SlideShare una empresa de Scribd logo
1 de 24
GL

BAL

Institute of Information Technology
A Presentation on
Computer Virus

Group Name:- G3
Group Members :-

Rohitash kumar
Rahul Baghla
Ravikant Verma
Contents

:-

 What is a virus
 Types of virus
 Indications of Virus Attack
 Creating a virus


Protecting from virus



Remove some common virus



Conclusion
What is a virus?
• A computer virus is a computer program that can
copy itself and infect a computer without permission or
knowledge of the user.
• A virus can only spread from one computer to another
when its host is taken to the uninfected computer, for
instance by a user sending it over a network or the
Internet, or by carrying it on a removable medium such
as a floppy disk, CD, or USB drive.
Types of Viruses
 Trojan Horse

 Memory Resident Virus

 Worms

 Root kit Virus

 Boot sector Virus

 Polymorphic Virus

 Macro Virus

 Logic Bombs
What are Trojan Horses ?
• A Trojan horse is a computer program that is hiding a
virus or other potentially damaging program. A
Trojan horse can be a program that purports to do one
action when, in fact, it is performing a malicious
action on your computer. Trojan horses can be
included in software that you download for free or as
attachments in email messages.
What is a Worm?
• A computer worm is a self-replicating computer program.
It uses a network to send copies of itself to other nodes
(computer terminals on the network) and it may do so
without any user intervention.
• Unlike a virus, it does not need to attach itself to an
existing program. Worms almost always cause harm to the
network, if only by consuming bandwidth, whereas viruses
almost always corrupt or modify files on a targeted
computer.
Boot Sector Virus :-

A boot sector virus infects boot
sector of computers. During system boot, boot sector virus is
loaded into main memory and destroys data stored in hard
disk.

Macro Virus :-

Macro viruses are viruses that use another
application's macro programming language to distribute themselves. They
infect documents such as MS Word or MS Excel and are typically spread
to other similar documents.
Memory Resident Virus :-

Memory Resident Viruses reside in a computers
volatile memory (RAM). They are initiated from a virus which runs on the
computer and they stay in memory after it's initiating program closes.

Root kit Virus :A root kit virus is an undetectable virus which
attempts to allow someone to gain control of a computer system. The term
root kit comes from the Linux administrator root user. These viruses are
usually installed by Trojans and are normally disguised as operating
system files.
Polymorphic Virus :Polymorphic viruses contain complex
instructions that enable them to mutate into new and different viruses.
This makes it impossible for anti-viruses to find them using string or
signature searches (because they are different in each encryption). The
virus then goes on creating a large number of copies.

Logic Bombs :Logic bombs are often attached to a working
program but do not replicate. They are only executed when a certain
predefined condition is met. Their objective is to destroy data on the
computer once certain conditions have been met.
Indications of Virus Attack
 Computer runs slower then usual
 Computer no longer boots up
 Screen sometimes flicker
 PC speaker beeps periodically
 System crashes for no reason
 Files/directories sometimes disappear
How To Create a Virus
As we know, Virus is nothing it
is just a program which are created for
malicious purpose. If it occurs in a
system & user is unaware of from it
then it can destroy or damage our
system.
Continued..
Open Notepad and write the following code
@Echo off
Start virus.bat
virus.bat
save it as .bat and run it.
It will hang our computer & we have to shut
down the computer forcibly...
Protection from Virus
 Install reliable anti-virus software
 Update our anti-virus software regularly
 Don't automatically open attachments
 Scan all incoming email attachments
 Delete chain emails and junk email
 Be careful when downloading files from the Internet
Continued…
 Always scan new files for viruses before we use them
 Backup our files on a regular basis
 If our computer is on a network, make sure we have
security steps in place to prevent unauthorized users
putting files on our computer
 Take care using USB flash cards, CDs, zip and floppy
disks
Examples of risky file types :• The following file types should be treated with
suspicion and be confirmed with the sender before
being opened:
– .exe
– .bat
– .vbs
Remove Some Common Viruses
• We can remove some of the common viruses
without help of any antivirus Program.
• e.g.- New Folder.exe
• Autorun.inf ( from PDs etc)
New Folder.exe
• It looks just like an folder but
actually it is a .exe file.
• Try to deleting the file.
• It will delete if you haven’t
executed it, if you’re unable
to delete it.
• Go to Task manager ( by
pressing ctrl+shift+esc )
Continued …
 Go to Process Tab and try
finding that the process for
the exe file and end the
process.
 Then Go to the same folder
containing the exe file and
delete it.
 Then Open Search and try
finding the .exe files of same
size and delete them all.
Removal of Autorun.inf
• Open Run dialog Box. Type in “CMD” press
ENTER.
Continued …
• The Command Prompt will Open Now. In Command
prompt go to the drive containing Autorun.inf
• Now Type In “ attrib –h –s –a” and press enter.
Continued …
• This will remove drives attributes for all Hidden,
System files.
• Now Type “ Del autorun.inf” and press ENTER.
• The Virus has been Successfully Removed.
“It is good to be aware of
viruses rather than being
sorry…..”
Thank You !!

Any Queries ??

Más contenido relacionado

La actualidad más candente (20)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Malware
MalwareMalware
Malware
 
Virus project
Virus projectVirus project
Virus project
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 

Destacado

Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationN V Amruth Varma
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 

Destacado (9)

Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint Presentation
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Similar a Computer virus

Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | ExplainationBipulok
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 

Similar a Computer virus (20)

Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virus
VirusVirus
Virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 

Más de Rahul Baghla

Más de Rahul Baghla (10)

Holography
HolographyHolography
Holography
 
Sensor technology
Sensor technologySensor technology
Sensor technology
 
Lifi technology
Lifi technologyLifi technology
Lifi technology
 
Hacking
HackingHacking
Hacking
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 

Último

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Computer virus

  • 2. A Presentation on Computer Virus Group Name:- G3 Group Members :- Rohitash kumar Rahul Baghla Ravikant Verma
  • 3. Contents :-  What is a virus  Types of virus  Indications of Virus Attack  Creating a virus  Protecting from virus  Remove some common virus  Conclusion
  • 4. What is a virus? • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. • A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 5. Types of Viruses  Trojan Horse  Memory Resident Virus  Worms  Root kit Virus  Boot sector Virus  Polymorphic Virus  Macro Virus  Logic Bombs
  • 6. What are Trojan Horses ? • A Trojan horse is a computer program that is hiding a virus or other potentially damaging program. A Trojan horse can be a program that purports to do one action when, in fact, it is performing a malicious action on your computer. Trojan horses can be included in software that you download for free or as attachments in email messages.
  • 7. What is a Worm? • A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. • Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 8. Boot Sector Virus :- A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk. Macro Virus :- Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.
  • 9. Memory Resident Virus :- Memory Resident Viruses reside in a computers volatile memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes. Root kit Virus :A root kit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term root kit comes from the Linux administrator root user. These viruses are usually installed by Trojans and are normally disguised as operating system files.
  • 10. Polymorphic Virus :Polymorphic viruses contain complex instructions that enable them to mutate into new and different viruses. This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption). The virus then goes on creating a large number of copies. Logic Bombs :Logic bombs are often attached to a working program but do not replicate. They are only executed when a certain predefined condition is met. Their objective is to destroy data on the computer once certain conditions have been met.
  • 11. Indications of Virus Attack  Computer runs slower then usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files/directories sometimes disappear
  • 12. How To Create a Virus As we know, Virus is nothing it is just a program which are created for malicious purpose. If it occurs in a system & user is unaware of from it then it can destroy or damage our system.
  • 13. Continued.. Open Notepad and write the following code @Echo off Start virus.bat virus.bat save it as .bat and run it. It will hang our computer & we have to shut down the computer forcibly...
  • 14. Protection from Virus  Install reliable anti-virus software  Update our anti-virus software regularly  Don't automatically open attachments  Scan all incoming email attachments  Delete chain emails and junk email  Be careful when downloading files from the Internet
  • 15. Continued…  Always scan new files for viruses before we use them  Backup our files on a regular basis  If our computer is on a network, make sure we have security steps in place to prevent unauthorized users putting files on our computer  Take care using USB flash cards, CDs, zip and floppy disks
  • 16. Examples of risky file types :• The following file types should be treated with suspicion and be confirmed with the sender before being opened: – .exe – .bat – .vbs
  • 17. Remove Some Common Viruses • We can remove some of the common viruses without help of any antivirus Program. • e.g.- New Folder.exe • Autorun.inf ( from PDs etc)
  • 18. New Folder.exe • It looks just like an folder but actually it is a .exe file. • Try to deleting the file. • It will delete if you haven’t executed it, if you’re unable to delete it. • Go to Task manager ( by pressing ctrl+shift+esc )
  • 19. Continued …  Go to Process Tab and try finding that the process for the exe file and end the process.  Then Go to the same folder containing the exe file and delete it.  Then Open Search and try finding the .exe files of same size and delete them all.
  • 20. Removal of Autorun.inf • Open Run dialog Box. Type in “CMD” press ENTER.
  • 21. Continued … • The Command Prompt will Open Now. In Command prompt go to the drive containing Autorun.inf • Now Type In “ attrib –h –s –a” and press enter.
  • 22. Continued … • This will remove drives attributes for all Hidden, System files. • Now Type “ Del autorun.inf” and press ENTER. • The Virus has been Successfully Removed.
  • 23. “It is good to be aware of viruses rather than being sorry…..”
  • 24. Thank You !! Any Queries ??