SlideShare una empresa de Scribd logo
1 de 23
Virus and Anti-Virus
BY: Adeel Rasheed
 Superior University
CONTENTS
• What is Virus?
• Types of Virus
• Types of Anti-Virus
• How does Anti-Virus Works
• Some Anti-Virus Software's which are available
in market
What is Computer Virus?
• Computer viruses are small software programs
that are designed to spread from one computer to
another and to interfere with computer operation.
• A virus might corrupt or delete data on your
computer, use your e-mail program to spread itself
to other computers, or even erase everything on
your hard disk.
Virus
Infection of more than 75,000 computers in 10 minutes
Source of Viruses
• Funny images
• Greeting cards
• Audio and video files
• E-mail messages
• Through downloads on the Internet
• CD,DVD,USB, Memory cards,etc
Types of Viruses
• Macro Viruses
• Memory Resident Viruses
• Overwrite Viruses
• Direct Action Viruses
• Directory Virus
• Web Scripting Virus
• Multipartite Virus
• FAT Viruses
• Companion Viruses
• Polymorphic Virus
• Email Virus
Macro Viruses:
These viruses infect the files created using some applications or
programs that contain macros such as doc, pps, xls and mdb.
Memory Resident Viruses:
They usually fix themselves inside the computer memory. They get
activated every time the OS runs and end up infecting other opened
files. They hide in RAM.
Overwrite Viruses:
These types of viruses delete any information in a file they infect,
leaving them partially or completely useless once they are infected.
Direct Action Viruses:
These viruses mainly replicate or take action once they are executed.
When a certain condition is met, the viruses will act by infecting the files
in the directory or the folder specified in the AUTOEXEC.BAT. The
viruses are generally found in the hard disk’s root directory, but they
keep on changing location.
Directory Virus:
Also known as cluster virus or file system virus. They infect the
computer’s directory by changing the path indicating file location.
They are usually located in the disk
Web Scripting Virus:
Most web pages include some complex codes in order to create an
interactive and interesting content. Such a code is often exploited to
cause certain undesirable actions.
Multipartite Virus:
These type of viruses spread in many different ways. Their actions
vary depending on the OS installed and presence of certain files. They
tend to hide in the computer’s memory
FAT Viruses:
These lardy viruses attack the file allocation table (FAT) which is the
disc part used to store every information about the available space,
location of files, unusable space etc.
Companion Viruses:
These types of viruses infect files just like the direct action and the
resident types. Once inside the computer
Polymorphic Viruses:
In a different way every time they infect your computer. They use
different encryption and algorithms.
This makes it difficult for the antivirus software to locate them using
signature or string searches
Email Virus:
This is a virus spread via an email. Such a virus will hide in an email
and when the recipient opens the mail.
What is Anti-Virus software?
Computer programs intended to Identify and
Eliminate Computer Viruses.
 Antivirus software is a class of program that searches a
hard drive and floppy disk for any known or potential
viruses.
 Also search from remove able disk.
 Anti-virus is a software that scans files or your
computer's memory for certain patterns that may indicate
an infection.
Types of Scans
• Automatic scans:
Depending what software you choose, you may be able to
configure it to automatically scan specific files or directories
and prompt you at set intervals to perform complete scans.
• Manual scans:
It is also a good idea to manually scan files you receive from
an outside source before opening them.
Main types of Anti-Virus
There are different types of antivirus software for
different computers
 Some are designed for personal computers.
 Some are for servers
How Antivirus software works?
Interception
Destination System
Source System
Alert
Disinfection
Anti-virus applications maintain a database of known
viruses and compare scanned files that match the
characteristics of known viruses. If a scanned files
matches those characteristics of known viruses. If a
scanned file matches those characteristics, it is
quarantined so that it cannot affect other files on
your system.
Once the file is quarantined, the application can
attempt to repair it, delete it, or prompt you for a
decision on what to do about the file infected
Best Antivirus software
available in market
Bit defender Antivirus
• This years best defense against computer viruses, spyware,
hackers and spam is an antivirus program called Bit Defender.
• Has a user-friendly interface that scans all existing files on your
computer, all incoming and outgoing emails, and even IM
transfers.
• Features include privacy protection and web scanning for
internet use. a years subscription is about $29.95
NAV
• The most widely used software is the Norton Antivirus. (NAV)
• Since its release in 1990, over 100 million people around the
world have used it.
• It’s a free program but in order to receive live updates, a valid
subscription is needed.
• A yearly subscription is only $49.99
McAfee
• McAfee Virus Scan is another popular antivirus program.
• It’s designed for home and home-office use.
• It’s used specifically on a Microsoft Windows platform.
• The includes a number of features including on access file
sharing, inbound and outbound firewall protection.
• A yearly subscription is only $59.99
Kaspersky
• For the average home user and advanced users the
Kaspersky antivirus software has an easy to use interface.
• The program uses 3 tabs for protection, settings and support.
• It updates itself on an hourly basis and is one of the fastest
antivirus programs available.
• However, quality comes at a price and year subscription is
$59.99.
Avast
• The boot-time scanner, Network Shield, and e-mail scanner in
Avast has attracted end-users.
• The detection capability of Alwil Avast! is very good and you can
install the program in any edition of Windows.
• The installer of Avast is bundled with Google Chrome browser
that is not necessary to continue using the antivirus program.
• A yearly subscription is only $34.99
Thanks

Más contenido relacionado

La actualidad más candente

Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 

La actualidad más candente (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Presentation2
Presentation2Presentation2
Presentation2
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 

Similar a Virus and Anti Virus - Types of Virus and Anti Virus

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harmAnubhav125
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 

Similar a Virus and Anti Virus - Types of Virus and Anti Virus (20)

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
anti_virus
anti_virusanti_virus
anti_virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harm
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
information about virus
information about virusinformation about virus
information about virus
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer virus
Computer virusComputer virus
Computer virus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 

Más de Adeel Rasheed

Multan to Sukkur Motorway (M5)
Multan to Sukkur Motorway (M5)Multan to Sukkur Motorway (M5)
Multan to Sukkur Motorway (M5)Adeel Rasheed
 
History of computer (1st to 5th Generations)
History of computer (1st to 5th Generations)History of computer (1st to 5th Generations)
History of computer (1st to 5th Generations)Adeel Rasheed
 
CSS Cascade Style Sheet
CSS Cascade Style SheetCSS Cascade Style Sheet
CSS Cascade Style SheetAdeel Rasheed
 
Zooming and Its Types
Zooming and Its TypesZooming and Its Types
Zooming and Its TypesAdeel Rasheed
 
User Interface & Its Types
User Interface & Its TypesUser Interface & Its Types
User Interface & Its TypesAdeel Rasheed
 
Questions About Android Application Development
Questions About Android Application DevelopmentQuestions About Android Application Development
Questions About Android Application DevelopmentAdeel Rasheed
 
Human and Machine Learning
Human and Machine LearningHuman and Machine Learning
Human and Machine LearningAdeel Rasheed
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6Adeel Rasheed
 
Privacy and Security Information
Privacy and Security InformationPrivacy and Security Information
Privacy and Security InformationAdeel Rasheed
 
Code of Conduct - Code of Practice & Standards
Code of Conduct - Code of Practice & StandardsCode of Conduct - Code of Practice & Standards
Code of Conduct - Code of Practice & StandardsAdeel Rasheed
 
Self Adaptive Systems
Self Adaptive SystemsSelf Adaptive Systems
Self Adaptive SystemsAdeel Rasheed
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionAdeel Rasheed
 
Classes and Objects in C#
Classes and Objects in C#Classes and Objects in C#
Classes and Objects in C#Adeel Rasheed
 
Intel Microprocessors 8086 Documentation
Intel Microprocessors 8086 DocumentationIntel Microprocessors 8086 Documentation
Intel Microprocessors 8086 DocumentationAdeel Rasheed
 
Applications of Computer
Applications of ComputerApplications of Computer
Applications of ComputerAdeel Rasheed
 

Más de Adeel Rasheed (20)

Multan to Sukkur Motorway (M5)
Multan to Sukkur Motorway (M5)Multan to Sukkur Motorway (M5)
Multan to Sukkur Motorway (M5)
 
Religious Conflict
Religious ConflictReligious Conflict
Religious Conflict
 
R Studio (Report)
R Studio (Report)R Studio (Report)
R Studio (Report)
 
History of computer (1st to 5th Generations)
History of computer (1st to 5th Generations)History of computer (1st to 5th Generations)
History of computer (1st to 5th Generations)
 
CSS Cascade Style Sheet
CSS Cascade Style SheetCSS Cascade Style Sheet
CSS Cascade Style Sheet
 
Zooming and Its Types
Zooming and Its TypesZooming and Its Types
Zooming and Its Types
 
User Interface & Its Types
User Interface & Its TypesUser Interface & Its Types
User Interface & Its Types
 
Questions About Android Application Development
Questions About Android Application DevelopmentQuestions About Android Application Development
Questions About Android Application Development
 
Human and Machine Learning
Human and Machine LearningHuman and Machine Learning
Human and Machine Learning
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Privacy and Security Information
Privacy and Security InformationPrivacy and Security Information
Privacy and Security Information
 
Code of Conduct - Code of Practice & Standards
Code of Conduct - Code of Practice & StandardsCode of Conduct - Code of Practice & Standards
Code of Conduct - Code of Practice & Standards
 
Self Adaptive Systems
Self Adaptive SystemsSelf Adaptive Systems
Self Adaptive Systems
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
 
Classes and Objects in C#
Classes and Objects in C#Classes and Objects in C#
Classes and Objects in C#
 
Intel Microprocessors 8086 Documentation
Intel Microprocessors 8086 DocumentationIntel Microprocessors 8086 Documentation
Intel Microprocessors 8086 Documentation
 
Applications of Computer
Applications of ComputerApplications of Computer
Applications of Computer
 

Último

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Último (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Virus and Anti Virus - Types of Virus and Anti Virus

  • 2. BY: Adeel Rasheed  Superior University
  • 3. CONTENTS • What is Virus? • Types of Virus • Types of Anti-Virus • How does Anti-Virus Works • Some Anti-Virus Software's which are available in market
  • 4. What is Computer Virus? • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. • A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
  • 5. Virus Infection of more than 75,000 computers in 10 minutes
  • 6. Source of Viruses • Funny images • Greeting cards • Audio and video files • E-mail messages • Through downloads on the Internet • CD,DVD,USB, Memory cards,etc
  • 7. Types of Viruses • Macro Viruses • Memory Resident Viruses • Overwrite Viruses • Direct Action Viruses • Directory Virus • Web Scripting Virus • Multipartite Virus • FAT Viruses • Companion Viruses • Polymorphic Virus • Email Virus
  • 8. Macro Viruses: These viruses infect the files created using some applications or programs that contain macros such as doc, pps, xls and mdb. Memory Resident Viruses: They usually fix themselves inside the computer memory. They get activated every time the OS runs and end up infecting other opened files. They hide in RAM. Overwrite Viruses: These types of viruses delete any information in a file they infect, leaving them partially or completely useless once they are infected. Direct Action Viruses: These viruses mainly replicate or take action once they are executed. When a certain condition is met, the viruses will act by infecting the files in the directory or the folder specified in the AUTOEXEC.BAT. The viruses are generally found in the hard disk’s root directory, but they keep on changing location.
  • 9. Directory Virus: Also known as cluster virus or file system virus. They infect the computer’s directory by changing the path indicating file location. They are usually located in the disk Web Scripting Virus: Most web pages include some complex codes in order to create an interactive and interesting content. Such a code is often exploited to cause certain undesirable actions. Multipartite Virus: These type of viruses spread in many different ways. Their actions vary depending on the OS installed and presence of certain files. They tend to hide in the computer’s memory FAT Viruses: These lardy viruses attack the file allocation table (FAT) which is the disc part used to store every information about the available space, location of files, unusable space etc.
  • 10. Companion Viruses: These types of viruses infect files just like the direct action and the resident types. Once inside the computer Polymorphic Viruses: In a different way every time they infect your computer. They use different encryption and algorithms. This makes it difficult for the antivirus software to locate them using signature or string searches Email Virus: This is a virus spread via an email. Such a virus will hide in an email and when the recipient opens the mail.
  • 11. What is Anti-Virus software? Computer programs intended to Identify and Eliminate Computer Viruses.
  • 12.  Antivirus software is a class of program that searches a hard drive and floppy disk for any known or potential viruses.  Also search from remove able disk.  Anti-virus is a software that scans files or your computer's memory for certain patterns that may indicate an infection.
  • 13. Types of Scans • Automatic scans: Depending what software you choose, you may be able to configure it to automatically scan specific files or directories and prompt you at set intervals to perform complete scans. • Manual scans: It is also a good idea to manually scan files you receive from an outside source before opening them.
  • 14. Main types of Anti-Virus There are different types of antivirus software for different computers  Some are designed for personal computers.  Some are for servers
  • 15. How Antivirus software works? Interception Destination System Source System Alert Disinfection
  • 16. Anti-virus applications maintain a database of known viruses and compare scanned files that match the characteristics of known viruses. If a scanned files matches those characteristics of known viruses. If a scanned file matches those characteristics, it is quarantined so that it cannot affect other files on your system. Once the file is quarantined, the application can attempt to repair it, delete it, or prompt you for a decision on what to do about the file infected
  • 18. Bit defender Antivirus • This years best defense against computer viruses, spyware, hackers and spam is an antivirus program called Bit Defender. • Has a user-friendly interface that scans all existing files on your computer, all incoming and outgoing emails, and even IM transfers. • Features include privacy protection and web scanning for internet use. a years subscription is about $29.95
  • 19. NAV • The most widely used software is the Norton Antivirus. (NAV) • Since its release in 1990, over 100 million people around the world have used it. • It’s a free program but in order to receive live updates, a valid subscription is needed. • A yearly subscription is only $49.99
  • 20. McAfee • McAfee Virus Scan is another popular antivirus program. • It’s designed for home and home-office use. • It’s used specifically on a Microsoft Windows platform. • The includes a number of features including on access file sharing, inbound and outbound firewall protection. • A yearly subscription is only $59.99
  • 21. Kaspersky • For the average home user and advanced users the Kaspersky antivirus software has an easy to use interface. • The program uses 3 tabs for protection, settings and support. • It updates itself on an hourly basis and is one of the fastest antivirus programs available. • However, quality comes at a price and year subscription is $59.99.
  • 22. Avast • The boot-time scanner, Network Shield, and e-mail scanner in Avast has attracted end-users. • The detection capability of Alwil Avast! is very good and you can install the program in any edition of Windows. • The installer of Avast is bundled with Google Chrome browser that is not necessary to continue using the antivirus program. • A yearly subscription is only $34.99