SlideShare a Scribd company logo
By-
Anubhav Sinha
IX A
What’s Inside?
• What is a virus?
• More about virus
• Who wrote it and why?
• How do they spread?
• Kinds of virus……………….
• What is a worm?
• Difference between virus and worms
• 2014
What is a virus?
– An executable code
– That could make copies of itself or attach
itself to other executable codes
– Most of computer viruses have their
latency period.
– Attack programs or data on your hard
drive on a specific day when conditions
has been fulfilled.
More about Virus…..
• A virus is a small piece of software that piggybacks
on real programs.
• Computer viruses are called viruses because they
share some of the same traits of biological viruses.
Who write virus and why?
To prove their own theories.
– To see if they can do it.
– People who are political, religionary ardor.
– People usually publish their virus source
codes in BBSes or the Internet for users
who are interested in computer virus
programming.
– Most of them belong to specific
organizations
Difference between a worm and a virus
• Virus
– Usually small size programs ( 3-30k )
– Designed to evade detection
• Worm
– Sends itself to other systems
– Bigger in size than virus
– Not easy to write
From where does these virus spread?
• Medium
– Hard disk , Floppy disks , Tape
– Optical media
– Memory
• Internet
– E-mail attachments
– .exe .bat .vbs
• Research : One in every five hundred e-mail
messages contain a virus.
Kinds of virus
Computer viruses - A daily harm
Memory Resident Virus
Hideout: This type of virus hides in the RAM
and stays there even after the malicious
code is executed
• Target: It can corrupt files and programs
that are opened, closed, copied, renamed,
etc.
• Examples: Randex, CMJ, Meve, and
MrKlunky
• Protection: Install an antivirus program.
Direct Action Viruses
Hideout: The viruses keep changing their
location into new files whenever the code
is executed, but are generally found in the
hard disk's root directory.
• Target: It can corrupt files.
• Examples: Vienna virus
• Protection: Install an antivirus scanner.
Overwrite Viruses
Hideout: The virus replaces the file content.
However, it does not change the file size.
• Examples: Way, Trj.Reboot, Trivial.88.D
• Protection: The only way to clean a file
infected by an overwrite virus is to delete
the file completely, thus losing the original
content.
Boot Sector Virus
• HIdeout: It hides in the memory until DOS
accesses the floppy disk, and whichever
boot data is accessed, the virus infects it.
• Examples: Polyboot.B, AntiEXE
• Protection: Ensure that floppy disks are
write-protected
Macro Virus
Hideout: These hide in documents that
are shared via e-mail or networks.
Examples: Relax, Melissa. A, Bablas,
O97M/Y2
Protection: Avoid opening e-mails from
unknown senders. Also, disabling macros
can help to protect your useful data.
Polymorphic Virus
Polymorphic viruses encrypt or encode
themselves in a different way (using
different algorithms and encryption keys)
every time they infect a system.
Examples: Elkern, Marburg, Satan Bug
and Tureen.
Protection: Install a high-end antivirus as
the normal ones are incapable of detecting
this type of virus.
FAT Virus
Hideout FAT virus attacks the FAT section and
may damage crucial information. It can be
especially dangerous as it prevents access to
certain sections of the disk where important files
are stored.
Examples: Link Virus
Protection: Before the virus attacks all the
files on the computer, locate all the files
that are actually needed on the hard drive,
and then delete the ones that are not
needed.
Multipartite Virus
Hideout: In the initial phase, these viruses
tend to hide in the memory as the resident
viruses do; then they infect the hard disk.
Examples: Invader, Flip and Tequila
Protection: You need to clean the boot
sector and also the disk to get rid of the
virus, and then reload all the data in it.
Trojans
• Trojans
In fact, it is a program which disguises
itself as a useful program or application.
▶ Beware of the fact that these viruses
copy files in your computer (when their
carrier program is executed) that can
damage your data, and even delete it.
2014's Worst Viruses
! Flame: It is said to be the first of its kind that uses
Bluetooth as the spread medium. It was first detected in a
Russian lab.
! Belgian Computer Crime Virus: This virus spread
globally and asked the users for some vital information
and a processing fee, claiming that it was for police records.
! Shamoon: This virus is dangerous as it creates files of
the data on your hard disk, and then this compiled data is
sent to the attacker.
Computer viruses - A daily harm
Computer viruses - A daily harm
Computer viruses - A daily harm

More Related Content

PPTX
Computer Viruses
PPTX
Computer virus 1
PPTX
Virus soran university
PPT
10 Worst Computer Viruses of all time
PPT
How Computer Viruses Work
PPTX
Viruses & worms
PPTX
Computer virus
PPTX
computer viruses
Computer Viruses
Computer virus 1
Virus soran university
10 Worst Computer Viruses of all time
How Computer Viruses Work
Viruses & worms
Computer virus
computer viruses

What's hot (20)

PPTX
Virus and worms
PPT
As computer virus
PPT
Computer viruses and anti viruses by sasikumar
PPTX
Computer virus (Microsoft Powerpoint)
PPT
Computer Worms
PPTX
Virus and Anti virus
PPT
Computer virus
ODP
Virus and antivirus final ppt
PDF
Lecture malicious software
DOC
Revision Viruses (Gerardo E)
PPTX
Types of computer viruses
PPTX
Program security
PDF
Viruses and antiviruses
PPT
PPTX
Antivirus programs
PPT
All about viruse,Malwares,
PPT
Viruses
 
PPTX
Viruspresentacion10
Virus and worms
As computer virus
Computer viruses and anti viruses by sasikumar
Computer virus (Microsoft Powerpoint)
Computer Worms
Virus and Anti virus
Computer virus
Virus and antivirus final ppt
Lecture malicious software
Revision Viruses (Gerardo E)
Types of computer viruses
Program security
Viruses and antiviruses
Antivirus programs
All about viruse,Malwares,
Viruses
 
Viruspresentacion10
Ad

Viewers also liked (20)

PPTX
PPTX
virus salami attack and trojan horse
PPTX
Virusppt
PPT
Virus part1
PPTX
Computer viruses
PPT
PPTX
Computer virus
PPT
Virus project
PPT
Viruses (Lecture) IT Slides # 3
PPTX
Virus vs anti virus
PPTX
Computer viruses
PPTX
Presentation on Computer Viruses
PPTX
Computer virus & its cure
PPTX
Computer virus
PPTX
Antivirus PPt
ODP
Computer virus
PPTX
presentation on computer virus
PPTX
Computer Virus powerpoint presentation
PPT
Computer viruses
PPTX
ANTIVIRUS AND VIRUS Powerpoint presentation
virus salami attack and trojan horse
Virusppt
Virus part1
Computer viruses
Computer virus
Virus project
Viruses (Lecture) IT Slides # 3
Virus vs anti virus
Computer viruses
Presentation on Computer Viruses
Computer virus & its cure
Computer virus
Antivirus PPt
Computer virus
presentation on computer virus
Computer Virus powerpoint presentation
Computer viruses
ANTIVIRUS AND VIRUS Powerpoint presentation
Ad

Similar to Computer viruses - A daily harm (20)

PPTX
Virus and malware presentation
PPT
Computer viruses
PPTX
Virus and Anti Virus - Types of Virus and Anti Virus
PDF
Virussss.pdf
PPTX
Computer viruses and prevention techniques
PPTX
Computervirus 110705112128-phpapp02
PDF
Computer virus
PPTX
Computer virus & its cure
PPTX
information about virus
PPT
Computer Virus
PDF
Dilsher idrees mustafa_6_a_vulnerabilities_study
PPT
Rajul computer presentation
PPTX
Computer virus
PPT
anti_virus
PPT
Viruses notes1
PPTX
Computer virus and antivirus
ODP
Viruses andthreats@dharmesh
PPT
Computer virus
PPTX
Viruses notes
PPTX
Virus and its types 2
Virus and malware presentation
Computer viruses
Virus and Anti Virus - Types of Virus and Anti Virus
Virussss.pdf
Computer viruses and prevention techniques
Computervirus 110705112128-phpapp02
Computer virus
Computer virus & its cure
information about virus
Computer Virus
Dilsher idrees mustafa_6_a_vulnerabilities_study
Rajul computer presentation
Computer virus
anti_virus
Viruses notes1
Computer virus and antivirus
Viruses andthreats@dharmesh
Computer virus
Viruses notes
Virus and its types 2

Recently uploaded (20)

PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
The various Industrial Revolutions .pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
August Patch Tuesday
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
OMC Textile Division Presentation 2021.pptx
Getting started with AI Agents and Multi-Agent Systems
gpt5_lecture_notes_comprehensive_20250812015547.pdf
What is a Computer? Input Devices /output devices
Hindi spoken digit analysis for native and non-native speakers
The various Industrial Revolutions .pptx
A novel scalable deep ensemble learning framework for big data classification...
observCloud-Native Containerability and monitoring.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Zenith AI: Advanced Artificial Intelligence
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
August Patch Tuesday
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
WOOl fibre morphology and structure.pdf for textiles
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Final SEM Unit 1 for mit wpu at pune .pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Programs and apps: productivity, graphics, security and other tools
Group 1 Presentation -Planning and Decision Making .pptx
OMC Textile Division Presentation 2021.pptx

Computer viruses - A daily harm

  • 2. What’s Inside? • What is a virus? • More about virus • Who wrote it and why? • How do they spread? • Kinds of virus………………. • What is a worm? • Difference between virus and worms • 2014
  • 3. What is a virus? – An executable code – That could make copies of itself or attach itself to other executable codes – Most of computer viruses have their latency period. – Attack programs or data on your hard drive on a specific day when conditions has been fulfilled.
  • 4. More about Virus….. • A virus is a small piece of software that piggybacks on real programs. • Computer viruses are called viruses because they share some of the same traits of biological viruses.
  • 5. Who write virus and why? To prove their own theories. – To see if they can do it. – People who are political, religionary ardor. – People usually publish their virus source codes in BBSes or the Internet for users who are interested in computer virus programming. – Most of them belong to specific organizations
  • 6. Difference between a worm and a virus • Virus – Usually small size programs ( 3-30k ) – Designed to evade detection • Worm – Sends itself to other systems – Bigger in size than virus – Not easy to write
  • 7. From where does these virus spread? • Medium – Hard disk , Floppy disks , Tape – Optical media – Memory • Internet – E-mail attachments – .exe .bat .vbs • Research : One in every five hundred e-mail messages contain a virus.
  • 10. Memory Resident Virus Hideout: This type of virus hides in the RAM and stays there even after the malicious code is executed • Target: It can corrupt files and programs that are opened, closed, copied, renamed, etc. • Examples: Randex, CMJ, Meve, and MrKlunky • Protection: Install an antivirus program.
  • 11. Direct Action Viruses Hideout: The viruses keep changing their location into new files whenever the code is executed, but are generally found in the hard disk's root directory. • Target: It can corrupt files. • Examples: Vienna virus • Protection: Install an antivirus scanner.
  • 12. Overwrite Viruses Hideout: The virus replaces the file content. However, it does not change the file size. • Examples: Way, Trj.Reboot, Trivial.88.D • Protection: The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.
  • 13. Boot Sector Virus • HIdeout: It hides in the memory until DOS accesses the floppy disk, and whichever boot data is accessed, the virus infects it. • Examples: Polyboot.B, AntiEXE • Protection: Ensure that floppy disks are write-protected
  • 14. Macro Virus Hideout: These hide in documents that are shared via e-mail or networks. Examples: Relax, Melissa. A, Bablas, O97M/Y2 Protection: Avoid opening e-mails from unknown senders. Also, disabling macros can help to protect your useful data.
  • 15. Polymorphic Virus Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. Examples: Elkern, Marburg, Satan Bug and Tureen. Protection: Install a high-end antivirus as the normal ones are incapable of detecting this type of virus.
  • 16. FAT Virus Hideout FAT virus attacks the FAT section and may damage crucial information. It can be especially dangerous as it prevents access to certain sections of the disk where important files are stored. Examples: Link Virus Protection: Before the virus attacks all the files on the computer, locate all the files that are actually needed on the hard drive, and then delete the ones that are not needed.
  • 17. Multipartite Virus Hideout: In the initial phase, these viruses tend to hide in the memory as the resident viruses do; then they infect the hard disk. Examples: Invader, Flip and Tequila Protection: You need to clean the boot sector and also the disk to get rid of the virus, and then reload all the data in it.
  • 18. Trojans • Trojans In fact, it is a program which disguises itself as a useful program or application. ▶ Beware of the fact that these viruses copy files in your computer (when their carrier program is executed) that can damage your data, and even delete it.
  • 19. 2014's Worst Viruses ! Flame: It is said to be the first of its kind that uses Bluetooth as the spread medium. It was first detected in a Russian lab. ! Belgian Computer Crime Virus: This virus spread globally and asked the users for some vital information and a processing fee, claiming that it was for police records. ! Shamoon: This virus is dangerous as it creates files of the data on your hard disk, and then this compiled data is sent to the attacker.