際際滷

際際滷Share a Scribd company logo
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
At
Glance
What is Virus?
Hackers &
Crackers
Types of
Computer
Viruses
Some other
Harmful
Programs
How you
Protect your
System
against
Viruses ?
A virus is a program that enters the computer system
by attacking itself to another program and then
spreads itself across the system.
There are two different types of people who write
computer virus programs 
Hackers
Crackers
Hackers refers to the people who use their skills to enter into
computer system without authorization. Hackers are
computer enthusiasts, who break into secure systems to gain
knowledge about them and possibly use their knowledge to
play pranks.
A Cracker is malicious programmer who gain unauthorized
access to computer system for the purpose of stealing,
altering or corrupting information.
There are so many types of computer
viruses.
Some of them are :
Macro Virus
File Infector
Resident Virus
Network Virus
Logic Bomb
Boot Sector Virus
Multipartite Virus
Stealth Virus
A macro virus is a computer virus that "infects" a
Microsoft Word or similar application and causes a
sequence of actions to be performed automatically
when the application is started or something else
triggers it. Macro viruses tend to be surprising but
relatively harmless. A typical effect is the undesired
insertion of some comic text at certain points when
writing a line. A macro virus is often spread as an e-
mail virus. A well-known example in March, 1999 was
the Melissa virus virus.
Phrasp the most common type of virus, the file infector
takes root in a host file and then begins its operation
when the file is executed.
The virus may completely
overwrite the file that it infects, or may only replace
parts of the file. Some file infector
viruses attack
themselves to program file, usually selected .COM or
.EXE file.
A board virus definition applies to any
virus that inserts itself into a systems
memory
A kind of virus spreads across networks in computers,
for example, Nimda and SQL SLAMMER worms are
viruses which spread over corporated networks or the
internet via e-mails.
A logic Bomb is a program that get executed only
when specific condition is met. The virus: Friday the
13th, , was so programmed so as to get executed on
that perticular date.
A boot sector virus hides in the boot sector of hard
disk. The boot sector is where your operating
system is. So every time you boot your computer
the virus gets loaded into the computer memory.
Examples of boot-sector viruses are Polyboot B,
AntiEXE.
This virus is spread by infected floppies and CDs.
These viruses first infect the boot sector of hard drive
and then infect the executable files stored in it. For ex.-
Ywinz.
These are some virus which try to hide
themselves from Anti-virus software by
resorting some tricks. Stealth virus can
safely show an anti-virus software that a
certain file is uninfected.
A Trojan Horse program is a file that appears
harmless unless it has executed. The Trojan Horse
program disguises itself as a game or a utility
program but when executed it can destroy the data
stored in the computer. The name Trojan Horse has
been derived from Greek mythology.
Worms are small pieces of software that use
computer network and security holes to replicate
itself.
Worms on the internet spread by e-mail it
searches for all the address book of the mailing
system. It then mails to all recipients.

Install a good Anti-Virus software on your computer.

Update Anti-Virus regularly.

Be careful while Downloading files or programs from the
internet.

Always scan your floppies, CDs, flash drives before using
them.

Do not use pirated software.

Turn on firewall of your computer operating system.
Presented By:
Ad

Recommended

Presentation on Computer Viruses
Presentation on Computer Viruses
Mohak Jain
Computer viruses
Computer viruses
Alishba ijaz Muhammad Ijaz
Computer Virus
Computer Virus
OECLIB Odisha Electronics Control Library
Viruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
Virus bashdar
Virus bashdar
Bashdar Rahman
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
CSE computer virus.pptx. Computer virus.
CSE computer virus.pptx. Computer virus.
ananduappu67
Presentation related to COMPUTER VIRUS.pptx
Presentation related to COMPUTER VIRUS.pptx
rubabnishwa
Computer virus
Computer virus
Utchi
Antivirus security
Antivirus security
mPower Technology
Computer Virus.pptx
Computer Virus.pptx
ZainAli955566
Virus.pptx
Virus.pptx
EimerejDlcrz
Virus
Virus
Tukaram Gundoor
Computer viruses
Computer viruses
SimiAttri
Computer virus
Computer virus
Rahul Baghla
Computer Viruses
Computer Viruses
Aman Chaudhary
Computer virus
Computer virus
Rohit Nayak
Computer virus
Computer virus
Sammer Khizer
Computer virus & its cure
Computer virus & its cure
shubhamverma2711
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
Computer Viruses
Computer Viruses
Tanu Basoiya
PPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
Computer virus
Computer virus
Kawsar Ahmed
computer virus Report
computer virus Report
rawaabdullah
Computer viruses
Computer viruses
aagmansaini
Computer viruses
Computer viruses
MDAZAD53
Computer virus
Computer virus
Ankita Shirke
Computer Viruses
Computer Viruses
adni_shadah
informatique1as_project-virus.pptx
informatique1as_project-virus.pptx
NORTHCUSTOMS
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
NORTHCUSTOMS

More Related Content

Similar to presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx (20)

Computer virus
Computer virus
Utchi
Antivirus security
Antivirus security
mPower Technology
Computer Virus.pptx
Computer Virus.pptx
ZainAli955566
Virus.pptx
Virus.pptx
EimerejDlcrz
Virus
Virus
Tukaram Gundoor
Computer viruses
Computer viruses
SimiAttri
Computer virus
Computer virus
Rahul Baghla
Computer Viruses
Computer Viruses
Aman Chaudhary
Computer virus
Computer virus
Rohit Nayak
Computer virus
Computer virus
Sammer Khizer
Computer virus & its cure
Computer virus & its cure
shubhamverma2711
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
Computer Viruses
Computer Viruses
Tanu Basoiya
PPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
Computer virus
Computer virus
Kawsar Ahmed
computer virus Report
computer virus Report
rawaabdullah
Computer viruses
Computer viruses
aagmansaini
Computer viruses
Computer viruses
MDAZAD53
Computer virus
Computer virus
Ankita Shirke
Computer Viruses
Computer Viruses
adni_shadah
Computer virus
Computer virus
Utchi
Computer Virus.pptx
Computer Virus.pptx
ZainAli955566
Computer viruses
Computer viruses
SimiAttri
Computer virus
Computer virus
Rohit Nayak
Computer virus & its cure
Computer virus & its cure
shubhamverma2711
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
Computer Viruses
Computer Viruses
Tanu Basoiya
PPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
Computer virus
Computer virus
Kawsar Ahmed
computer virus Report
computer virus Report
rawaabdullah
Computer viruses
Computer viruses
aagmansaini
Computer viruses
Computer viruses
MDAZAD53
Computer Viruses
Computer Viruses
adni_shadah

More from NORTHCUSTOMS (7)

informatique1as_project-virus.pptx
informatique1as_project-virus.pptx
NORTHCUSTOMS
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
NORTHCUSTOMS
901130_computer1.ppt
901130_computer1.ppt
NORTHCUSTOMS
virus-part2-150726093824-lva1-app6891.pdf
virus-part2-150726093824-lva1-app6891.pdf
NORTHCUSTOMS
Viruses.ppt
Viruses.ppt
NORTHCUSTOMS
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
NORTHCUSTOMS
惠忰惘惘 悋惠惡 悋惘愕悸 惠悋惡悸 悋悽惠惶惘 .pptx
惠忰惘惘 悋惠惡 悋惘愕悸 惠悋惡悸 悋悽惠惶惘 .pptx
NORTHCUSTOMS
informatique1as_project-virus.pptx
informatique1as_project-virus.pptx
NORTHCUSTOMS
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
NORTHCUSTOMS
901130_computer1.ppt
901130_computer1.ppt
NORTHCUSTOMS
virus-part2-150726093824-lva1-app6891.pdf
virus-part2-150726093824-lva1-app6891.pdf
NORTHCUSTOMS
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
NORTHCUSTOMS
惠忰惘惘 悋惠惡 悋惘愕悸 惠悋惡悸 悋悽惠惶惘 .pptx
惠忰惘惘 悋惠惡 悋惘愕悸 惠悋惡悸 悋悽惠惶惘 .pptx
NORTHCUSTOMS
Ad

Recently uploaded (20)

Romanticism in Love and Sacrifice An Analysis of Oscar Wildes The Nightingal...
Romanticism in Love and Sacrifice An Analysis of Oscar Wildes The Nightingal...
KaryanaTantri21
Birnagar High School Platinum Jubilee Quiz.pptx
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
Peer Teaching Observations During School Internship
Peer Teaching Observations During School Internship
AjayaMohanty7
LDMMIA Yoga S10 Free Workshop Grad Level
LDMMIA Yoga S10 Free Workshop Grad Level
LDM & Mia eStudios
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
Aprendendo Arquitetura Framework Salesforce - Dia 02
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
Gladiolous Cultivation practices by AKL.pdf
Gladiolous Cultivation practices by AKL.pdf
kushallamichhame
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
Ronisha Das
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
List View Components in Odoo 18 - Odoo 際際滷s
List View Components in Odoo 18 - Odoo 際際滷s
Celine George
How to Add New Item in CogMenu in Odoo 18
How to Add New Item in CogMenu in Odoo 18
Celine George
Wage and Salary Computation.ppt.......,x
Wage and Salary Computation.ppt.......,x
JosalitoPalacio
Romanticism in Love and Sacrifice An Analysis of Oscar Wildes The Nightingal...
Romanticism in Love and Sacrifice An Analysis of Oscar Wildes The Nightingal...
KaryanaTantri21
Birnagar High School Platinum Jubilee Quiz.pptx
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
Peer Teaching Observations During School Internship
Peer Teaching Observations During School Internship
AjayaMohanty7
LDMMIA Yoga S10 Free Workshop Grad Level
LDMMIA Yoga S10 Free Workshop Grad Level
LDM & Mia eStudios
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
Aprendendo Arquitetura Framework Salesforce - Dia 02
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
Gladiolous Cultivation practices by AKL.pdf
Gladiolous Cultivation practices by AKL.pdf
kushallamichhame
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
Ronisha Das
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
List View Components in Odoo 18 - Odoo 際際滷s
List View Components in Odoo 18 - Odoo 際際滷s
Celine George
How to Add New Item in CogMenu in Odoo 18
How to Add New Item in CogMenu in Odoo 18
Celine George
Wage and Salary Computation.ppt.......,x
Wage and Salary Computation.ppt.......,x
JosalitoPalacio
Ad

presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx

  • 2. At Glance What is Virus? Hackers & Crackers Types of Computer Viruses Some other Harmful Programs How you Protect your System against Viruses ?
  • 3. A virus is a program that enters the computer system by attacking itself to another program and then spreads itself across the system.
  • 4. There are two different types of people who write computer virus programs Hackers Crackers Hackers refers to the people who use their skills to enter into computer system without authorization. Hackers are computer enthusiasts, who break into secure systems to gain knowledge about them and possibly use their knowledge to play pranks. A Cracker is malicious programmer who gain unauthorized access to computer system for the purpose of stealing, altering or corrupting information.
  • 5. There are so many types of computer viruses. Some of them are : Macro Virus File Infector Resident Virus Network Virus Logic Bomb Boot Sector Virus Multipartite Virus Stealth Virus
  • 6. A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless. A typical effect is the undesired insertion of some comic text at certain points when writing a line. A macro virus is often spread as an e- mail virus. A well-known example in March, 1999 was the Melissa virus virus.
  • 7. Phrasp the most common type of virus, the file infector takes root in a host file and then begins its operation when the file is executed. The virus may completely overwrite the file that it infects, or may only replace parts of the file. Some file infector viruses attack themselves to program file, usually selected .COM or .EXE file.
  • 8. A board virus definition applies to any virus that inserts itself into a systems memory
  • 9. A kind of virus spreads across networks in computers, for example, Nimda and SQL SLAMMER worms are viruses which spread over corporated networks or the internet via e-mails.
  • 10. A logic Bomb is a program that get executed only when specific condition is met. The virus: Friday the 13th, , was so programmed so as to get executed on that perticular date.
  • 11. A boot sector virus hides in the boot sector of hard disk. The boot sector is where your operating system is. So every time you boot your computer the virus gets loaded into the computer memory. Examples of boot-sector viruses are Polyboot B, AntiEXE.
  • 12. This virus is spread by infected floppies and CDs. These viruses first infect the boot sector of hard drive and then infect the executable files stored in it. For ex.- Ywinz.
  • 13. These are some virus which try to hide themselves from Anti-virus software by resorting some tricks. Stealth virus can safely show an anti-virus software that a certain file is uninfected.
  • 14. A Trojan Horse program is a file that appears harmless unless it has executed. The Trojan Horse program disguises itself as a game or a utility program but when executed it can destroy the data stored in the computer. The name Trojan Horse has been derived from Greek mythology.
  • 15. Worms are small pieces of software that use computer network and security holes to replicate itself. Worms on the internet spread by e-mail it searches for all the address book of the mailing system. It then mails to all recipients.
  • 16. Install a good Anti-Virus software on your computer. Update Anti-Virus regularly. Be careful while Downloading files or programs from the internet.
  • 17. Always scan your floppies, CDs, flash drives before using them. Do not use pirated software. Turn on firewall of your computer operating system.