SlideShare a Scribd company logo
@ Debraj
@ Debraj Chatterjee
 Computer virus refers to a program which
damages computer systems and/or destroys or
erases data files
 It has a Capability to copy itself and infect a
computer without the permission or
knowledge of the owner.
 One of the first detected virus was the Creeper
virus in the early 70’s
Time
Bomb
Logical
Bomb
Worm
Boot
Sector
Virus
Dos
Virus
Trojan
Horse
Time
Bomb
A time bomb is a virus
program that performs an
activity on a particular
date
It is a piece of Programming
Code designed to damage a
computer system at some
point in the future. Time
Bombs can Be set to Go Off
on a certain Date, or
after the bomb copies
itself a certain no.of
times. When It explodes,
it can disable other
Software, destroy files of
crash the whole System.
Logic Bomb
 A logic bomb is a sort of program or
you can say a part of some program
which let itself dormant till a certain
logic program is activated. A logic
bomb is very comparable to a land mine.
Most of a time an activation key for a
logic bomb, is a date. The logic bomb
keeps checking the system for date and
remains in position till the set time
is reached. As soon as time has been
reached it activates itself.
 Logic bomb lacks the power to replicate
itself so it is an easy task to write a
logic bomb. And it would also don’t
spread to unintended systems. It is a
sort of civilized program threat.
 The classic use of this virus is
ensuring payment for some software. If
you don’t pay for some software then it
is certain that embedded logic bomb
would be activated and deletes that
software from your system. And if more
malicious then it would result other
data deleting from your system.
Worm
Top 10 Computer Worms in
Internet History:
Morris(1988)
Melissa(1999)
I Love You(2000)
Nimdah(2001)
Code Red(2001)
Blaster(2003)
Slammer(2003)
Sasser(2004)
Storm(2007)
Conficker(2009)
It is a code designed to damage a
wide network of Computers. A
common purpose of worms is to
install a backdoor into a
computer. These are programs
that allow others to gain
access to your computer. Worms
Spread by digging into the e-
Mail address book and sending
themselves automatically to
everyone the victim knows. Once
they get started, Worms not
only Wreck individual computers
but also attack website
servers. In 2003, a Worm
threatened to take down the
Whole
internet. W32.Mydoom.AX@mm i
s an example of a worm. It
was designed to allow
spammers to send spam e-
mail from infected computers
Boot Sector Virus
The boot sector is the first software loaded
onto your computer. This program resides on
a disk, and this disk can be either the hard
disk inside the computer, a floppy disk or a
CD.
A boot sector virus infects computers by
modifying the contents of the boot sector
program. It replaces the legitimate contents
with its own infected version. A boot sector
virus can only infect a machine if it is
used to boot-up your computer, e.g. if you
start your computer by using a floppy disk
with an infected boot sector, your computer
is likely to be infected. A boot sector
cannot infect a computer if it is introduced
after the machine is running the operating
system.
An example of a boot sector virus is Parity
Boot. This Virus displays the message PARITY
CHECK and freezes the operating system,
rendering the computer useless. This virus
message is taken from an actual error
message which is displayed to users when a
computer's memory is faulty. As a result, a
user whose computer is infected with the
Parity Boot virus is led to believe that the
machine has a memory fault rather than an
disruptive virus infection.
Dos Virus
The Viruses scripting done
using DOS in known as Dos
Virus.
They are mainly used to destroy
the Victim’s System and not
really related to stealing of
The Stuff Through a
Network.
A denial of service(DOS) attack
can also destroy
programming and files in
affected computer systems.
 ******************************start of code*****
@echo off
cd
cd c:window
@deltree/y c:windows
exit
**************end of code******** ******************************start of code*****
Changing Account Password:
net user [annount_name] *
ex:- net user john *
**************end of code********
******************************start of code*****
Deleting all files of a drive:
@echo off
rd /s /q [drivename:]
**************end of code********
Trojan
Horse
 It is a Malicious Software disguised as
a useful program or computer File.
How Trojans work
 Trojans usually consist of two parts, a
Client and a Server. The server is run
on the victim's machine and listens for
connections from a Client used by the
attacker.
 When the server is run on a machine it
will listen on a specific port or
multiple ports for connections from a
Client. In order for an attacker to
connect to the server they must have
the IP Address of the computer where
the server is being run. Some trojans
have the IP Address of the computer
they are running on sent to the
attacker via email or another form of
communication.
Once a connection is made to the
server, the client can then send
commands to the server; the server will
then execute these commands on the
victim's machine.
Computer Virus
 The one and the safest method is the use of an Anti-Virus
Program.
 How does an Antivirus work?
Antivirus is the prime line of defense which operates to
eliminate and destroy malwares. Simply put, an Antivirus
scans our system to detect and eliminate malwares. Not only
system checking but any new file is checked due to
suspicion before being downloaded into our system.
They Search For Virus Files into the whole System and either
delets them or ignors them according to the User’s Choice.
 Norton Anti-Virus
 Avast Security Centre
 Kaspersky Anti-virus
 Avira Anti-virus
 Quick-Heal Antivirus
 Bit-Defender Antivirus
 Guardian Anti-Virus
Virus Attacks are most Common in every Computer,
specially when connected to the Internet. What We
need to do is to prevent from harming the System.
ACTIONS TO PREVENT VIRUS INFECTION
 Installation and updation of Anti-Virus Programs.
 Installation of Security Updates for the Computer.
 Not Opening of unknown e-Mails which may Contain
mostly Virus Files.
 Backing Up of important files in another Drive.
 Changing the Boot Sequence and setting the Hard Disk
as the 1st priority booting device.
 http://en.wikipedia.org/wiki/Computer_virus
#History
 www.microsoft.com
 www.cdebraj98.blogspot.com
 www.google.com
Computer Virus

More Related Content

PPT
Trojan horse
PPT
PPT
Computer virus and antivirus
PPTX
Viruses and its type..
PPTX
PPT
Computer viruses, types and preventions
PPT
Malicious software
PPT
Computer Virus And Antivirus-Sumon Chakraborty
Trojan horse
Computer virus and antivirus
Viruses and its type..
Computer viruses, types and preventions
Malicious software
Computer Virus And Antivirus-Sumon Chakraborty

What's hot (20)

PPTX
Malware- Types, Detection and Future
PPT
Computer Worms
PPTX
Computer virus (Microsoft Powerpoint)
PPT
virus,worms & analysis
PDF
What is virus and methods to recover from different types of viruses
PPTX
Computer viruses
PPTX
Computer virus
PPT
Computer virus
PPTX
Computer virus
PPT
Jeremy Virus Effect
PPTX
Computer virus
PPT
Computer viruses
DOCX
COMPUTERS ( types of viruses)
PPT
Computer viruses and anti viruses by sasikumar
PPS
introduction to malwares,virus,trojan horse
PPTX
Computer Virus
PPTX
computer viruses power point presentation
PPTX
computer virus
PPT
Trojan Horse Presentation
PPS
Viruses and Anti-Viruses
Malware- Types, Detection and Future
Computer Worms
Computer virus (Microsoft Powerpoint)
virus,worms & analysis
What is virus and methods to recover from different types of viruses
Computer viruses
Computer virus
Computer virus
Computer virus
Jeremy Virus Effect
Computer virus
Computer viruses
COMPUTERS ( types of viruses)
Computer viruses and anti viruses by sasikumar
introduction to malwares,virus,trojan horse
Computer Virus
computer viruses power point presentation
computer virus
Trojan Horse Presentation
Viruses and Anti-Viruses
Ad

Viewers also liked (20)

PPSX
Unit 2
PPT
Ethical Hacking
PPTX
Cyber crime ppt
PPT
Electronic evidence digital evidence in india
PPT
Data protection act
DOCX
Indian evidence act 1872.bose
PPTX
Computer virus & its cure
PPTX
Black hat hackers
PPTX
Hacking Vs Cracking in Computer Networks
PPT
Evidence act1872
PPT
(1) evidence (overview)
PPTX
Data Privacy and Protection Presentation
PPTX
Data protection ppt
PPTX
Computer ethics
PPTX
cyber crime & cyber law
PPTX
An Introduction to Cyber Law - I.T. Act 2000 (India)
PPTX
Software piracy
PPTX
PPTX
Ethical hacking presentation
Unit 2
Ethical Hacking
Cyber crime ppt
Electronic evidence digital evidence in india
Data protection act
Indian evidence act 1872.bose
Computer virus & its cure
Black hat hackers
Hacking Vs Cracking in Computer Networks
Evidence act1872
(1) evidence (overview)
Data Privacy and Protection Presentation
Data protection ppt
Computer ethics
cyber crime & cyber law
An Introduction to Cyber Law - I.T. Act 2000 (India)
Software piracy
Ethical hacking presentation
Ad

Similar to Computer Virus (20)

PPTX
Seminar project(computer virus)
PPT
6unit1 virus and their types
PDF
Virus bashdar
PPT
Computer Viruses and Classification lecture slides ppt
PPTX
Securing The Computer From Viruses ...
PPT
Computer Virus
PPTX
Final malacious softwares
PPTX
Virus and antivirus
PDF
Antivirus security
PPTX
COMPUTER VIRUSES AND SECURITY notes .pptx
PPTX
Kinds of Viruses
ODP
Viruses andthreats@dharmesh
PDF
Computer viruses
PPTX
Computer Introduction-Lecture04
PPTX
Computer Viruses
PPT
Virus worm trojan
PPTX
Computer Virus.pptx
PDF
Computer/Cyber/IT Security MCQ Questions
DOCX
What is a computer virus
Seminar project(computer virus)
6unit1 virus and their types
Virus bashdar
Computer Viruses and Classification lecture slides ppt
Securing The Computer From Viruses ...
Computer Virus
Final malacious softwares
Virus and antivirus
Antivirus security
COMPUTER VIRUSES AND SECURITY notes .pptx
Kinds of Viruses
Viruses andthreats@dharmesh
Computer viruses
Computer Introduction-Lecture04
Computer Viruses
Virus worm trojan
Computer Virus.pptx
Computer/Cyber/IT Security MCQ Questions
What is a computer virus

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Electronic commerce courselecture one. Pdf
PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Empathic Computing: Creating Shared Understanding
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Digital-Transformation-Roadmap-for-Companies.pptx
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
The AUB Centre for AI in Media Proposal.docx
“AI and Expert System Decision Support & Business Intelligence Systems”
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Electronic commerce courselecture one. Pdf
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Empathic Computing: Creating Shared Understanding

Computer Virus

  • 1. @ Debraj @ Debraj Chatterjee
  • 2.  Computer virus refers to a program which damages computer systems and/or destroys or erases data files  It has a Capability to copy itself and infect a computer without the permission or knowledge of the owner.  One of the first detected virus was the Creeper virus in the early 70’s
  • 4. Time Bomb A time bomb is a virus program that performs an activity on a particular date It is a piece of Programming Code designed to damage a computer system at some point in the future. Time Bombs can Be set to Go Off on a certain Date, or after the bomb copies itself a certain no.of times. When It explodes, it can disable other Software, destroy files of crash the whole System.
  • 5. Logic Bomb  A logic bomb is a sort of program or you can say a part of some program which let itself dormant till a certain logic program is activated. A logic bomb is very comparable to a land mine. Most of a time an activation key for a logic bomb, is a date. The logic bomb keeps checking the system for date and remains in position till the set time is reached. As soon as time has been reached it activates itself.  Logic bomb lacks the power to replicate itself so it is an easy task to write a logic bomb. And it would also don’t spread to unintended systems. It is a sort of civilized program threat.  The classic use of this virus is ensuring payment for some software. If you don’t pay for some software then it is certain that embedded logic bomb would be activated and deletes that software from your system. And if more malicious then it would result other data deleting from your system.
  • 6. Worm Top 10 Computer Worms in Internet History: Morris(1988) Melissa(1999) I Love You(2000) Nimdah(2001) Code Red(2001) Blaster(2003) Slammer(2003) Sasser(2004) Storm(2007) Conficker(2009) It is a code designed to damage a wide network of Computers. A common purpose of worms is to install a backdoor into a computer. These are programs that allow others to gain access to your computer. Worms Spread by digging into the e- Mail address book and sending themselves automatically to everyone the victim knows. Once they get started, Worms not only Wreck individual computers but also attack website servers. In 2003, a Worm threatened to take down the Whole internet. W32.Mydoom.AX@mm i s an example of a worm. It was designed to allow spammers to send spam e- mail from infected computers
  • 7. Boot Sector Virus The boot sector is the first software loaded onto your computer. This program resides on a disk, and this disk can be either the hard disk inside the computer, a floppy disk or a CD. A boot sector virus infects computers by modifying the contents of the boot sector program. It replaces the legitimate contents with its own infected version. A boot sector virus can only infect a machine if it is used to boot-up your computer, e.g. if you start your computer by using a floppy disk with an infected boot sector, your computer is likely to be infected. A boot sector cannot infect a computer if it is introduced after the machine is running the operating system. An example of a boot sector virus is Parity Boot. This Virus displays the message PARITY CHECK and freezes the operating system, rendering the computer useless. This virus message is taken from an actual error message which is displayed to users when a computer's memory is faulty. As a result, a user whose computer is infected with the Parity Boot virus is led to believe that the machine has a memory fault rather than an disruptive virus infection.
  • 8. Dos Virus The Viruses scripting done using DOS in known as Dos Virus. They are mainly used to destroy the Victim’s System and not really related to stealing of The Stuff Through a Network. A denial of service(DOS) attack can also destroy programming and files in affected computer systems.
  • 9.  ******************************start of code***** @echo off cd cd c:window @deltree/y c:windows exit **************end of code******** ******************************start of code***** Changing Account Password: net user [annount_name] * ex:- net user john * **************end of code******** ******************************start of code***** Deleting all files of a drive: @echo off rd /s /q [drivename:] **************end of code********
  • 10. Trojan Horse  It is a Malicious Software disguised as a useful program or computer File. How Trojans work  Trojans usually consist of two parts, a Client and a Server. The server is run on the victim's machine and listens for connections from a Client used by the attacker.  When the server is run on a machine it will listen on a specific port or multiple ports for connections from a Client. In order for an attacker to connect to the server they must have the IP Address of the computer where the server is being run. Some trojans have the IP Address of the computer they are running on sent to the attacker via email or another form of communication. Once a connection is made to the server, the client can then send commands to the server; the server will then execute these commands on the victim's machine.
  • 12.  The one and the safest method is the use of an Anti-Virus Program.  How does an Antivirus work? Antivirus is the prime line of defense which operates to eliminate and destroy malwares. Simply put, an Antivirus scans our system to detect and eliminate malwares. Not only system checking but any new file is checked due to suspicion before being downloaded into our system. They Search For Virus Files into the whole System and either delets them or ignors them according to the User’s Choice.
  • 13.  Norton Anti-Virus  Avast Security Centre  Kaspersky Anti-virus  Avira Anti-virus  Quick-Heal Antivirus  Bit-Defender Antivirus  Guardian Anti-Virus
  • 14. Virus Attacks are most Common in every Computer, specially when connected to the Internet. What We need to do is to prevent from harming the System. ACTIONS TO PREVENT VIRUS INFECTION  Installation and updation of Anti-Virus Programs.  Installation of Security Updates for the Computer.  Not Opening of unknown e-Mails which may Contain mostly Virus Files.  Backing Up of important files in another Drive.  Changing the Boot Sequence and setting the Hard Disk as the 1st priority booting device.