SlideShare a Scribd company logo
Computer Viruses and Environmental Hazards
Computer Viruses and
Environmental Hazards
Computer Viruses and Environmental Hazards
Name of the Group Members
Md. Selim Reza Bappy
Computer Viruses and Infest stations
VIRUS stands for Valuable Information Resources Under Seize. A
virus is a program which produces its own code by attacking itself
to other programs in such a way that the virus code is executed. In
other words, Viruses are programs that share some or all of the
following characteristics with real viruses:
 They have destructive behavior.
They rely on a host to survive and spread. Executing the host program
will also activate the virus program, without the user knowing.
They can protect themselves.
They can protect themselves against attempts to detect and remove them.
Not all viruses have all these characteristics because virus
technology changes to fast.
Viruses come in many different forms, but they all potentially have two phases to their
execution:
Infection Phases
When the virus executes, it will infect other programs. Some
viruses Infect other programs each time they are executed; others infect
only upon a certain trigger. This trigger could be anything-a day or time, an
external event on the pc or a counter within the virus.
Many viruses reside the memory of the pc just as terminate-and-stay-
resident(TSR) program that is loaded into memory but is not immediately
executed, such as screen saver. This means that the viruses can wait for
some external event such as inserting a diskette, copying a
file or executing a program to actually infect another
program. These viruses are very dangerous since it is
hard to guess what trigger condition they use for their
infection. Resident viruses frequently corrupt the
system software on the pc to hide their existence.
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards

More Related Content

PPTX
Virus and Anti virus
PPTX
Types of virus and saviour
PPTX
Presentation on virus
PPS
Virus and antivirus
PPTX
Computer warms viruses trojans and its prevention
PPTX
Computer virus
PPTX
Computer Virus
PPT
Presentation2
Virus and Anti virus
Types of virus and saviour
Presentation on virus
Virus and antivirus
Computer warms viruses trojans and its prevention
Computer virus
Computer Virus
Presentation2

What's hot (20)

DOCX
Different types of computer viruses
PPTX
PDF
What Is An Antivirus Software?
PDF
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
PPTX
DOCX
Assignment of virus
PPTX
Introduction to computer virus
PPT
Computer viruses and antiviruses PPT
PPT
The Way Virus Spread
DOCX
Network virus detection & prevention
PPT
Wikis 1 Assingment
PPTX
Cybercrime: Virus and Defense
PPTX
Mobile virus & worms
PPT
Virus and antivirus
PPTX
computer virus and related legal issues
PPTX
PPTX
Computer virus | Definition | Explaination
PPTX
Computer viruses
PPTX
Computer Virus
Different types of computer viruses
What Is An Antivirus Software?
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Assignment of virus
Introduction to computer virus
Computer viruses and antiviruses PPT
The Way Virus Spread
Network virus detection & prevention
Wikis 1 Assingment
Cybercrime: Virus and Defense
Mobile virus & worms
Virus and antivirus
computer virus and related legal issues
Computer virus | Definition | Explaination
Computer viruses
Computer Virus
Ad

Similar to Computer Viruses and Environmental Hazards (20)

PPT
PPTX
Virus ......................... Khatarn
PPT
over view of viruses
PPTX
Virus and Antivirus
PPTX
PPT on information technology laws description
PDF
A short course on computer viruses
PPT
Computer viruses 911 computer support
PPT
Computer viruses 911 computer support
PPTX
Computer Virus
PPTX
Presentation_malware_anti_malware.pptx
PPT
PPTX
Kinds of Viruses
PPTX
DOCX
Computer virus
PDF
malwareanti-malware-160630191004 (1).pdf
PPTX
Malware & Anti-Malware
PPTX
Computer viruses and its advantages.pptx
PPT
Computer virus
PPT
6unit1 virus and their types
PPT
Viruses
 
Virus ......................... Khatarn
over view of viruses
Virus and Antivirus
PPT on information technology laws description
A short course on computer viruses
Computer viruses 911 computer support
Computer viruses 911 computer support
Computer Virus
Presentation_malware_anti_malware.pptx
Kinds of Viruses
Computer virus
malwareanti-malware-160630191004 (1).pdf
Malware & Anti-Malware
Computer viruses and its advantages.pptx
Computer virus
6unit1 virus and their types
Viruses
 
Ad

More from Selim Reza Bappy (6)

PPTX
Digital Bangladesh: our expectation and Reality
PPTX
Construction of Classified and Dictionary Catalogues and Objectives, Utilit...
PPTX
Technologies used in a library : problems and solutions
PPTX
Impact of ICT on Society
PPTX
Library automation in Bangladesh: Past, Present, Future
PPTX
Centralization and decentralization
Digital Bangladesh: our expectation and Reality
Construction of Classified and Dictionary Catalogues and Objectives, Utilit...
Technologies used in a library : problems and solutions
Impact of ICT on Society
Library automation in Bangladesh: Past, Present, Future
Centralization and decentralization

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Spectroscopy.pptx food analysis technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25 Week I
Advanced methodologies resolving dimensionality complications for autism neur...
Chapter 3 Spatial Domain Image Processing.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectroscopy.pptx food analysis technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Understanding_Digital_Forensics_Presentation.pptx
MYSQL Presentation for SQL database connectivity
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)

Computer Viruses and Environmental Hazards

  • 4. Name of the Group Members Md. Selim Reza Bappy
  • 5. Computer Viruses and Infest stations VIRUS stands for Valuable Information Resources Under Seize. A virus is a program which produces its own code by attacking itself to other programs in such a way that the virus code is executed. In other words, Viruses are programs that share some or all of the following characteristics with real viruses:  They have destructive behavior. They rely on a host to survive and spread. Executing the host program will also activate the virus program, without the user knowing. They can protect themselves. They can protect themselves against attempts to detect and remove them. Not all viruses have all these characteristics because virus technology changes to fast.
  • 6. Viruses come in many different forms, but they all potentially have two phases to their execution: Infection Phases When the virus executes, it will infect other programs. Some viruses Infect other programs each time they are executed; others infect only upon a certain trigger. This trigger could be anything-a day or time, an external event on the pc or a counter within the virus. Many viruses reside the memory of the pc just as terminate-and-stay- resident(TSR) program that is loaded into memory but is not immediately executed, such as screen saver. This means that the viruses can wait for some external event such as inserting a diskette, copying a file or executing a program to actually infect another program. These viruses are very dangerous since it is hard to guess what trigger condition they use for their infection. Resident viruses frequently corrupt the system software on the pc to hide their existence.