Binisha.pptx

Prepared By :
Binisha Tamang
Shree Rudrayanee Secondary School
Lalitpur, Nepal
A computer virus is a program that can copy
itself and infect a computer without the
permission or knowledge of the user.
 Boot sector virus
 File or Program virus
 Macro virus
 Multipartite virus
 Stealth virus
 Boot sector virus replace or implant themselves
in the boot sector, the area of the hard drive (or
any other disk) accessed when you first turn on
your computer. This kind of virus can prevent
you from being able to boot your hard disk. For
example:
 Danish Boot
 Brain
 Disk killer
 Michelangelo
 File viruses infect application programs. They
may attach themselves to any executable file,
usually .COM and .EXE files. An application
program infector takes control after the initial
use of the infected program For example:
 Acid Rain
 Alien.298
 Crazy A
 Macro viruses are written by using a simplified
macro programming language. These viruses
affect a Microsoft office document created
using MS-Word, MSExcel, MSAccess, etc. The
viruses can spread if the infected document is
open in another computer. For example:
 Melissa
 Word Concept
 Multipartite viruses can infect both application
programs and the boot sector of a disk. They
infect program files and when the infected
program is executed; these viruses infect boot
record. Next time, The virus from the boot
record loads in the memory and then starts
infecting other program files on the disk. For
example:
 Invader
 File
 Tequila
 Stealth viruses actively hide themselves from
antiviral software by either masking the size of
the file that they hide in or temporarily
removing itself from the infected file and
placing a copy of itself in another location on
the drive. For example:
 Frodo
 Joshi
 Whale
 Booting processing becomes slow
 Size of files may be changed
 Location of file may be changed
 Computer gives unnecessary message and
produces sounds
 Internet
 Email
 Infected files
 Infected removable storage devices
 Pirated software
 Programs take a longer time to load. Memory-
resident operations take a lot of time to start.
 A change occurs in dates and time of saved
files.
 Hard disk is suddenly accessed without a
logical reason.
 Viruses increases the use of disk space and
growth in file size. They attach themselves to
many files.
 Unnecessary massages are display on the
monitor.
 Scan downloaded files of the internet before
copying to your computer.
 Use a good antivirus program to scan floppy
disks before copying files. Recommended once
are Total AV, Norton Antivirus and McAfee.
 Do not install pirated software.
 Scan your computer system and removable
storage devices before use.
1 de 12

Recomendados

Viruses notes1Viruses notes1
Viruses notes1Dara Corporates
510 vistas11 diapositivas
Viruses notesViruses notes
Viruses notesDara Corporates
13.3K vistas11 diapositivas
Computer virusComputer virus
Computer viruskiran_a_c
1.1K vistas15 diapositivas
Computer virusComputer virus
Computer virusdineshrwt911
56 vistas22 diapositivas

Más contenido relacionado

Similar a Binisha.pptx

computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
10.3K vistas16 diapositivas
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
153 vistas40 diapositivas
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
96 vistas21 diapositivas
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
15.8K vistas38 diapositivas
Computer virusesComputer viruses
Computer virusesaagmansaini
2.6K vistas18 diapositivas
VirusesViruses
VirusesShahidaffridi
2.1K vistas22 diapositivas

Similar a Binisha.pptx(20)

computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah10.3K vistas
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan153 vistas
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
Yastee Shah96 vistas
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ15.8K vistas
Computer virusesComputer viruses
Computer viruses
aagmansaini2.6K vistas
VirusesViruses
Viruses
Shahidaffridi2.1K vistas
Computer VirusesComputer Viruses
Computer Viruses
Aman Chaudhary851 vistas
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed3.4K vistas
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari9799.4K vistas
Computer virusesComputer viruses
Computer viruses
Alfred George7.7K vistas
Computervirus Computervirus
Computervirus
Dushyant Shekhawat320 vistas
Computer virusComputer virus
Computer virus
Goa App701 vistas
Computer VirusComputer Virus
Computer Virus
izzul23.6K vistas
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin4.2K vistas
Computer virusComputer virus
Computer virus
Sammer Khizer2.3K vistas
virusesviruses
viruses
khadija habib483 vistas
Antivirus securityAntivirus security
Antivirus security
mPower Technology108 vistas
Virus.pptxVirus.pptx
Virus.pptx
EimerejDlcrz9 vistas

Último(20)

UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity87 vistas
childcare.pdfchildcare.pdf
childcare.pdf
fatma alnaqbi13 vistas
KHNOG 5: RPKI Status UpdateKHNOG 5: RPKI Status Update
KHNOG 5: RPKI Status Update
APNIC401 vistas
DU_SERIES_Session1.pdfDU_SERIES_Session1.pdf
DU_SERIES_Session1.pdf
RohitRadhakrishnan8807 vistas
informationinformation
information
khelgishekhar6 vistas
AI Powered event-driven translation botAI Powered event-driven translation bot
AI Powered event-driven translation bot
Jimmy Dahlqvist16 vistas
 FS Design 2024 V2.pptx FS Design 2024 V2.pptx
FS Design 2024 V2.pptx
paswanlearning7 vistas
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptx
narmadhamanohar218 vistas
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docx
MollyBrown8613 vistas
zotabet.pdfzotabet.pdf
zotabet.pdf
zotabetcasino6 vistas
informing ideas.docxinforming ideas.docx
informing ideas.docx
MollyBrown8612 vistas
DU Series - Day 4.pptxDU Series - Day 4.pptx
DU Series - Day 4.pptx
UiPathCommunity77 vistas
Audience profile.pptxAudience profile.pptx
Audience profile.pptx
MollyBrown8612 vistas

Binisha.pptx

  • 1. Prepared By : Binisha Tamang Shree Rudrayanee Secondary School Lalitpur, Nepal
  • 2. A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.
  • 3.  Boot sector virus  File or Program virus  Macro virus  Multipartite virus  Stealth virus
  • 4.  Boot sector virus replace or implant themselves in the boot sector, the area of the hard drive (or any other disk) accessed when you first turn on your computer. This kind of virus can prevent you from being able to boot your hard disk. For example:  Danish Boot  Brain  Disk killer  Michelangelo
  • 5.  File viruses infect application programs. They may attach themselves to any executable file, usually .COM and .EXE files. An application program infector takes control after the initial use of the infected program For example:  Acid Rain  Alien.298  Crazy A
  • 6.  Macro viruses are written by using a simplified macro programming language. These viruses affect a Microsoft office document created using MS-Word, MSExcel, MSAccess, etc. The viruses can spread if the infected document is open in another computer. For example:  Melissa  Word Concept
  • 7.  Multipartite viruses can infect both application programs and the boot sector of a disk. They infect program files and when the infected program is executed; these viruses infect boot record. Next time, The virus from the boot record loads in the memory and then starts infecting other program files on the disk. For example:  Invader  File  Tequila
  • 8.  Stealth viruses actively hide themselves from antiviral software by either masking the size of the file that they hide in or temporarily removing itself from the infected file and placing a copy of itself in another location on the drive. For example:  Frodo  Joshi  Whale
  • 9.  Booting processing becomes slow  Size of files may be changed  Location of file may be changed  Computer gives unnecessary message and produces sounds
  • 10.  Internet  Email  Infected files  Infected removable storage devices  Pirated software
  • 11.  Programs take a longer time to load. Memory- resident operations take a lot of time to start.  A change occurs in dates and time of saved files.  Hard disk is suddenly accessed without a logical reason.  Viruses increases the use of disk space and growth in file size. They attach themselves to many files.  Unnecessary massages are display on the monitor.
  • 12.  Scan downloaded files of the internet before copying to your computer.  Use a good antivirus program to scan floppy disks before copying files. Recommended once are Total AV, Norton Antivirus and McAfee.  Do not install pirated software.  Scan your computer system and removable storage devices before use.