SlideShare una empresa de Scribd logo
1 de 5
A computer virus is a program or a set of programs
that disrupts the normal operation of a computer .
Virus infects or destroys data . It enters in the
computer without the permission or knowledge of
the user . stands for Vital Information
Resources Under Seize. The essential resources like
memory, processing speed, data & programs etc. cannot
have normal operations and can be harmed when virus is
spread. Viruses are self-replicating & are continuously
expanding their reach by infecting more computer files,
resulting in loss of speed & destruction of data. It enters
through an infected floppy or Internet / E-mail.
Virus remains undetected & quietly inactive & waits for a particular signal
or an event to trigger them. Some virus programs monitor the clock in the
host computer & trigger on a certain day, like Friday the 13th. A biological
virus causes physical harm to our body and attack certain cells, whereas
computer virus causes harm to the data and programs stored in computer
by over writing them with garbage or erasing them.
Trojan Horses, Worms & Spyware are some other terms which are
associated with virus programs but are actually different from virus
programs.
Trojan Horse : They are non replicating simple but destructive programs
which spreads from one system to another when it is copied.
Worm : Is a special virus that can replicate itself and use memory but cant
add itself to other programs.
Malware : Is a trouble causing program which interrupt the normal working
of a computer by stealing important information and damages it without the
knowledge of the user.
Spyware: It is a type of malware that is installed on computers and collects
information about users without their knowledge. They secretly monitor the
user’s computing and also collect various types of personal information about
internet surfing habits, visited web pages and transmits the same in the
background to someone else.
Types of viruses :
Viruses can be classified into two major categories.
1. Boot Viruses:
They infect the boot record or master boot records by replacing the same
which is responsible for loading the operating system in memory by copying it
elsewhere. Examples are – Disk killer, Stoned virus.
2. Program File Viruses:
They infect executable files, programs such as those with extension like .com,
.exe, .ovl, .drv, .sys etc. These programs get loaded during execution and
becomes active by replicating, also infecting files on the disk. Sunday, Cascade
etc. are the examples of Program file virus.
VIRUS SYMPTOMS:
The symptoms of virus infection in computer can be detected in many ways such as
Decreasing computer speed, causing strange movements or patterns on screen,
displaying unusual messages, frequent hanging of the system, Reformatting the hard
disk, deleting or damaging files etc.
PREVENTING A VIRUS INFECTION :
To prevent virus infection every pc should be equipped with some anti-virus
program, perform scan for virus infection before running or copying files from
external devices, not installing pirated software, perform periodical scanning hard
disk, using internet and e-mail attachments very carefully.
ANTIVIRUS SOFTWARE :
Antivirus software are computer programs which are designed to indentify, prevent
and remove viruses from our computer.
Antivirus programs scan the computer files to look for known viruses matching
definitions from virus dictionary and also identify suspicious behavior from any
computer program which indicates infection.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 

Destacado

Question7
Question7Question7
Question7Pranu-k
 
Ipw 2015 summary (for students)
Ipw 2015 summary (for students)Ipw 2015 summary (for students)
Ipw 2015 summary (for students)taufeeqaffandey
 
Забезпечуємо підтримку обдарованих учнів
Забезпечуємо підтримку обдарованих учнівЗабезпечуємо підтримку обдарованих учнів
Забезпечуємо підтримку обдарованих учнівblondik1289
 
Brynn Kardash Resume May 2016
Brynn Kardash Resume May 2016Brynn Kardash Resume May 2016
Brynn Kardash Resume May 2016Kardash Brynn
 
Evaluation questions 1
Evaluation questions 1Evaluation questions 1
Evaluation questions 1Camstewart17
 
Evaluation questions 1
Evaluation questions 1Evaluation questions 1
Evaluation questions 1Camstewart17
 
Pertumbuhan dan perkembangan tumbuhan
Pertumbuhan dan perkembangan tumbuhanPertumbuhan dan perkembangan tumbuhan
Pertumbuhan dan perkembangan tumbuhanKhalifati sifa
 
літературно мистецький лютий2016
літературно мистецький лютий2016літературно мистецький лютий2016
літературно мистецький лютий2016Юлия Тер-Давлатян
 
Joseph Fakhry Habib Yanny_Diploma
Joseph Fakhry Habib Yanny_DiplomaJoseph Fakhry Habib Yanny_Diploma
Joseph Fakhry Habib Yanny_DiplomaJoseph Yanny
 
літературно мистецький жовтень2015
літературно мистецький жовтень2015літературно мистецький жовтень2015
літературно мистецький жовтень2015Юлия Тер-Давлатян
 
How to conduct yourself at work
How to conduct yourself at workHow to conduct yourself at work
How to conduct yourself at workMargaret Lakra Deb
 
Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008Phương Nhung
 

Destacado (20)

Divinabopanna
DivinabopannaDivinabopanna
Divinabopanna
 
Dataaaaa
DataaaaaDataaaaa
Dataaaaa
 
Question7
Question7Question7
Question7
 
Ipw 2015 summary (for students)
Ipw 2015 summary (for students)Ipw 2015 summary (for students)
Ipw 2015 summary (for students)
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Забезпечуємо підтримку обдарованих учнів
Забезпечуємо підтримку обдарованих учнівЗабезпечуємо підтримку обдарованих учнів
Забезпечуємо підтримку обдарованих учнів
 
Brynn Kardash Resume May 2016
Brynn Kardash Resume May 2016Brynn Kardash Resume May 2016
Brynn Kardash Resume May 2016
 
Evaluation questions 1
Evaluation questions 1Evaluation questions 1
Evaluation questions 1
 
Direct Access Group Benefits
Direct Access Group BenefitsDirect Access Group Benefits
Direct Access Group Benefits
 
Evaluation questions 1
Evaluation questions 1Evaluation questions 1
Evaluation questions 1
 
Pertumbuhan dan perkembangan tumbuhan
Pertumbuhan dan perkembangan tumbuhanPertumbuhan dan perkembangan tumbuhan
Pertumbuhan dan perkembangan tumbuhan
 
літературно мистецький лютий2016
літературно мистецький лютий2016літературно мистецький лютий2016
літературно мистецький лютий2016
 
Joseph Fakhry Habib Yanny_Diploma
Joseph Fakhry Habib Yanny_DiplomaJoseph Fakhry Habib Yanny_Diploma
Joseph Fakhry Habib Yanny_Diploma
 
літературно мистецький жовтень2015
літературно мистецький жовтень2015літературно мистецький жовтень2015
літературно мистецький жовтень2015
 
E learning
E learningE learning
E learning
 
Actual faerie powerpoint
Actual faerie powerpointActual faerie powerpoint
Actual faerie powerpoint
 
тренінг
тренінгтренінг
тренінг
 
How to conduct yourself at work
How to conduct yourself at workHow to conduct yourself at work
How to conduct yourself at work
 
Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008Bai 1 lam quen voi sql 2008
Bai 1 lam quen voi sql 2008
 
Adriana Pieterse (2)
Adriana Pieterse (2)Adriana Pieterse (2)
Adriana Pieterse (2)
 

Similar a Computer Virus

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
Harmful software
Harmful softwareHarmful software
Harmful softwareBijoKG2
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Computer virus
Computer virusComputer virus
Computer viruskiran_a_c
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 

Similar a Computer Virus (20)

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Viruses
VirusesViruses
Viruses
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Virus
VirusVirus
Virus
 

Último

Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyAnusha Are
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456KiaraTiradoMicha
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 

Último (20)

Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 

Computer Virus

  • 1.
  • 2. A computer virus is a program or a set of programs that disrupts the normal operation of a computer . Virus infects or destroys data . It enters in the computer without the permission or knowledge of the user . stands for Vital Information Resources Under Seize. The essential resources like memory, processing speed, data & programs etc. cannot have normal operations and can be harmed when virus is spread. Viruses are self-replicating & are continuously expanding their reach by infecting more computer files, resulting in loss of speed & destruction of data. It enters through an infected floppy or Internet / E-mail.
  • 3. Virus remains undetected & quietly inactive & waits for a particular signal or an event to trigger them. Some virus programs monitor the clock in the host computer & trigger on a certain day, like Friday the 13th. A biological virus causes physical harm to our body and attack certain cells, whereas computer virus causes harm to the data and programs stored in computer by over writing them with garbage or erasing them. Trojan Horses, Worms & Spyware are some other terms which are associated with virus programs but are actually different from virus programs. Trojan Horse : They are non replicating simple but destructive programs which spreads from one system to another when it is copied. Worm : Is a special virus that can replicate itself and use memory but cant add itself to other programs. Malware : Is a trouble causing program which interrupt the normal working of a computer by stealing important information and damages it without the knowledge of the user.
  • 4. Spyware: It is a type of malware that is installed on computers and collects information about users without their knowledge. They secretly monitor the user’s computing and also collect various types of personal information about internet surfing habits, visited web pages and transmits the same in the background to someone else. Types of viruses : Viruses can be classified into two major categories. 1. Boot Viruses: They infect the boot record or master boot records by replacing the same which is responsible for loading the operating system in memory by copying it elsewhere. Examples are – Disk killer, Stoned virus. 2. Program File Viruses: They infect executable files, programs such as those with extension like .com, .exe, .ovl, .drv, .sys etc. These programs get loaded during execution and becomes active by replicating, also infecting files on the disk. Sunday, Cascade etc. are the examples of Program file virus.
  • 5. VIRUS SYMPTOMS: The symptoms of virus infection in computer can be detected in many ways such as Decreasing computer speed, causing strange movements or patterns on screen, displaying unusual messages, frequent hanging of the system, Reformatting the hard disk, deleting or damaging files etc. PREVENTING A VIRUS INFECTION : To prevent virus infection every pc should be equipped with some anti-virus program, perform scan for virus infection before running or copying files from external devices, not installing pirated software, perform periodical scanning hard disk, using internet and e-mail attachments very carefully. ANTIVIRUS SOFTWARE : Antivirus software are computer programs which are designed to indentify, prevent and remove viruses from our computer. Antivirus programs scan the computer files to look for known viruses matching definitions from virus dictionary and also identify suspicious behavior from any computer program which indicates infection.