SlideShare a Scribd company logo
Viruses By Maryah Rahmat
Introduction A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs too, and it has the chance to reproduce by attaching itself to programs or wreak havoc.   Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. It can be disguised as attachments of funny images, greeting cards, or audio and video files.
Types Of Viruses Viruses corrupts many files on the computer system and create many sorts of problems. Many types of viruses can be categorized as follows: Worms Trojan Horses Bomb Port Scanner
The Worm Viruses A worm is a computer program that has the ability to copy itself from machine to machine. Worms use up computer time and network bandwidth when they are replicating, and they often have some sort of evil intent. Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand from a single copy incredibly quickly.
The Trojan Horses A Trojan horse differs from a virus in that a Trojan horse does not insert its code into other computer files and appears harmless until executed. The term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed.
To Avoid Viruses In The Near Future To avoid your computer from viruses, the main solution is to have your own anti-virus software. Anti-virus software can be installed onto the computer system to protect it from having virus attacks. Anti-virus software are available in computer shops and online shopping. But, always try to get genuine versions so that the software can be easily updated automatically.
Many different websites were used to create and complete this slideshow. I would like to thank the following: www.google.com www.en.wikipedia.org www.howstuffworks.com www.microsoft.com The rest of the World Wide Web is also appreciated in finishing the slideshow. For that, I thank the World Wide Web for existing.  Thank you… Hope you have enjoyed this…

More Related Content

PPTX
Virus worm trojan
PPTX
Kinds of Viruses
DOC
Computer worm
PPS
introduction to malwares,virus,trojan horse
PPT
Trojan horse
PPT
Computer Worms
PPT
Computer viruses and anti viruses by sasikumar
Virus worm trojan
Kinds of Viruses
Computer worm
introduction to malwares,virus,trojan horse
Trojan horse
Computer Worms
Computer viruses and anti viruses by sasikumar

What's hot (19)

PPTX
Computer Virus and Spyware
PDF
Malware and security
PPTX
Virus presentation1
PPTX
Malware- Types, Detection and Future
PPT
Malware
PPT
Computer Viruses
PPT
Trojan Horse Virus
PPT
Viruses and Spyware
PPTX
Computer viruses
PPT
Jeremy Virus Effect
PPSX
Computer viruses
PPTX
Viruses And Hacking
PPTX
Cybercrime: Virus and Defense
PPTX
Virus and Anti virus
PPTX
Trojan horse and salami attack
PPTX
Types of malware
PPTX
Presentation Virus (salami attack and trojan horse)
PPT
Trojan Horse Presentation
PPT
Today's malware aint what you think
Computer Virus and Spyware
Malware and security
Virus presentation1
Malware- Types, Detection and Future
Malware
Computer Viruses
Trojan Horse Virus
Viruses and Spyware
Computer viruses
Jeremy Virus Effect
Computer viruses
Viruses And Hacking
Cybercrime: Virus and Defense
Virus and Anti virus
Trojan horse and salami attack
Types of malware
Presentation Virus (salami attack and trojan horse)
Trojan Horse Presentation
Today's malware aint what you think
Ad

Similar to Viruses (20)

PPTX
Computervirus
PPT
Computer Viruses
PPT
Comp. Viruses
PPTX
Computer virus (Microsoft Powerpoint)
PPTX
Computer virus
PPTX
Computervirus
PPT
Presentation24190
PPT
Computer Virus
PPTX
Computer Security
PPT
How Computer Viruses Work
PPT
Presentation2
PPS
Virus
PPT
Ahmad Pussycat Dolls
PPTX
MALWARE AND ITS TYPES
PPTX
Malware and it's types
PPT
Computer virus 18
PPTX
Ethical hacking trojans, worms and spyware
PPS
Virus worm trojan
ODP
Virus and antivirus final ppt
PPT
Virus worm trojan
Computervirus
Computer Viruses
Comp. Viruses
Computer virus (Microsoft Powerpoint)
Computer virus
Computervirus
Presentation24190
Computer Virus
Computer Security
How Computer Viruses Work
Presentation2
Virus
Ahmad Pussycat Dolls
MALWARE AND ITS TYPES
Malware and it's types
Computer virus 18
Ethical hacking trojans, worms and spyware
Virus worm trojan
Virus and antivirus final ppt
Virus worm trojan
Ad

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPT
What is a Computer? Input Devices /output devices
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Zenith AI: Advanced Artificial Intelligence
cloud_computing_Infrastucture_as_cloud_p
NewMind AI Weekly Chronicles - August'25-Week II
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Final SEM Unit 1 for mit wpu at pune .pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Tartificialntelligence_presentation.pptx
Group 1 Presentation -Planning and Decision Making .pptx
OMC Textile Division Presentation 2021.pptx
observCloud-Native Containerability and monitoring.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Architecture types and enterprise applications.pdf
DP Operators-handbook-extract for the Mautical Institute
gpt5_lecture_notes_comprehensive_20250812015547.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
What is a Computer? Input Devices /output devices

Viruses

  • 2. Introduction A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs too, and it has the chance to reproduce by attaching itself to programs or wreak havoc. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. It can be disguised as attachments of funny images, greeting cards, or audio and video files.
  • 3. Types Of Viruses Viruses corrupts many files on the computer system and create many sorts of problems. Many types of viruses can be categorized as follows: Worms Trojan Horses Bomb Port Scanner
  • 4. The Worm Viruses A worm is a computer program that has the ability to copy itself from machine to machine. Worms use up computer time and network bandwidth when they are replicating, and they often have some sort of evil intent. Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand from a single copy incredibly quickly.
  • 5. The Trojan Horses A Trojan horse differs from a virus in that a Trojan horse does not insert its code into other computer files and appears harmless until executed. The term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed.
  • 6. To Avoid Viruses In The Near Future To avoid your computer from viruses, the main solution is to have your own anti-virus software. Anti-virus software can be installed onto the computer system to protect it from having virus attacks. Anti-virus software are available in computer shops and online shopping. But, always try to get genuine versions so that the software can be easily updated automatically.
  • 7. Many different websites were used to create and complete this slideshow. I would like to thank the following: www.google.com www.en.wikipedia.org www.howstuffworks.com www.microsoft.com The rest of the World Wide Web is also appreciated in finishing the slideshow. For that, I thank the World Wide Web for existing. Thank you… Hope you have enjoyed this…