Computer Virus
Computer Virus:
• A computer virus is a program or piece of code that is loaded onto our
computer without our knowledge and runs against our wishes.
• It is a harmful software program
• It can replicate itself
• All computer viruses are man made. Once created and released, however
,their spread is not directly under human control.
• According to Webster’s collegiate Dictionary
Computer virus is “a computer program usually hidden within another
seemingly innocuous program that produces copies of itself and inserts them
into other programs or files ,and that usually perform a malicious action “
Common virus infection symptoms
• Unexplained messages appears on the screen
• Specific files are mysteriously deleted
• Unknown files are added to the disk
• An entire disk or drive is erased
• The keyboard doesn’t work properly
Worm
• A worm is a special type of virus that can replicate itself and use
memory, but cannot attach itself to other programs.
• It uses a computer network to spread itself
Virus types:
Which can be classified according to their origin
techniques, types of files they infect, platform they attack etc
1.Memory resident virus vs non-memory resident virus
A memory-resident virus installs itself as part of the operating
system when executed, after which it remains in RAM from the time
the computer is booted up to when it is shut down. Resident viruses
overwrite interrupt handling code or other functions, and when the
operating system attempts to access the target file or disk sector, the
virus code intercepts the request and redirects the control flow to the
replication module, infecting the target. In contrast, a non-memory-
resident virus (or "non-resident virus"), when executed, scans the disk
for targets, infects them, and then exits (i.e. it does not remain in
memory after it is done executing).
Boot sector virus
• Boot sector viruses specifically target the boot sector and/or
the Master Boot Record (MBR) of the host's hard drive or removable
storage media (flash drives, floppy disks, etc.)
Macro Virus
•
Many common applications, such as Microsoft Outlook and Microsoft
Word, allow macro programs to be embedded in documents or
emails, so that the programs may be run automatically when the
document is opened. A macro virus (or "document virus") is a virus
that is written in a macro language, and embedded into these
documents so that when users open the file, the virus code is
executed, and can infect the user's computer.
Email virus
• Email virus – A virus that intentionally, rather than accidentally, uses
the email system to spread. While virus infected files may be
accidentally sent as email attachments, email viruses are aware of
email system functions. They generally target a specific type of email
system (Microsoft's Outlook is the most commonly used), harvest
email addresses from various sources, and may append copies of
themselves to all email sent, or may generate email messages
containing copies of themselves as attachments.

More Related Content

PPTX
Computer Virus powerpoint presentation
PPTX
Computer virus
PPT
Computer Virus
PPTX
Virus and its types 2
PPTX
computer virus and related legal issues
PPTX
virus and antivirus
PPT
Virus part2
Computer Virus powerpoint presentation
Computer virus
Computer Virus
Virus and its types 2
computer virus and related legal issues
virus and antivirus
Virus part2

What's hot (20)

PPT
PPTX
Computer Virus 2017
PPTX
Computer Virus
PPT
PPTX
Introduction to Computer Virus
PPTX
Computer virus and worms
PPTX
Computer virus
PPTX
Computer virus
PPT
PPTX
Presentation Slide: Computer Virus
PPTX
computer Virus
PPT
PPT
Presentation on computer viruses
PPTX
Virus vs anti virus
PPTX
Virus and Anti Virus - Types of Virus and Anti Virus
PPTX
Computer virus
PPTX
Presentation on virus
PDF
Computer viruses
PPTX
PPT
10 Worst Computer Viruses of all time
Computer Virus 2017
Computer Virus
Introduction to Computer Virus
Computer virus and worms
Computer virus
Computer virus
Presentation Slide: Computer Virus
computer Virus
Presentation on computer viruses
Virus vs anti virus
Virus and Anti Virus - Types of Virus and Anti Virus
Computer virus
Presentation on virus
Computer viruses
10 Worst Computer Viruses of all time
Ad

Similar to Computer virus (20)

PPTX
FCS Presentation.pptx
PPTX
Madhu Devi ppt(computer virus and its management).pptx
PPTX
Madhu Devi ppt(computer virus and its management).pptx
PPTX
Mrtr ret retrt retrdretre hu Dertretevi ppt(computer virus and its management...
PPT
Computer virus 18
PDF
What are Computer Viruses.pdf
PPTX
suraj singh Bed PPT(Computer Virus and its management).pptx
PPT
Viruses notes1
DOCX
Computer viruses by joy chakraborty
PPTX
PPT on information technology laws description
PPT
Computer Virus And Antivirus-Sumon Chakraborty
PPTX
Viruses notes
PPT
Computer virus
PDF
Antivirus security
PDF
computer virus Report
PPT
Computer virus
ODP
Virus and antivirus final ppt
PPSX
Computer viruses
PPSX
Computer viruses
PPTX
How computer works against thevirus or any threat
FCS Presentation.pptx
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
Mrtr ret retrt retrdretre hu Dertretevi ppt(computer virus and its management...
Computer virus 18
What are Computer Viruses.pdf
suraj singh Bed PPT(Computer Virus and its management).pptx
Viruses notes1
Computer viruses by joy chakraborty
PPT on information technology laws description
Computer Virus And Antivirus-Sumon Chakraborty
Viruses notes
Computer virus
Antivirus security
computer virus Report
Computer virus
Virus and antivirus final ppt
Computer viruses
Computer viruses
How computer works against thevirus or any threat
Ad

More from vazhichal12 (20)

PDF
Online assignment
DOCX
Assignment
PPTX
Copyright
PPTX
Copyright
DOCX
Online assignment exploratory
DOCX
Curriculum vitae
DOCX
Pedagogy assignment
DOCX
Online assignment Exploratory Learning
DOCX
Keerthana methodology assignment 2
DOCX
Keerthana pedagogy assignment 2
DOCX
Blessy methodology assignment 2
PPTX
PowerPoint presentation
DOCX
Second sem optional assignment 1
DOCX
Online 2
DOCX
Learning management system
PDF
Hsslive gnukhata-handbook-itschool-converted
PPTX
PowerPoint presentation
PDF
ONLINE ASSIGNMENT
PPTX
POWER POINT PRESENTATION
PPTX
Itinerant Retailers
Online assignment
Assignment
Copyright
Copyright
Online assignment exploratory
Curriculum vitae
Pedagogy assignment
Online assignment Exploratory Learning
Keerthana methodology assignment 2
Keerthana pedagogy assignment 2
Blessy methodology assignment 2
PowerPoint presentation
Second sem optional assignment 1
Online 2
Learning management system
Hsslive gnukhata-handbook-itschool-converted
PowerPoint presentation
ONLINE ASSIGNMENT
POWER POINT PRESENTATION
Itinerant Retailers

Recently uploaded (20)

PPTX
2018-HIPAA-Renewal-Training for executives
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
STKI Israel Market Study 2025 version august
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Configure Apache Mutual Authentication
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPT
Geologic Time for studying geology for geologist
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
What is a Computer? Input Devices /output devices
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
2018-HIPAA-Renewal-Training for executives
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Taming the Chaos: How to Turn Unstructured Data into Decisions
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
STKI Israel Market Study 2025 version august
1 - Historical Antecedents, Social Consideration.pdf
Benefits of Physical activity for teenagers.pptx
Developing a website for English-speaking practice to English as a foreign la...
Configure Apache Mutual Authentication
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
CloudStack 4.21: First Look Webinar slides
UiPath Agentic Automation session 1: RPA to Agents
The influence of sentiment analysis in enhancing early warning system model f...
Enhancing plagiarism detection using data pre-processing and machine learning...
Consumable AI The What, Why & How for Small Teams.pdf
Geologic Time for studying geology for geologist
A contest of sentiment analysis: k-nearest neighbor versus neural network
What is a Computer? Input Devices /output devices
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION

Computer virus

  • 2. Computer Virus: • A computer virus is a program or piece of code that is loaded onto our computer without our knowledge and runs against our wishes. • It is a harmful software program • It can replicate itself • All computer viruses are man made. Once created and released, however ,their spread is not directly under human control. • According to Webster’s collegiate Dictionary Computer virus is “a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files ,and that usually perform a malicious action “
  • 3. Common virus infection symptoms • Unexplained messages appears on the screen • Specific files are mysteriously deleted • Unknown files are added to the disk • An entire disk or drive is erased • The keyboard doesn’t work properly
  • 4. Worm • A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs. • It uses a computer network to spread itself
  • 5. Virus types: Which can be classified according to their origin techniques, types of files they infect, platform they attack etc 1.Memory resident virus vs non-memory resident virus A memory-resident virus installs itself as part of the operating system when executed, after which it remains in RAM from the time the computer is booted up to when it is shut down. Resident viruses overwrite interrupt handling code or other functions, and when the operating system attempts to access the target file or disk sector, the virus code intercepts the request and redirects the control flow to the replication module, infecting the target. In contrast, a non-memory- resident virus (or "non-resident virus"), when executed, scans the disk for targets, infects them, and then exits (i.e. it does not remain in memory after it is done executing).
  • 6. Boot sector virus • Boot sector viruses specifically target the boot sector and/or the Master Boot Record (MBR) of the host's hard drive or removable storage media (flash drives, floppy disks, etc.)
  • 7. Macro Virus • Many common applications, such as Microsoft Outlook and Microsoft Word, allow macro programs to be embedded in documents or emails, so that the programs may be run automatically when the document is opened. A macro virus (or "document virus") is a virus that is written in a macro language, and embedded into these documents so that when users open the file, the virus code is executed, and can infect the user's computer.
  • 8. Email virus • Email virus – A virus that intentionally, rather than accidentally, uses the email system to spread. While virus infected files may be accidentally sent as email attachments, email viruses are aware of email system functions. They generally target a specific type of email system (Microsoft's Outlook is the most commonly used), harvest email addresses from various sources, and may append copies of themselves to all email sent, or may generate email messages containing copies of themselves as attachments.