SlideShare a Scribd company logo
1 of 20
Muhammad Uzair Rasheed

        2009-CPE-03
     UCE&T BZU MULTAN PAKISTAN
COMPUTER VIRUSES
COMPUTER VIRUS
What is computer virus?
 an executable program
 Can replicate itself
 Introduce to a computer system
     with any software program
   For internet users come from downloading files
   Can attach itself or replace the existing program
EFFECTS OF VIRUS
 Initiation of Events
 Effects of events
 An annoying message appearing on the computer screen.
 Reduced memory or disk space.
 Modification of data.
 Files overwritten or damaged.
 Hard drive erased.
TYPES OF VIRUSES
 Two major categories of viruses are
  - resident
  - non resident
 Viruses have many types some selected types are as
  follows
 Partition table virus
 Boot sector virus
 File viruses
BOOT SECTOR VIRUS/PARTITION
TABLE VIRUS
 Bootstrap loader
-first sector in the outermost track of floppy
 Master boot program
-first sector in the outermost track of hard disk
 Boot sector substitute itself for bootstrap loader
 Partition table substitute itself for master boot
  program
LOADING OF THESE VIRUSES
 How it loads itself?
-every time when we switch on the computer
 How it effects other diskettes?
-first it will check either diskettes is infected or not
- Infected: requested access is performed
- Not infected: moves original boot record and copies its
  own code
WORKING OF PARTITION TABLE
VIRUS
 It has several forms but attacks in similar way
 Its trick to activate itself
  - it gives allusion of second operating system`
 Effects
  - it prevents computer from starting and spreads onto
  any discs or flash drives that have plugged in.
WORKING OF BOOT SECTOR VIRUS
 Loading
  - Loads whenever computer starts up
  - replacement of boot sector code with its own choice.
 Effects
   - Incredibly destructive
    - Difficult to remove
    - Easily spread
    -Effect all the derives or disk that are in contact
 spread by reading infected disk
Boot virus life cycle
DETECTION
 Detected by searching their signature in memory
 signature is binary subset of virus code
 Selection of signature
 code searching in memory to find virus.
REMOVAL
 Rewrite the partition table or boot sector code
 Check whether the virus is resident
 If virus is resident system should be booted from a
 clean disk.
                OR
    By using a software called antivirus
FILE VIRUS
 DIFINATION
 - A computer virus that infects application file.
 LOADING
 Executable file virus
  - by inserting its code in original code
 Overwrite file virus
   - replacement of entire file
CONTINUE….
 Cannot embedded in pure data files
   - i.e plain text file, plain bitmap file
   - somehow embed these files never execute
 Parts
   - .com file virus
   - .exe file virus
COM File
 Mirror image of program code
   -image on disk is as loaded into the memory
 Single segment files
   -both data and code resides
HOW COM FILE VIRUS INFECTS
          FILES
 If resident may infect com file on execution
 It will interrupt 21H service 4B
     - this service load program into memory
 It will check the parameters of this service
    - if file is .com virus appends itself to a file
    -temper with first 3 bytes of .com file
    -execution branches to virus code
HOW COM VIRUS LOADS ITSELF
 Loaded file occupy number of paragraph controlled by
    MCB
   Infected file spread virus in memory area
   Virus is not independent program , does not have its
    own PSP
   if program terminate virus will also unloaded
   To be independent virus should create its own PSP and
    MCB
   Can also work as an independent program
EXE FILE VIRUSES
 It also relocates itself in the same way like com virus
 Different between exe and com file is
   - com file start execution from first instruction
   -Entry point of execution in exe file can be anywhere
  in the program
 Entry point is tempered by virus in exe file
REMOVAL
 Virus size should be known
 Firstly in case of com files
   - original value of first 3 bytes should be restored
   - In exe file value of entry point should be restored
 Copy the contents of original file into temporary file.
 Virus is not copied
 Delete original file and rename the temporary file

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
MALWARE
MALWAREMALWARE
MALWARE
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Hacking
HackingHacking
Hacking
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Security & Privacy of Information Technology
Security & Privacy of Information TechnologySecurity & Privacy of Information Technology
Security & Privacy of Information Technology
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 

Similar to Computer viruses

CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
kd123is123live
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
jazz_306
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 

Similar to Computer viruses (20)

CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdfCSC439-Sp2013-Module-9-Spring2013-Malware.pdf
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Virus
VirusVirus
Virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Virus
VirusVirus
Virus
 

More from Muhammad Uzair Rasheed

Presentation on 2 nd generation telecommunication system
Presentation on 2 nd generation telecommunication systemPresentation on 2 nd generation telecommunication system
Presentation on 2 nd generation telecommunication system
Muhammad Uzair Rasheed
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
Muhammad Uzair Rasheed
 
First and second generation communication
First and second generation communicationFirst and second generation communication
First and second generation communication
Muhammad Uzair Rasheed
 

More from Muhammad Uzair Rasheed (20)

Pak Energy conservation
Pak Energy conservation Pak Energy conservation
Pak Energy conservation
 
Pakistan Energy Conservation
Pakistan Energy ConservationPakistan Energy Conservation
Pakistan Energy Conservation
 
Molten Salt Reactor
Molten Salt ReactorMolten Salt Reactor
Molten Salt Reactor
 
Sampling
SamplingSampling
Sampling
 
Zindagi gulzar-hai
Zindagi gulzar-haiZindagi gulzar-hai
Zindagi gulzar-hai
 
C++loop statements
C++loop statementsC++loop statements
C++loop statements
 
Algorithms 1
Algorithms 1Algorithms 1
Algorithms 1
 
Verilog hdl
Verilog hdlVerilog hdl
Verilog hdl
 
Presentation on 2 nd generation telecommunication system
Presentation on 2 nd generation telecommunication systemPresentation on 2 nd generation telecommunication system
Presentation on 2 nd generation telecommunication system
 
Tdm & fdm
Tdm & fdmTdm & fdm
Tdm & fdm
 
Wavelength division multiplexing
Wavelength division multiplexingWavelength division multiplexing
Wavelength division multiplexing
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Guided media
Guided mediaGuided media
Guided media
 
Phase shift
Phase shiftPhase shift
Phase shift
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
First generation network
First generation networkFirst generation network
First generation network
 
First and second generation communication
First and second generation communicationFirst and second generation communication
First and second generation communication
 
Fdm
FdmFdm
Fdm
 
Channel impairments
Channel impairmentsChannel impairments
Channel impairments
 
Angle modulation
Angle modulationAngle modulation
Angle modulation
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Computer viruses

  • 1. Muhammad Uzair Rasheed 2009-CPE-03 UCE&T BZU MULTAN PAKISTAN
  • 3. COMPUTER VIRUS What is computer virus?  an executable program  Can replicate itself  Introduce to a computer system  with any software program  For internet users come from downloading files  Can attach itself or replace the existing program
  • 4. EFFECTS OF VIRUS  Initiation of Events  Effects of events  An annoying message appearing on the computer screen.  Reduced memory or disk space.  Modification of data.  Files overwritten or damaged.  Hard drive erased.
  • 5. TYPES OF VIRUSES  Two major categories of viruses are - resident - non resident  Viruses have many types some selected types are as follows  Partition table virus  Boot sector virus  File viruses
  • 6. BOOT SECTOR VIRUS/PARTITION TABLE VIRUS  Bootstrap loader -first sector in the outermost track of floppy  Master boot program -first sector in the outermost track of hard disk  Boot sector substitute itself for bootstrap loader  Partition table substitute itself for master boot program
  • 7. LOADING OF THESE VIRUSES  How it loads itself? -every time when we switch on the computer  How it effects other diskettes? -first it will check either diskettes is infected or not - Infected: requested access is performed - Not infected: moves original boot record and copies its own code
  • 8. WORKING OF PARTITION TABLE VIRUS  It has several forms but attacks in similar way  Its trick to activate itself - it gives allusion of second operating system`  Effects - it prevents computer from starting and spreads onto any discs or flash drives that have plugged in.
  • 9. WORKING OF BOOT SECTOR VIRUS  Loading - Loads whenever computer starts up - replacement of boot sector code with its own choice.  Effects - Incredibly destructive - Difficult to remove - Easily spread -Effect all the derives or disk that are in contact  spread by reading infected disk
  • 11. DETECTION  Detected by searching their signature in memory  signature is binary subset of virus code  Selection of signature  code searching in memory to find virus.
  • 12. REMOVAL  Rewrite the partition table or boot sector code  Check whether the virus is resident  If virus is resident system should be booted from a clean disk. OR By using a software called antivirus
  • 13. FILE VIRUS  DIFINATION - A computer virus that infects application file.  LOADING  Executable file virus - by inserting its code in original code  Overwrite file virus - replacement of entire file
  • 14. CONTINUE….  Cannot embedded in pure data files - i.e plain text file, plain bitmap file - somehow embed these files never execute  Parts - .com file virus - .exe file virus
  • 15. COM File  Mirror image of program code -image on disk is as loaded into the memory  Single segment files -both data and code resides
  • 16. HOW COM FILE VIRUS INFECTS FILES  If resident may infect com file on execution  It will interrupt 21H service 4B - this service load program into memory  It will check the parameters of this service - if file is .com virus appends itself to a file -temper with first 3 bytes of .com file -execution branches to virus code
  • 17. HOW COM VIRUS LOADS ITSELF  Loaded file occupy number of paragraph controlled by MCB  Infected file spread virus in memory area  Virus is not independent program , does not have its own PSP  if program terminate virus will also unloaded  To be independent virus should create its own PSP and MCB  Can also work as an independent program
  • 18.
  • 19. EXE FILE VIRUSES  It also relocates itself in the same way like com virus  Different between exe and com file is - com file start execution from first instruction -Entry point of execution in exe file can be anywhere in the program  Entry point is tempered by virus in exe file
  • 20. REMOVAL  Virus size should be known  Firstly in case of com files - original value of first 3 bytes should be restored - In exe file value of entry point should be restored  Copy the contents of original file into temporary file.  Virus is not copied  Delete original file and rename the temporary file

Editor's Notes

  1. bedded