SlideShare a Scribd company logo
Table of content Introduction Trojan horses Malware Spyware Worms Adware Resources
Introduction Viruses are programs that cause damage to computers Trojan Horse is a program which is used to gain access to a computer by installing a program on infected PC to open some backdoor. [Trojans are -also known as Backdoors]. Worm is a program which infects the computers which are connected by some network. Worms slow down the network. Spywares are the program which are used to monitor/Log the activity performed on a computer. These are used to spy on some one either for legal or illegal purpose. Example: Key logger applications. Adware are the programs which delivers ads to your computer (generally in POP-UP's form). They consume your network. Malwares are the program with malicious intention. It can be damaging your computer, spying on you or any other malicious task . Home
Viruses  Viruses are programs that can replicate itself and it can spread from one computer to another. The first virus was called “The Creeper Virus” (TCV). The Creeper virus was created by Bob Thomas as BBN technology  Home
Trojan horses Are programs that pretend to be something else such as recycle bin  It can be received as a perfectly legal E-mail It can be a photo or a game  A fourth type can be a file that delete an important system file and replace it and this slows the computer Famous example is the “Slavebot”  Trojan horses this type of viruses has a relationship with worms and it help it traveling from one computer to another This type of viruses allow hackers to remotely access computers (back door it)   Home
Worms It computer self replicated program (differ than Viruses that they need internet access It send a copy of it self to other nods ( computer networks One of the famous anti- worms programs is “Lion strong security” Worms slow computers by replicating it self in the memory and creating junk files that are similar to windows files Home
Spyware Spyware  is a type of  malware  that can be installed on computers, and which collects small pieces of information about users without their knowledge. The first use of spyware was on Oct/16 th /1995 when Microsoft had a presentation of a business model, on that day newspapers announce that Microsoft failed in protecting there work  Spyware wasn’t known and it was considered as a virus until 2005 when it attacked again. Norton anti-virus created there first products to protect users from this type of viruses Commonly used in survey as a data collector  Home
Adware Adware or Advertising supporting software is a program that automatically plays an advertisement or download another program without being asked to Some adware can be classified as a  spywares  or  malware Programs have been developed to detect, quarantine, and remove spyware, including Ad-Aware, Malware bytes Anti-Malware, Spyware Doctor and Spybot - Search & Destroy In addition, almost all commercial Anti viruses  software currently detect adware and spyware, or offer a separate spyware detection package Best anti adware is Bitdefender Home
Malware Malware is short for malicious software Malware was designed in 1996  Malware is designed basically to deny operations  All of Trojan horse, Worms, Adware, Spyware are all Malwares Malwares examples are  key gens  and hacking programs such as (Beast and Sub 7) Some malwares contains routines to defend itself against removal this known as  root kits Malwares are advance way of hacking and breaking codes it can be solved using  Malware bytes Anti-Malware PRO Microsoft claims that it encrypted there files to prevent rapid format because of malwares but they didn’t, what they did is renaming “system32” and “system64” files to “WINDOWSx86” and “WINDOWSx64”  Home
Resources http://en.wikipedia.org/wiki/Malware http://www.webopedia.com/TERM/A/adware.html http://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htm http://en.wikipedia.org/wiki/Spyware http://searchsecurity.techtarget.com/definition/Trojan-horse http://en.wikipedia.org/wiki/Virus  Home
Done by: Just buy an apple

More Related Content

PPS
introduction to malwares,virus,trojan horse
PPT
PPT
Trojan horse
PPT
Computer Worms
PPT
virus,worms & analysis
PPTX
PPTX
Malware- Types, Detection and Future
PPTX
Computer Virus
introduction to malwares,virus,trojan horse
Trojan horse
Computer Worms
virus,worms & analysis
Malware- Types, Detection and Future
Computer Virus

What's hot (20)

PPTX
computer virus
PPT
Computer Viruses
PPT
Comp. Viruses
PPT
Computer viruses
PPT
Trojan Horse Presentation
PPT
Today's malware aint what you think
PPT
PPT
Malicious software
PPT
Trojan Horse Virus
PPT
Malware
PPT
Computer virus
PPTX
Computer virus
PPTX
Presentation Virus (salami attack and trojan horse)
PPTX
Virus presentation1
PDF
Malware and security
ODP
Virus&malware
PPT
Malicious
PPS
Viruses and Anti-Viruses
PPTX
Malicious Software Identification
PPT
Ict Assignment
computer virus
Computer Viruses
Comp. Viruses
Computer viruses
Trojan Horse Presentation
Today's malware aint what you think
Malicious software
Trojan Horse Virus
Malware
Computer virus
Computer virus
Presentation Virus (salami attack and trojan horse)
Virus presentation1
Malware and security
Virus&malware
Malicious
Viruses and Anti-Viruses
Malicious Software Identification
Ict Assignment
Ad

Viewers also liked (6)

PPTX
Ebola
PPT
Ebola Virus by Suvanka Shekar Samanta
PPTX
PPTX
PPT
Viral hemorrhagicfever
PDF
LinkedIn SlideShare: Knowledge, Well-Presented
Ebola
Ebola Virus by Suvanka Shekar Samanta
Viral hemorrhagicfever
LinkedIn SlideShare: Knowledge, Well-Presented
Ad

Similar to All about viruse,Malwares, (20)

ODP
Computer Viruses & Management Strategies
PPTX
Computer virus
ODP
Virus and antivirus final ppt
PPTX
Compter virus and its solution
PPTX
What is Malware (Virus), Types of Malware
PPTX
What is Malware (Antivirus)
PPTX
Malware part 1
PDF
Online Safety - Malwares
PPT
How Computer Viruses Work
PPTX
12 Malware very useful Presentation for others
ODP
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
PPTX
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
PPT
Spyware (1).ppt
PPT
Computer virus 18
PPTX
Computer virus
PDF
Malware and malicious programs
PPT
Spyware
PPTX
3rd week holiday homework class 10*.pptx
PPT
4 a module virus and spyware
PPT
Computer Virus
Computer Viruses & Management Strategies
Computer virus
Virus and antivirus final ppt
Compter virus and its solution
What is Malware (Virus), Types of Malware
What is Malware (Antivirus)
Malware part 1
Online Safety - Malwares
How Computer Viruses Work
12 Malware very useful Presentation for others
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
Spyware (1).ppt
Computer virus 18
Computer virus
Malware and malicious programs
Spyware
3rd week holiday homework class 10*.pptx
4 a module virus and spyware
Computer Virus

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
A Presentation on Touch Screen Technology
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
1 - Historical Antecedents, Social Consideration.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A comparative analysis of optical character recognition models for extracting...
Building Integrated photovoltaic BIPV_UPV.pdf
Group 1 Presentation -Planning and Decision Making .pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
TLE Review Electricity (Electricity).pptx
1. Introduction to Computer Programming.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Enhancing emotion recognition model for a student engagement use case through...
Zenith AI: Advanced Artificial Intelligence
A Presentation on Touch Screen Technology
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
MIND Revenue Release Quarter 2 2025 Press Release
NewMind AI Weekly Chronicles - August'25-Week II
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hindi spoken digit analysis for native and non-native speakers
Univ-Connecticut-ChatGPT-Presentaion.pdf
Hybrid model detection and classification of lung cancer
1 - Historical Antecedents, Social Consideration.pdf

All about viruse,Malwares,

  • 1. Table of content Introduction Trojan horses Malware Spyware Worms Adware Resources
  • 2. Introduction Viruses are programs that cause damage to computers Trojan Horse is a program which is used to gain access to a computer by installing a program on infected PC to open some backdoor. [Trojans are -also known as Backdoors]. Worm is a program which infects the computers which are connected by some network. Worms slow down the network. Spywares are the program which are used to monitor/Log the activity performed on a computer. These are used to spy on some one either for legal or illegal purpose. Example: Key logger applications. Adware are the programs which delivers ads to your computer (generally in POP-UP's form). They consume your network. Malwares are the program with malicious intention. It can be damaging your computer, spying on you or any other malicious task . Home
  • 3. Viruses Viruses are programs that can replicate itself and it can spread from one computer to another. The first virus was called “The Creeper Virus” (TCV). The Creeper virus was created by Bob Thomas as BBN technology Home
  • 4. Trojan horses Are programs that pretend to be something else such as recycle bin It can be received as a perfectly legal E-mail It can be a photo or a game A fourth type can be a file that delete an important system file and replace it and this slows the computer Famous example is the “Slavebot” Trojan horses this type of viruses has a relationship with worms and it help it traveling from one computer to another This type of viruses allow hackers to remotely access computers (back door it) Home
  • 5. Worms It computer self replicated program (differ than Viruses that they need internet access It send a copy of it self to other nods ( computer networks One of the famous anti- worms programs is “Lion strong security” Worms slow computers by replicating it self in the memory and creating junk files that are similar to windows files Home
  • 6. Spyware Spyware  is a type of  malware  that can be installed on computers, and which collects small pieces of information about users without their knowledge. The first use of spyware was on Oct/16 th /1995 when Microsoft had a presentation of a business model, on that day newspapers announce that Microsoft failed in protecting there work Spyware wasn’t known and it was considered as a virus until 2005 when it attacked again. Norton anti-virus created there first products to protect users from this type of viruses Commonly used in survey as a data collector Home
  • 7. Adware Adware or Advertising supporting software is a program that automatically plays an advertisement or download another program without being asked to Some adware can be classified as a spywares or malware Programs have been developed to detect, quarantine, and remove spyware, including Ad-Aware, Malware bytes Anti-Malware, Spyware Doctor and Spybot - Search & Destroy In addition, almost all commercial Anti viruses software currently detect adware and spyware, or offer a separate spyware detection package Best anti adware is Bitdefender Home
  • 8. Malware Malware is short for malicious software Malware was designed in 1996 Malware is designed basically to deny operations All of Trojan horse, Worms, Adware, Spyware are all Malwares Malwares examples are key gens and hacking programs such as (Beast and Sub 7) Some malwares contains routines to defend itself against removal this known as root kits Malwares are advance way of hacking and breaking codes it can be solved using Malware bytes Anti-Malware PRO Microsoft claims that it encrypted there files to prevent rapid format because of malwares but they didn’t, what they did is renaming “system32” and “system64” files to “WINDOWSx86” and “WINDOWSx64” Home
  • 9. Resources http://en.wikipedia.org/wiki/Malware http://www.webopedia.com/TERM/A/adware.html http://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htm http://en.wikipedia.org/wiki/Spyware http://searchsecurity.techtarget.com/definition/Trojan-horse http://en.wikipedia.org/wiki/Virus Home
  • 10. Done by: Just buy an apple