SlideShare a Scribd company logo
Computer Virus
Prepare by- Shripati pritam sahoo
Date:-may,2023
Table of Content
 History
 What is computer virus
 Symptoms
 Types of computer virus
 The spread of the virus
 What computer virus do
 Preventation from computer virus
 Best antivirus software
 Conclusion
History of computer virus
 The first computer virus was called creeper.It was
invented in the early 1970’s. Since then, millions
of viruses have been invented.
 The first known computer virus was written in
1981 by a man named Rich Skrenta. This virus
was termed Elk Cloner, and was the first computer
virus to appear outside the computer where it was
created in.
What is computer virus
 A computer virus is a malicious application used to
perform destructive activity on a device or local
network.
 The code’s malicious activity could damage the local
file system, steal data, interrupt services, download
additional malware, or any other actions coded into
the program by the malware author.
Symptoms
 Your computer or web browser has dramatically slowed down over a period of
a few days/a week
 Frequent freezing or crashing
 Modified or deleted files
 New programs or desktop icons that you do not recall installing/creating
 Programs running without your consent
 Programs closing without your consent
 Changes in your security settings
 Unusual emails/social media messages being sent without your permission to a
large audience
 Your default search engine has been changed without you altering it
 New toolbars in the web browser
 Browser links redirect to the wrong web page
Types of Computer virus
There are eight main virus types, some of which could be packaged with
other malware to increase the chance of infection and damage. The 8
major categories for viruses are:
1.Boot Sector virus- A boot sector virus damages or controls the boot sector on
the drive, rendering the machine unusable.
2.Direct action virus-When a user executes a harmless file attached with
malicious code, direct action viruses deliver a payload immediately.
3.Web scripting virus-Most browsers have defenses against malicious web
scripts, but older, unsupported browsers that allow an attacker to run code
on the local device.
4.Polymorphic virus-Polymorphic viruses make it more difficult for an antivirus
to detect and remove them
5.File infector virus-A threat actor uses file infector viruses to inject malicious
code into critical files that run the operating system or important programs
6.Browser hijacker- A virus that can change the settings on your browser
will hijack browser favorites, the home page URL and redirect you to a
malicious site
7.Resident virus- A virus that can access computer memory and sit until
a payload is delivered is considered a resident virus.
8.Macro virus- Microsoft Office files can run macros, and these macros
can be used to download additional malware or run malicious code. Macro
viruses deliver a payload when the file is opened, and the macro runs.
Latest viruses
 DEXTER-
 Dexter is a computer virus or point of sale
malware which infects computers running Microsoft
Windows and was discovered by IT security, in
December 2012.
 It infects PoS(point of sale) systems worldwide and
steals sensitive information such as Credit Card and
Debit Card information.
 REVETON-
1.In 2012, a major ransomware know as Reveton
began to spread.
2 .Reveton is a malware which attempts to extort
money from a user.
3 .It Claims that your computer has been used for
unauthorized activites.
 CRYPTOLOCKER-
1.encrypting ransomware appeard in 2013 known
as Crypto Locker.
2.cryptolocker demands a pyment with either a
moneyPak card or Bitcoin to recover the key.
3.cryptolocker to be extremely difficult to repair.
The spread of the virus
1.Infected applications move from one computer to
another easily because users are unaware their
application is infected and will share, transfer, or install
them without a care in the world.
2.Some users are unaware that their email software is
being controlled by the virus (mail hijack) and viruses
are actually emailing themselves to the contacts in the
email contacts list.
3.Users can also download viruses if they are using
pirated apps, or have accessed an infected code
repository.
What does a computer virus do?
The way a computer virus acts depends on how it’s coded. It could
be something as simple as a prank that doesn’t cause any damage,
or it could be leading to criminal activity and fraud. Many viruses
only affect a local device, but others spread across a network
environment to find other hosts.
How to prevent computer viruses
 Install antivirus software: Antivirus should run on
any device connected to the network. It’s your first
defense against viruses. Antivirus software stops
malware executables from running on your local
device.
 Don’t open executable email attachments: Many
malware attacks including ransomware start with a
malicious email attachment. Executable attachments
should never be opened, and users should avoid
running macros programmed into files such as
Microsoft Word or Excel.
 Keep your operating system updated: Developers for all
major operating systems release patches to remediate common
bugs . Always keep your operating system updated and stop
using end-of-life versions (e.g., Windows 7 or Windows XP).
 Avoid questionable websites: You should always keep your
browser updated with the latest patches, but avoiding these
sites will stop drive-by downloads or redirecting you to sites that
host malware.
 Don’t use pirated software: Free pirated software might be
tempting, but it’s often packaged with malware. Download
vendor software only from the official source and avoid using
software that’s pirated and shared.
Best antivirus software
1.McAfee
2.Nortan
3.TOTALAV
4.Intego
5.Bitdefender
6.Panda
7.PROTECT
Conclusion
In our technology- dependent society, the computer
is the mastert it controls our entertainment, our
power plants, our military and much more.
However, because of the dependency on the
computer and other technologies, the virus can easily
do millions or even billions of dollars in damage.
THANK YOU

More Related Content

PPTX
Computer virus
DOCX
Computer virus
PPTX
Computer virus
PPTX
Computer virus
PPTX
Preventing Viruses and other Malicious Code.pptx
PPTX
Virus and malware presentation
PPTX
Computer viruses
ODP
Viruses andthreats@dharmesh
Computer virus
Computer virus
Computer virus
Computer virus
Preventing Viruses and other Malicious Code.pptx
Virus and malware presentation
Computer viruses
Viruses andthreats@dharmesh

Similar to computervirus.ppt (20)

PPTX
a pptx presentation file about computer viruses
PDF
What are Computer Viruses.pdf
PPTX
Computer virus
PPTX
Computer virus
PPTX
Securing The Computer From Viruses ...
PPTX
Computer Virus ppt.pptx
PPTX
Introduction to Computer Virus
PPTX
Virus vs anti virus
PPTX
PPTX
PPT on information technology laws description
PPTX
Firewall , Viruses and Antiviruses
PPTX
Virus and antivirus
PPTX
Computer security.pptx
PDF
computer virus Report
DOCX
COMPUTERS ( types of viruses)
PPTX
Computer Introduction-Lecture04
PPT
Computer virus and antivirus
PPTX
MALWARE AND ITS TYPES
PPT
Virus project
a pptx presentation file about computer viruses
What are Computer Viruses.pdf
Computer virus
Computer virus
Securing The Computer From Viruses ...
Computer Virus ppt.pptx
Introduction to Computer Virus
Virus vs anti virus
PPT on information technology laws description
Firewall , Viruses and Antiviruses
Virus and antivirus
Computer security.pptx
computer virus Report
COMPUTERS ( types of viruses)
Computer Introduction-Lecture04
Computer virus and antivirus
MALWARE AND ITS TYPES
Virus project
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
A Presentation on Artificial Intelligence
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Machine Learning_overview_presentation.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Spectroscopy.pptx food analysis technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Programs and apps: productivity, graphics, security and other tools
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
Assigned Numbers - 2025 - Bluetooth® Document
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
The AUB Centre for AI in Media Proposal.docx
Review of recent advances in non-invasive hemoglobin estimation
A Presentation on Artificial Intelligence
Advanced methodologies resolving dimensionality complications for autism neur...
Spectral efficient network and resource selection model in 5G networks
Machine Learning_overview_presentation.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectroscopy.pptx food analysis technology
Building Integrated photovoltaic BIPV_UPV.pdf
Ad

computervirus.ppt

  • 1. Computer Virus Prepare by- Shripati pritam sahoo Date:-may,2023
  • 2. Table of Content  History  What is computer virus  Symptoms  Types of computer virus  The spread of the virus  What computer virus do  Preventation from computer virus  Best antivirus software  Conclusion
  • 3. History of computer virus  The first computer virus was called creeper.It was invented in the early 1970’s. Since then, millions of viruses have been invented.  The first known computer virus was written in 1981 by a man named Rich Skrenta. This virus was termed Elk Cloner, and was the first computer virus to appear outside the computer where it was created in.
  • 4. What is computer virus  A computer virus is a malicious application used to perform destructive activity on a device or local network.  The code’s malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions coded into the program by the malware author.
  • 5. Symptoms  Your computer or web browser has dramatically slowed down over a period of a few days/a week  Frequent freezing or crashing  Modified or deleted files  New programs or desktop icons that you do not recall installing/creating  Programs running without your consent  Programs closing without your consent  Changes in your security settings  Unusual emails/social media messages being sent without your permission to a large audience  Your default search engine has been changed without you altering it  New toolbars in the web browser  Browser links redirect to the wrong web page
  • 6. Types of Computer virus There are eight main virus types, some of which could be packaged with other malware to increase the chance of infection and damage. The 8 major categories for viruses are: 1.Boot Sector virus- A boot sector virus damages or controls the boot sector on the drive, rendering the machine unusable. 2.Direct action virus-When a user executes a harmless file attached with malicious code, direct action viruses deliver a payload immediately. 3.Web scripting virus-Most browsers have defenses against malicious web scripts, but older, unsupported browsers that allow an attacker to run code on the local device. 4.Polymorphic virus-Polymorphic viruses make it more difficult for an antivirus to detect and remove them 5.File infector virus-A threat actor uses file infector viruses to inject malicious code into critical files that run the operating system or important programs
  • 7. 6.Browser hijacker- A virus that can change the settings on your browser will hijack browser favorites, the home page URL and redirect you to a malicious site 7.Resident virus- A virus that can access computer memory and sit until a payload is delivered is considered a resident virus. 8.Macro virus- Microsoft Office files can run macros, and these macros can be used to download additional malware or run malicious code. Macro viruses deliver a payload when the file is opened, and the macro runs.
  • 8. Latest viruses  DEXTER-  Dexter is a computer virus or point of sale malware which infects computers running Microsoft Windows and was discovered by IT security, in December 2012.  It infects PoS(point of sale) systems worldwide and steals sensitive information such as Credit Card and Debit Card information.
  • 9.  REVETON- 1.In 2012, a major ransomware know as Reveton began to spread. 2 .Reveton is a malware which attempts to extort money from a user. 3 .It Claims that your computer has been used for unauthorized activites.
  • 10.  CRYPTOLOCKER- 1.encrypting ransomware appeard in 2013 known as Crypto Locker. 2.cryptolocker demands a pyment with either a moneyPak card or Bitcoin to recover the key. 3.cryptolocker to be extremely difficult to repair.
  • 11. The spread of the virus 1.Infected applications move from one computer to another easily because users are unaware their application is infected and will share, transfer, or install them without a care in the world. 2.Some users are unaware that their email software is being controlled by the virus (mail hijack) and viruses are actually emailing themselves to the contacts in the email contacts list. 3.Users can also download viruses if they are using pirated apps, or have accessed an infected code repository.
  • 12. What does a computer virus do? The way a computer virus acts depends on how it’s coded. It could be something as simple as a prank that doesn’t cause any damage, or it could be leading to criminal activity and fraud. Many viruses only affect a local device, but others spread across a network environment to find other hosts.
  • 13. How to prevent computer viruses  Install antivirus software: Antivirus should run on any device connected to the network. It’s your first defense against viruses. Antivirus software stops malware executables from running on your local device.  Don’t open executable email attachments: Many malware attacks including ransomware start with a malicious email attachment. Executable attachments should never be opened, and users should avoid running macros programmed into files such as Microsoft Word or Excel.
  • 14.  Keep your operating system updated: Developers for all major operating systems release patches to remediate common bugs . Always keep your operating system updated and stop using end-of-life versions (e.g., Windows 7 or Windows XP).  Avoid questionable websites: You should always keep your browser updated with the latest patches, but avoiding these sites will stop drive-by downloads or redirecting you to sites that host malware.  Don’t use pirated software: Free pirated software might be tempting, but it’s often packaged with malware. Download vendor software only from the official source and avoid using software that’s pirated and shared.
  • 16. Conclusion In our technology- dependent society, the computer is the mastert it controls our entertainment, our power plants, our military and much more. However, because of the dependency on the computer and other technologies, the virus can easily do millions or even billions of dollars in damage.