SlideShare a Scribd company logo
1 of 12
History of Computer Virus
Introduction to Computer Virus
Definition:
A virus a type of self-replicating malware program
that spreads from one computer to another.
Malware:
It is a blanket term used to describe all
harmful files, including virus.
The Interesting History of Virus
1981 - “Elk Cloner” strikes Apple DOS. It showed a
poem on the computer screen.
1986 - Two Pakistani brothers wrote a code called
“Brain” to protect their medical software. It
replaced a floppy's boot sector and disk label
with it's name in IBM PCs (MS DOS).
1990 – Ralf Burger develops “Chameleon,” the first
ever polymorphic virus. Same year, Symantec
launches Norton Antivirus, the first
commercially available AV.
The Interesting History of Virus
1999 – Happy99 attaches to emails with a Happy
New Year message; affects Windows 95 and
Windows 98.
2000 – ILOVEYOU virus hits computers and deletes
JPEGs, MP2, and MP3 files.
2001 – Anna Kournikova virus spreads through
Microsoft Outlook and sends malicious files to
people in compromised address book.
The Interesting History of Virus
2006 – OSX/Leap-A becomes the first known
malware discovered in Mac OS X.
2007 – Zeus Trojan steals login credentials from
banking websites and commits financial
fraud.
2008 – Koobface targets Facebook and MySpace
users.
2013 – Cryptolocker ransomware encrypts files and
demands a ransom to unlock files.
Types of Virus

Trojan disguises itself as a normal file to trick
users into downloading it.

Potentially Unwanted Programs (PUPs) installs
itself on target computers without a user's
consent.

Adware bombards computers with unsolicited ads
when victims browse the internet.

Spyware hides in a user's browser and collects
important data stealthily.
Cost of Damage

ILOVEYOU (2001) virus inflicted a global loss of
$15 billion.

Sobig virus (2003) wreaked havoc over $37
billion.

Mydoom (2004) virus caused a loss of $38
billion.
Scale of Damage

32% of computers worldwide are infected with
some kind of virus.

As of 2014, over 30% of households in the
US were infected by malware.

China ranks first in the list of top ten
countries that have the worst case of virus
infection.
Virus Prevention & Safety Measures

Make a habit of browsing secure https:// websites

Install and keep antivirus & firewall (or an
internet security suite that has both) turned on

Keep all software up-to-date

Back up your data
Virus Prevention & Safety Measures

Don't open attachments or click on links coming through
suspicious emails

Use public wi-fi networks with caution

Be wary of file-sharing websites

Perform monetary transactions only through trusted
payment gateways
How to Remove Virus?
1. Restart PC in Safe Mode
2. Delete Temporary Files
3. Download Comodo Free Antivirus and run a scan
4. Delete and uninstall unauthorised programs
5. Fix browser settings and connections
Useful Resources
Malware Search Engine – https://file-intelligence.comodo.com/
What is Antivirus Software -
https://antivirus.comodo.com/what-is-antivirus-software.php
How Antivirus Works? -
https://antivirus.comodo.com/how-antivirus-software-works.php

More Related Content

Viewers also liked

How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonLori deRoin
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Chapter 11: THE COMPUTERS CAPABILITIES
Chapter 11: THE COMPUTERS CAPABILITIESChapter 11: THE COMPUTERS CAPABILITIES
Chapter 11: THE COMPUTERS CAPABILITIESRhea Dulla
 
Computer capabilities limitations
Computer capabilities limitationsComputer capabilities limitations
Computer capabilities limitationsJesus Obenita Jr.
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferSerious_SamSoul
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...www.sciencepowerpoint.com
 
Computer Capabilities
Computer CapabilitiesComputer Capabilities
Computer CapabilitiesVangieReyes
 
Computer Applications Powerpoint Presentation
Computer Applications Powerpoint PresentationComputer Applications Powerpoint Presentation
Computer Applications Powerpoint Presentationguest0d3ba1
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 

Viewers also liked (19)

How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoon
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Chapter 11: THE COMPUTERS CAPABILITIES
Chapter 11: THE COMPUTERS CAPABILITIESChapter 11: THE COMPUTERS CAPABILITIES
Chapter 11: THE COMPUTERS CAPABILITIES
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer capabilities limitations
Computer capabilities limitationsComputer capabilities limitations
Computer capabilities limitations
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer Capabilities
Computer CapabilitiesComputer Capabilities
Computer Capabilities
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
Capabilities and limitations of computer
Capabilities and limitations of computerCapabilities and limitations of computer
Capabilities and limitations of computer
 
Computer Applications Powerpoint Presentation
Computer Applications Powerpoint PresentationComputer Applications Powerpoint Presentation
Computer Applications Powerpoint Presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Antivirus
AntivirusAntivirus
Antivirus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Guide for learn Computer Virus History

  • 2. Introduction to Computer Virus Definition: A virus a type of self-replicating malware program that spreads from one computer to another. Malware: It is a blanket term used to describe all harmful files, including virus.
  • 3. The Interesting History of Virus 1981 - “Elk Cloner” strikes Apple DOS. It showed a poem on the computer screen. 1986 - Two Pakistani brothers wrote a code called “Brain” to protect their medical software. It replaced a floppy's boot sector and disk label with it's name in IBM PCs (MS DOS). 1990 – Ralf Burger develops “Chameleon,” the first ever polymorphic virus. Same year, Symantec launches Norton Antivirus, the first commercially available AV.
  • 4. The Interesting History of Virus 1999 – Happy99 attaches to emails with a Happy New Year message; affects Windows 95 and Windows 98. 2000 – ILOVEYOU virus hits computers and deletes JPEGs, MP2, and MP3 files. 2001 – Anna Kournikova virus spreads through Microsoft Outlook and sends malicious files to people in compromised address book.
  • 5. The Interesting History of Virus 2006 – OSX/Leap-A becomes the first known malware discovered in Mac OS X. 2007 – Zeus Trojan steals login credentials from banking websites and commits financial fraud. 2008 – Koobface targets Facebook and MySpace users. 2013 – Cryptolocker ransomware encrypts files and demands a ransom to unlock files.
  • 6. Types of Virus  Trojan disguises itself as a normal file to trick users into downloading it.  Potentially Unwanted Programs (PUPs) installs itself on target computers without a user's consent.  Adware bombards computers with unsolicited ads when victims browse the internet.  Spyware hides in a user's browser and collects important data stealthily.
  • 7. Cost of Damage  ILOVEYOU (2001) virus inflicted a global loss of $15 billion.  Sobig virus (2003) wreaked havoc over $37 billion.  Mydoom (2004) virus caused a loss of $38 billion.
  • 8. Scale of Damage  32% of computers worldwide are infected with some kind of virus.  As of 2014, over 30% of households in the US were infected by malware.  China ranks first in the list of top ten countries that have the worst case of virus infection.
  • 9. Virus Prevention & Safety Measures  Make a habit of browsing secure https:// websites  Install and keep antivirus & firewall (or an internet security suite that has both) turned on  Keep all software up-to-date  Back up your data
  • 10. Virus Prevention & Safety Measures  Don't open attachments or click on links coming through suspicious emails  Use public wi-fi networks with caution  Be wary of file-sharing websites  Perform monetary transactions only through trusted payment gateways
  • 11. How to Remove Virus? 1. Restart PC in Safe Mode 2. Delete Temporary Files 3. Download Comodo Free Antivirus and run a scan 4. Delete and uninstall unauthorised programs 5. Fix browser settings and connections
  • 12. Useful Resources Malware Search Engine – https://file-intelligence.comodo.com/ What is Antivirus Software - https://antivirus.comodo.com/what-is-antivirus-software.php How Antivirus Works? - https://antivirus.comodo.com/how-antivirus-software-works.php