SlideShare a Scribd company logo
COMPUTER VIRUS
WHAT IS VIRUS ?
 Computer viruses are small software programs that are
designed to spread from one computer to another and to
interference in computer operation.
 A virus might corrupt or delete data on your computer, use
your e-mail program to spread itself to other computers, or
even erase everything on your hard disk.
 Viruses are most easily spread by attachments in e-mail
messages or instant messaging messages.
 That is why it is essential that you never open e-mail
attachments unless you know who it's from and you are
expecting it.
 Once a virus is on your computer, its type or the method it
used to get there is not as important as removing it and
preventing further infection.
 Viruses can be disguised as attachments of funny images,
greeting cards, or audio and video files. Viruses also
spread through downloads on the Internet.
 They can be hidden in illicit software or other files or
programs you might download.
General information about
computer virus
 Different Malware Types.
 Malware is a general name for all programs that are harmful;
viruses, Trojan, worms and all other similar programs.
 These classifications take into account the different ways in
which the virus can infect different parts of a system.
 The manner in which each of these types operates has one
thing in common: any virus has to be executed in order to
operate.
Trojan
 A Trojan Horse is a program that does something else that the
user thought it would do. It is mostly done to someone on
purpose.
 The Trojan Horses are usually masked so that they look
interesting, for example a saxophone. Wav file that interests a
person collecting sound samples of instruments.
 According to an administrator of AOL, the Trojan steals
passwords and sends an E-mail to the hackers fake name and
then the hacker has your account in his hands.
worm
 A worm is a program which spreads usually over network
connections.
 Unlike a virus which attach itself to a host program, worms
always need a host program to spread.
 In practice, worms are not normally associated with one
person computer systems.
 They are mostly found in multi-user systems such as Unix
environments.
 A classic example of a worm is Robert Morrisis Internet-
worm 1988.
Other types of virus
 Bacteria, also known as rabbits, are programs that do not
directly damage the system.
 Instead they replicate themselves until they monopolize CPU,
memory or disk space. This constitutes a denial of service
attack.
 A bomb is actually a type of Trojan horse that can be
used to release a virus or bacteria.
 Bombs work by causing an unauthorized action at a
specified date, time or when a particular condition
occurs.
 There are two types of bombs; logic and time.
 Logic bombs are set to go off when a particular event
occurs. Time bombs go off at a specified time, date or
after a set amount of time elapses.
 Salamis cut away tiny pieces of data. They can be
particularly dangerous as the damage they do is small
and can be attributed to some truncation of the system.
 It is possible for a salami to do a great deal of damage
before it is found.
HOW VIRUSES ACTIVE?
 We are always afraid that viruses do something harmful to
files when they get active, but not all the viruses activate.
Some viruses just spread out, but when viruses activate they
do very different things.
 Might play a part of melody or play music in the background,
show a picture or animated picture, show text, format hard
disk or do changes to files.
 As an example, in one unnamed company: over a long
period of time, the files in a server were corrupted just a
bit.
 So backup copies were taken from the corrupted files. And
after they noticed that something was wrong, it was too
late to get back the data from the backups. That kind of
event is the worst that can happen for the uses.
Computervirus
Computervirus
CONCLUSION
 There are lots of viruses in the world and new viruses are coming up
every day. There are new anti-virus programs and techniques developed
too. It is good to be aware of viruses and other malware and it is cheaper
to protect you environment from them rather then being sorry.
 There might be a virus in your computer if it starts acting differently. There
is no reason to panic if the computer virus is found.
 It is good to be a little suspicious of malware when you surf in the Internet
and download files. Some files that look interesting might hide a malware.
 A computer virus is a program that reproduces itself and its mission is to
spread out. Most viruses are harmless and some viruses might cause
random damage to data files.
 A trojan horse is not a virus because it doesn't reproduce. The trojan
horses are usually masked so that they look interesting. There are trojan
horses that steal passwords and formats hard disks.
Thank You

More Related Content

PPTX
Computer virus
PPTX
Virus and Worms
PPT
Viruses and Spyware
PPTX
PPTX
computer virus
PDF
Malware and security
PPTX
Virus-Awareness
PPS
introduction to malwares,virus,trojan horse
Computer virus
Virus and Worms
Viruses and Spyware
computer virus
Malware and security
Virus-Awareness
introduction to malwares,virus,trojan horse

What's hot (20)

PPTX
Cybercrime: Virus and Defense
PPTX
Security Pp Cis
DOCX
Robert wayman cis 1020 chpt 9
PPT
Viruses
PPT
Ict Assignment
PPTX
Malware programs
PPT
computer vipin kumar ppt
PDF
PPT
Virus worm trojan
PPTX
Anthony Merseal - Steps to Keep Your Computer Virus Free
PPS
Virus worm trojan
PDF
Information security
PPTX
Malware & Anti-Malware
PPTX
Common malware and countermeasures
PPTX
How computer works against thevirus or any threat
PPT
Computer infections and protections(final)
PPTX
Trojan virus & backdoors
PPTX
Viruses & Malware
PPTX
Hacking and virus presentation
PPTX
Learning malware for fun and profit
Cybercrime: Virus and Defense
Security Pp Cis
Robert wayman cis 1020 chpt 9
Viruses
Ict Assignment
Malware programs
computer vipin kumar ppt
Virus worm trojan
Anthony Merseal - Steps to Keep Your Computer Virus Free
Virus worm trojan
Information security
Malware & Anti-Malware
Common malware and countermeasures
How computer works against thevirus or any threat
Computer infections and protections(final)
Trojan virus & backdoors
Viruses & Malware
Hacking and virus presentation
Learning malware for fun and profit
Ad

Viewers also liked (7)

PPTX
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
PPTX
Computervirus 110705112128-phpapp02
PPTX
Antivirus PPt
ODP
Computer virus
PPTX
Computer virus (Microsoft Powerpoint)
PPTX
ANTIVIRUS AND VIRUS Powerpoint presentation
PPTX
Computer Virus powerpoint presentation
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computervirus 110705112128-phpapp02
Antivirus PPt
Computer virus
Computer virus (Microsoft Powerpoint)
ANTIVIRUS AND VIRUS Powerpoint presentation
Computer Virus powerpoint presentation
Ad

Similar to Computervirus (20)

PPT
Computer Virus
PPTX
Computervirus
DOCX
Computer virus (Microsoft Word)
PPTX
Computer Viruses
PDF
COMPUTER VIRUSES AND WORMS.pdf
PPT
Computer Viruses
PPT
Comp. Viruses
PPTX
Virus Lecture #3
PDF
computer virus Report
PPT
PPTX
Computer viruses
PPTX
Internet Security
PPTX
Computer virus
PPTX
Computer Virus
PPTX
Kinds of Viruses
PPT
Viruses, Worms And Trojan Horses
PPTX
Computer Viruses
PPTX
Computer Malware and its types
PPT
Wikis 1 Assingment
PPTX
Malware and it's types
Computer Virus
Computervirus
Computer virus (Microsoft Word)
Computer Viruses
COMPUTER VIRUSES AND WORMS.pdf
Computer Viruses
Comp. Viruses
Virus Lecture #3
computer virus Report
Computer viruses
Internet Security
Computer virus
Computer Virus
Kinds of Viruses
Viruses, Worms And Trojan Horses
Computer Viruses
Computer Malware and its types
Wikis 1 Assingment
Malware and it's types

Recently uploaded (20)

PDF
1_English_Language_Set_2.pdf probationary
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Computer Architecture Input Output Memory.pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
1_English_Language_Set_2.pdf probationary
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Chinmaya Tiranga quiz Grand Finale.pdf
Empowerment Technology for Senior High School Guide
Indian roads congress 037 - 2012 Flexible pavement
Share_Module_2_Power_conflict_and_negotiation.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
What if we spent less time fighting change, and more time building what’s rig...
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Practical Manual AGRO-233 Principles and Practices of Natural Farming
AI-driven educational solutions for real-life interventions in the Philippine...
FORM 1 BIOLOGY MIND MAPS and their schemes
IGGE1 Understanding the Self1234567891011
Computer Architecture Input Output Memory.pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper

Computervirus

  • 2. WHAT IS VIRUS ?  Computer viruses are small software programs that are designed to spread from one computer to another and to interference in computer operation.  A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
  • 3.  Viruses are most easily spread by attachments in e-mail messages or instant messaging messages.  That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.  Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.
  • 4.  Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet.  They can be hidden in illicit software or other files or programs you might download.
  • 5. General information about computer virus  Different Malware Types.  Malware is a general name for all programs that are harmful; viruses, Trojan, worms and all other similar programs.  These classifications take into account the different ways in which the virus can infect different parts of a system.  The manner in which each of these types operates has one thing in common: any virus has to be executed in order to operate.
  • 6. Trojan  A Trojan Horse is a program that does something else that the user thought it would do. It is mostly done to someone on purpose.  The Trojan Horses are usually masked so that they look interesting, for example a saxophone. Wav file that interests a person collecting sound samples of instruments.  According to an administrator of AOL, the Trojan steals passwords and sends an E-mail to the hackers fake name and then the hacker has your account in his hands.
  • 7. worm  A worm is a program which spreads usually over network connections.  Unlike a virus which attach itself to a host program, worms always need a host program to spread.  In practice, worms are not normally associated with one person computer systems.  They are mostly found in multi-user systems such as Unix environments.  A classic example of a worm is Robert Morrisis Internet- worm 1988.
  • 8. Other types of virus  Bacteria, also known as rabbits, are programs that do not directly damage the system.  Instead they replicate themselves until they monopolize CPU, memory or disk space. This constitutes a denial of service attack.
  • 9.  A bomb is actually a type of Trojan horse that can be used to release a virus or bacteria.  Bombs work by causing an unauthorized action at a specified date, time or when a particular condition occurs.  There are two types of bombs; logic and time.  Logic bombs are set to go off when a particular event occurs. Time bombs go off at a specified time, date or after a set amount of time elapses.
  • 10.  Salamis cut away tiny pieces of data. They can be particularly dangerous as the damage they do is small and can be attributed to some truncation of the system.  It is possible for a salami to do a great deal of damage before it is found.
  • 11. HOW VIRUSES ACTIVE?  We are always afraid that viruses do something harmful to files when they get active, but not all the viruses activate. Some viruses just spread out, but when viruses activate they do very different things.  Might play a part of melody or play music in the background, show a picture or animated picture, show text, format hard disk or do changes to files.
  • 12.  As an example, in one unnamed company: over a long period of time, the files in a server were corrupted just a bit.  So backup copies were taken from the corrupted files. And after they noticed that something was wrong, it was too late to get back the data from the backups. That kind of event is the worst that can happen for the uses.
  • 15. CONCLUSION  There are lots of viruses in the world and new viruses are coming up every day. There are new anti-virus programs and techniques developed too. It is good to be aware of viruses and other malware and it is cheaper to protect you environment from them rather then being sorry.  There might be a virus in your computer if it starts acting differently. There is no reason to panic if the computer virus is found.  It is good to be a little suspicious of malware when you surf in the Internet and download files. Some files that look interesting might hide a malware.  A computer virus is a program that reproduces itself and its mission is to spread out. Most viruses are harmless and some viruses might cause random damage to data files.  A trojan horse is not a virus because it doesn't reproduce. The trojan horses are usually masked so that they look interesting. There are trojan horses that steal passwords and formats hard disks.