2. A computer virus is a computer programe that can copy itself and infect a computer. A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. The term "virus" is also commonly but used to refer to other types of malware, adware and spyware programs that do not have the reproductive ability.
3.
4.
5.
6.
7. Types of viruses Boot viruses: These viruses infect floppy disk boot records or master boot records in hard disks. They replace the boot record program (which is responsible for loading the operating system in memory) copying it elsewhere on the disk or overwriting it. Program viruses: This type of viruses infect executable program files, such as .BIN, .COM, .EXE, .DRV and .SYS. These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk.
8. Types of Viruses Multipartite viruses: This type of viruses are a combination of Boot and Program viruses. They infect program files when the infected program is executed, then viruses infect the boot record. Stealth viruses: These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may misguide the infected file’s size and other information.
9. Types of Viruses Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect. Macro Viruses: A macro virus is a new type of computer virus that infects the macros ( series of program commands or instructions ) within a document or template. When you open a word processing or spreadsheet document.
10. Types of Viruses Active X and Java Control Viruses: Some users do not know how to manage and control their web browser to allow or prohibit certain functions to work, such as enabling or disabling sound, pop ups, and so on. Leaving your computer in danger of being targeted by unwanted software or adware floating in cyberspace.
11.
12.
13.
14. Types of Viruses Network Viruses: Network viruses rapidly spreads through a Local Network Area (LAN), and sometimes throughout the internet. Generally, network viruses multiply through shared resources, i.e., shared drives and folders. When the virus infects a computer, it searches through the network to attack its new host, when the virus finishes infecting that computer, it moves on to the next and the cycle repeats itself.
15.
16. Virus All computer viruses are manmade, A simple virus can be dangerous because it will quickly use all available memory and bring the system to a halt. A true virus bypassing security systems and spread from one computer to another (in form of executable code) over a network, Internet, removable medium such as a floppy disk, CD, DVD or USB drive and.
17. Worm A computer worm is a program which copies itself across a network. Computer worm differs from a computer virus, because computer worm can run itself. A virus needs a host program to run, and the virus code runs as part of the host program. A computer worm can spread without a host program, although some modern computer worms also use files to hide inside.
18. Trojan horse This is a type of virus that attempts to make the user think that it is a beneficial application. A Trojan Horse virus works by hiding within a set of seemingly useful software programs. Once executed or installed it will start infecting other files in the computer. A Trojan Horse Virus is also usually capable of stealing important information from the user's computer then send this information to Internet servers designated by the developer of the virus. The best way to be save from Trojan Horse Virus, never open email attachments or files that have been sent by unknown senders.
19. Logic Bombs The logic bomb virus is a piece of code that reside into a software programe and when a certain and specific condition is meet, such as clicking on an Internet browser or opening a particular file, the logic bomb virus start their work. Many programmers set the logic bombs virus with reference to certain day or date such as April Fools Day or Friday the 13th.
20. Spyware Spyware are programs, cookies, or registry entries that track your activity and send your data to someone who collects this data for their own purposes. Spyware is usually installed quietly, or even secretly, when you install shareware applications. spyware programs can slow down your Internet connection by filling their traffic information. They can also slow down your computer by using up available RAM and CPU cycles.
21. Adware Adware is a close relative of spyware. Adware is software that is installed on your computer to show you advertisements. Adware can also slow your Internet Connection by using bandwidth to retrieve advertisements. It can waste huge amounts of your time by popping unwanted ads onto your screen.
22. Spam Spam is unsolicited e-mail which is sent in massive quantities to Internet email users. Most spam tries to sell products and services such as mortgage, Financing, memberships and drugs. A more dangerous category of spam tries to convince the recipient to share their bank account numbers, credit card numbers, or logins & passwords to their online banking systems in shap of eBay and PayPal services. Spam is almost impossible to stop completely, but it can be reduced to a less level through spam filters. E-mail administrators typically install spam filtering software on mail servers and reduce the number of spam.
23. Popups Virus This type of viruses are basically a program that is permanently resident in memory and “pops up” onto the screen at the touch of a key. The number of such viruses increased when computer dependent on GUI, where any program can be made to “pop up”. Popup viruses are the pop up ads,, casino ads, drugs ads, antivirus solution ads that influence user to install a programe on your system.
24. Anti Virus Antivirus software is used detects, repairs, cleans, or removes virus-infected files from computer to prevent and remove computer viruses, including worms and trojan horses. It also identify & remove viruses, but make computer healthy from other types of harmful computer softwares.
25. Virus Detection There are two common methods that an anti-virus software application uses to detect viruses. The first, virus detection is using a list of virus signature definitions. This works by examining the content of the computer's memory, boot sectors, removable drives, hard drives, and comparing those files against a database of known virus signatures. The second method is Heuristic Algorithm, it is used to find viruses common behaviors.
26. Recovery methods System Restore: One possibility on method is to used System Restore, feature of OS which restores the registry and critical system files to a previous checkpoint. Some viruses, however, disable system restore and other important tools such as Task Manager and Command Prompt.
27. Recovery methods Operating system reinstallation Reinstalling the operating system is another approach to virus removal. It involves simply reformatting the OS partition and installing the OS from its original media, or image the partition with a clean backup image using Ghost.
28.
29. Recovery methods Routers and Firewalls: A Router acts as the best kind of firewall, a hardware firewall. It protects you from all kinds of viruses and keeps your information safe. Hackers who want to gain access to your computer who may try to port scan your computer. High end routers may be able to completely block these scans or at least slow the hacker down.