses
but some anti-viruses are trusted and are very famous.
 There are 10 ranked anti-viruses by toptenreviews.com
http://anti-virus-software-review.toptenreviews.com/
1- BitDefender Antivirus
•
•
•
•
•
•
•
•
•
•
•

FEATURESSecurity Widget
Active Virus Control
Rescue Mode
Virtualized Browser
Vulnerability Scanner
Remote Management
Scan Dispatcher
Personal Data Filter
Chat Encryption
Personal Data Filter
2- Kaspersky Anti-Virus
• FEATURES• Real-time protection against
computer viruses, spyware &
more
• Ensures the applications on your
PC are safe
• Fast & Efficient PC Performance
• Rollback of harmful malware
activity
3- Norton™ AntiVirus
• FEATURES• Keeps you safe when you surf, shop
and bank online
• Protects you from social media
scams
• Stops both today's and tomorrow's
online threats
• Blocks infected and dangerous
downloads
4- F-Secure ANTI-VIRUS
•
•
•
•
•
•
•

FEATURESProtection against malware
Always up-to-date
Stops intrusions
Instant response against threats
Easy to install and simple to use
Does not slow down your PC
5- AVG Anti-Virus
• FEATURES• Superior Phishing Protection
• Link Scanner® Checks Websites
so You Can Browse Safely
• Download and share files risk
free
• Social Networking Protection –
NEW and unique to AVG
6- BullGuard Anti-Virus
•
•
•
•
•
•
•
•
•
•
•

FEATURESAntivirus protection
Antispyware protection
Safe browsing
Spam filter
PC Tune Up
Vulnerability Scanner
Parental Control
FREE Online Backup
Identity protection
Social Media Protection
7- G Data Anti- Virus
•
•
•
•
•

FEATURESProtection against malware
Always up-to-date
Stops intrusions
Instant response against
threats
• Easy to install and simple to
use
• Does not slow down your
PC
8- Panda Antivirus
• FEATURES• Protection against all kinds of
known and unknown threats.
• Protect your communications
against online fraud.
• Protect your networks against
hackers and intruders.
9- Avast Antivirus
•
•
•
•
•
•

FEATURESAnti-malware Protection
Safe Zone
Anti-spam
Data Shredder
Windows Compatible
10- McAfee Anti-Virus
•
•
•
•
•
•
•
•
•
•
•

FEATURESSecurity Widget
Active Virus Control
Rescue Mode
Virtualized Browser
Vulnerability Scanner
Remote Management
Scan Dispatcher
Personal Data Filter
Chat Encryption
Personal Data Filter
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

List of all Anti-Viruses

Avira Antivirus
Avast Antivirus
AVG Antivirus
Immunet Protect
Emsisoft Antimalware
Digital Patrol
K7 Antivirus
eScan Antivirus
Comodo Antivirus
Dr.Web Antivirus
Digital Defender Antivirus
Norman Antivirus
Clam Antivirus
F-Prot Antivirus
Kaspersky Antivirus
Vipre Antivirus

•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

Trend Micro Antivirus
Sophos Antivirus
Panda Cloud Antivirus
Tizer Secure
FortiClient Antivirus
Solo Antivirus
Twister Antivirus
Ad-Aware Internet Security
VBA32 Antivirus
Quick Heal Antivirus
Rising Antivirus
Kingsoft Antivirus
Vexira Antivirus
Arcavir Antivirus
nProtect Antivirus
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

List of all Anti-Viruses

ViRobot Antivirus
Antiy Antivirus
System Shield Antivirus
CSAM Antivirus
Blue Point Security
Microsoft Security Essentials
Net Protector Antivirus
eAcceleration Antivirus
Zillya! Antivirus
Paretologic Antivirus Plus
Blink Personal
Drive Sentry
FSB Antivirus
Norton Antivirus
Coranti Antivirus
Ashampoo Anti-malware
McAfee Antivirus

•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

Trustport Antivirus
Webroot Antivirus
My Free Antivirus
F-Secure Antivirus
Bullguard Antivirus
CA Antivirus
Cyber Defender
Protector Plus
G Data Antivirus
Max Secure Antivirus
ClamWin
Spyware Doctor
Outpost Antivirus
Zone Alarm Antivirus
BitDefender Antivirus
Advantages of Anti-Virus
• Having a good anti-virus program can be the difference
between the life and death of your computer.
• With so many computer viruses in existence, protecting your
computer's security should be one of your top priorities.
• Aside from just stopping viruses, most anti-virus programs
have other features, such as firewalls, that will ensure the
well-rounded safety and security of
your valued computer.
• The basic advantages of an anti viru
are as given:
Advantages of Anti-Virus
 Protection from Viruses
The basic aim of an Anti virus is to protect your computer
from viruses. An anti virus will prevent you from getting
viruses such as trojans, malware and spyware. Viruses range
in severity from the harmless to the downright system
crippling.
Advantages of Anti-Virus
 Protecting Personal Information
• Hackers and viruses go hand in hand. A good anti-virus
program will protect you while you surf the Internet,
preventing hackers from gaining access to personal things
such as credit card information and bank account access.
The firewall feature included with most anti-virus software
will block any unauthorized incoming connections to your
network or computer, preventing hackers from digging
their hooks into your life and your computer.
Advantages of Anti-Virus
 Protecting Personal Data
If you have an anti virus then you
don’t need to worry
about the virus that it will:
 Format hard disk
 Copy, rename and delete files
 Modify files dates and extensions
 Display false message every few
times
 Damage data
 Damage software
Advantages of Anti-Virus
 Computer runs slowly
 Random restarts
 Unknown and uninstalled icons on
desktop
 Icons change in appearance
 System memory and disk space is
reduced
 New windows open up at an
alarming rate
 Error messages on regular basis
 Files mysteriously disappear
Advantages of Anti-Virus
 Protecting Personal Information
• Hackers and viruses go hand in hand. A good anti-virus
program will protect you while you surf the
Internet, preventing hackers from gaining access to
personal things such as credit card information and bank
account access. The firewall feature included with most
anti-virus software will block any unauthorized incoming
connections
to your network or computer,
preventing hackers from
digging their hooks into your
life and your computer.
Virus vs anti virus

Contenu connexe

Tendances

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.QuratNaeem
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 

Tendances (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer security
Computer securityComputer security
Computer security
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 

En vedette

The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationN V Amruth Varma
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 

En vedette (8)

The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint Presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 

Similaire à Virus vs anti virus (20)

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Computer virus
Computer virusComputer virus
Computer virus
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 

Dernier (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

Virus vs anti virus

  • 1.
  • 2. Computer Virus  Computer virus is a software program written with malicious intentions.  Computer virus is a harmful software program written intentionally to enter a computer without the user's permission or knowledge. It has the ability to replicate itself, thus continuing to spread. Some viruses do little but replicate, while others can cause severe harm or adversely affect the program and performance of the system. A virus should never be assumed harmless and left on a system.  There are different types of viruses which can be classified according to their origin, techniques, types of files they infect, where they hide, the kind of damage they cause, the type of operating system, or platform they attack.
  • 3. Types of Computer Viruses  There are number of computer viruses that can impede the functioning of your computer system.
  • 4. Memory Resident Virus  These viruses fix themselves in the computer memory and get activated whenever the OS runs and infects all the files that are then opened.  This type of virus hides in the RAM and stays there even after the malicious code is executed. It gets control over the system memory and allocate memory blocks through which it runs its own code, and executes the code when any function is executed.  Examples: Randex, CMJ, Meve, and MrKlunky
  • 5. Direct Action Viruses  The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that are specified in the AUTOEXEC.BAT file path. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.  FindFirst/FindNext technique is used where the code selects a few files as its victims. It also infects the external devices like pen drives or hard disks by copying itself on them.  The viruses keep changing their location into new files whenever the code is executed, but are generally found in the hard disk's root directory.  Target: It can corrupt files. Basically, it is a file-infecter virus.  Examples: Vienna virus
  • 6. Overwrite Viruses  A virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.  The virus replaces the file content. However, it does not change the file size.  Examples: Way, Trj.Reboot, Trivial.88.D
  • 7. Boot Sector Virus  This type of virus affects the boot sector of a hard disk. This is a crucial part of the disk, in which information of the disk itself is stored along with a program that makes it possible to boot (start) the computer from the disk. This type of virus is also called Master Boot Sector Virus or Master Boot Record Virus.  It hides in the memory until DOS accesses the floppy disk, and whichever boot data is accessed, the virus infects it.  Examples: Polyboot.B, AntiEXE
  • 8. Macro Virus  Macro viruses infect files that are created using certain applications or programs that contain macros, like .doc, .xls, .pps, .mdb, etc. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one. These viruses automatically infect the file that contains macros, and also infects the templates and documents that the filecontains. It is referred to as a type of e-mail virus.  These hide in documents that are shared via e-mail or networks.  Examples: Relax, Melissa.A, Bablas, O97M/Y2K
  • 9. Directory Virus  Directory viruses (also called Cluster Virus/File System Virus) infect the directory of your computer by changing the path that indicates the location of a file. When you execute a program file with an extension .EXE or .COM that has been infected by a virus, you are unknowingly running the virus program, while the original file and program is previously moved by the virus. Once infected, it becomes impossible to locate the original files.  It is usually located in only one location of the disk, but infects the entire program in the directory.  Examples: Dir-2 virus
  • 10. Polymorphic Virus  Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. This makes it impossible for antivirus software to find them using string or signature searches (because they are different in each encryption). The virus then goes on to create a large number of copies.  Examples: Elkern, Marburg, Satan Bug and Tuareg
  • 11. Companion Viruses  Companion viruses can be considered as a type of file infector virus, like resident or direct action types. They are known as companion viruses because once they get into the system they 'accompany' the other files that already exist. In other words, to carry out their infection routines, companion viruses can wait in memory until a program is run (resident virus), or act immediately by making copies of themselves (direct action virus).  These generally use the same filename and create a different extension of it. For example: If there is a file "Me.exe", the virus creates another file named "Me.com" and hides in the new file. When the system calls the filename "Me", the ".com" file gets executed (as ".com" has higher priority than ".exe"), thus infecting the system.  Examples: Stator, Asimov.1539 and Terrax.1069
  • 12. FAT Virus  The file allocation table (FAT) is the part of a disk used to store all the information about the location of files, available space, unusable space, etc.  FAT virus attacks the FAT section and may damage crucial information. It can be especially dangerous as it prevents access to certain sections of the disk where important files are stored. Damage caused can result in loss of information from individual files or even entire directories.  Examples: Link Virus
  • 13. Web Scripting Virus  Many web pages include complex codes in order to create an interesting and interactive content. This code is often exploited to bring about certain undesirable actions.  The main sources of web scripting viruses are the web browsers or infected web pages.  Examples: JS.Fortnight is a virus that spreads through malicious e-mails.
  • 14. Worms  A worm is a program very similar to a virus; it has the ability to self-replicate and can lead to negative effects on your system. But they can be detected and eliminated by an antivirus software.  These generally spread through e-mails and networks. They do not infect files or damage them, but they replicate so fast that the entire network may collapse.  Examples: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson
  • 15. Trojans  Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses, do not reproduce by infecting other files, nor do they self-replicate like worms. In fact, it is a program which disguises itself as a useful program or application.  These viruses copy files in your computer (when their carrier program is executed) that can damage your data, and even delete it. The attacker can also program the trojans in such a manner that the information in your computer is accessible to them.  Examples: Trojan.Vundo
  • 16. Disadvantages od Viruses       Format hard disk Copy, rename and delete files Modify files dates and extensions Display false message every few times Damage data Damage software
  • 17. Disadvantages od Viruses         Computer runs slowly Random restarts Unknown and uninstalled icons on desktop Icons change in appearance System memory and disk space is reduced New windows open up at an alarming rate Error messages on regular basis Files mysteriously disappear
  • 18. Computer Anti-Virus  Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms.  There are certain types of anti-viruses.
  • 19. Best Computer Anti-Viruses  There are so many anti-viruses which works against viruses but some anti-viruses are trusted and are very famous.  There are 10 ranked anti-viruses by toptenreviews.com http://anti-virus-software-review.toptenreviews.com/
  • 20. 1- BitDefender Antivirus • • • • • • • • • • • FEATURESSecurity Widget Active Virus Control Rescue Mode Virtualized Browser Vulnerability Scanner Remote Management Scan Dispatcher Personal Data Filter Chat Encryption Personal Data Filter
  • 21. 2- Kaspersky Anti-Virus • FEATURES• Real-time protection against computer viruses, spyware & more • Ensures the applications on your PC are safe • Fast & Efficient PC Performance • Rollback of harmful malware activity
  • 22. 3- Norton™ AntiVirus • FEATURES• Keeps you safe when you surf, shop and bank online • Protects you from social media scams • Stops both today's and tomorrow's online threats • Blocks infected and dangerous downloads
  • 23. 4- F-Secure ANTI-VIRUS • • • • • • • FEATURESProtection against malware Always up-to-date Stops intrusions Instant response against threats Easy to install and simple to use Does not slow down your PC
  • 24. 5- AVG Anti-Virus • FEATURES• Superior Phishing Protection • Link Scanner® Checks Websites so You Can Browse Safely • Download and share files risk free • Social Networking Protection – NEW and unique to AVG
  • 25. 6- BullGuard Anti-Virus • • • • • • • • • • • FEATURESAntivirus protection Antispyware protection Safe browsing Spam filter PC Tune Up Vulnerability Scanner Parental Control FREE Online Backup Identity protection Social Media Protection
  • 26. 7- G Data Anti- Virus • • • • • FEATURESProtection against malware Always up-to-date Stops intrusions Instant response against threats • Easy to install and simple to use • Does not slow down your PC
  • 27. 8- Panda Antivirus • FEATURES• Protection against all kinds of known and unknown threats. • Protect your communications against online fraud. • Protect your networks against hackers and intruders.
  • 28. 9- Avast Antivirus • • • • • • FEATURESAnti-malware Protection Safe Zone Anti-spam Data Shredder Windows Compatible
  • 29. 10- McAfee Anti-Virus • • • • • • • • • • • FEATURESSecurity Widget Active Virus Control Rescue Mode Virtualized Browser Vulnerability Scanner Remote Management Scan Dispatcher Personal Data Filter Chat Encryption Personal Data Filter
  • 30. • • • • • • • • • • • • • • • • List of all Anti-Viruses Avira Antivirus Avast Antivirus AVG Antivirus Immunet Protect Emsisoft Antimalware Digital Patrol K7 Antivirus eScan Antivirus Comodo Antivirus Dr.Web Antivirus Digital Defender Antivirus Norman Antivirus Clam Antivirus F-Prot Antivirus Kaspersky Antivirus Vipre Antivirus • • • • • • • • • • • • • • • Trend Micro Antivirus Sophos Antivirus Panda Cloud Antivirus Tizer Secure FortiClient Antivirus Solo Antivirus Twister Antivirus Ad-Aware Internet Security VBA32 Antivirus Quick Heal Antivirus Rising Antivirus Kingsoft Antivirus Vexira Antivirus Arcavir Antivirus nProtect Antivirus
  • 31. • • • • • • • • • • • • • • • • • List of all Anti-Viruses ViRobot Antivirus Antiy Antivirus System Shield Antivirus CSAM Antivirus Blue Point Security Microsoft Security Essentials Net Protector Antivirus eAcceleration Antivirus Zillya! Antivirus Paretologic Antivirus Plus Blink Personal Drive Sentry FSB Antivirus Norton Antivirus Coranti Antivirus Ashampoo Anti-malware McAfee Antivirus • • • • • • • • • • • • • • • Trustport Antivirus Webroot Antivirus My Free Antivirus F-Secure Antivirus Bullguard Antivirus CA Antivirus Cyber Defender Protector Plus G Data Antivirus Max Secure Antivirus ClamWin Spyware Doctor Outpost Antivirus Zone Alarm Antivirus BitDefender Antivirus
  • 32. Advantages of Anti-Virus • Having a good anti-virus program can be the difference between the life and death of your computer. • With so many computer viruses in existence, protecting your computer's security should be one of your top priorities. • Aside from just stopping viruses, most anti-virus programs have other features, such as firewalls, that will ensure the well-rounded safety and security of your valued computer. • The basic advantages of an anti viru are as given:
  • 33. Advantages of Anti-Virus  Protection from Viruses The basic aim of an Anti virus is to protect your computer from viruses. An anti virus will prevent you from getting viruses such as trojans, malware and spyware. Viruses range in severity from the harmless to the downright system crippling.
  • 34. Advantages of Anti-Virus  Protecting Personal Information • Hackers and viruses go hand in hand. A good anti-virus program will protect you while you surf the Internet, preventing hackers from gaining access to personal things such as credit card information and bank account access. The firewall feature included with most anti-virus software will block any unauthorized incoming connections to your network or computer, preventing hackers from digging their hooks into your life and your computer.
  • 35. Advantages of Anti-Virus  Protecting Personal Data If you have an anti virus then you don’t need to worry about the virus that it will:  Format hard disk  Copy, rename and delete files  Modify files dates and extensions  Display false message every few times  Damage data  Damage software
  • 36. Advantages of Anti-Virus  Computer runs slowly  Random restarts  Unknown and uninstalled icons on desktop  Icons change in appearance  System memory and disk space is reduced  New windows open up at an alarming rate  Error messages on regular basis  Files mysteriously disappear
  • 37. Advantages of Anti-Virus  Protecting Personal Information • Hackers and viruses go hand in hand. A good anti-virus program will protect you while you surf the Internet, preventing hackers from gaining access to personal things such as credit card information and bank account access. The firewall feature included with most anti-virus software will block any unauthorized incoming connections to your network or computer, preventing hackers from digging their hooks into your life and your computer.