SlideShare una empresa de Scribd logo
1 de 13
Computer
   Virus
What is a computer virus ?
 Computer virus is a program that is loaded onto your
   computer without your knowledge and runs against
   your wishes.
 They perform some activities like deleting files or
  disturbing your computer settings.
 If a file that contains virus is executed or copied onto
  another computer, then that computer will also be
 "infected" by the same virus.
When virus will affect our computer
?
Computer virus affect mostly attack.com, .exe, .sys,
 .bin, .pif etc Virus can affect any files on your
 computer.
Virus will generally infect executable files or
 data files, such as word or excel documents
How to protect your computer
against viruses ?
-:: To Protect computer against viruses, follow these steps ::-

                   ( 3 simple Steps )

       Turn on the firewall.

       Keep your computer up-to-date.

       Install Microsoft Security Essentials and keep it
        up to date.
How Do I Prevent A Virus ?
Load only software from original disks or CD's.
 Pirated or copied software is always a risk for a
 virus.
Execute only programs of which you are familiar as
  to their origin. Programs sent by email should
  always be suspicious.
Computer uploads and "system configuration"
  changes should always be performed by the person
  who is responsible for the computer.
Password protection should be employed.
Purchase or download a anti-virus program that runs
 as you boot or work your computer. Up-date it
 frequently. There are free anti-virus programs
 available.
Symptoms of computer virus ?
   The computer runs slower than usual.

   The computer crashes, and then it restarts every few
    minutes.

   Applications on the computer do not work correctly.

   Strange sounds or music plays from the speakers
    unexpectedly.

   A program disappears from the computer even though you did not
    intentionally remove the program.

 You cannot print items correctly.

 Disks or disk drives are inaccessible.
THANK
  YOU…….!!

Más contenido relacionado

La actualidad más candente

Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
Amrit Kaur
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
guest7b2ba1
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 

La actualidad más candente (20)

Sowmya
SowmyaSowmya
Sowmya
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Viruses
VirusesViruses
Viruses
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Destacado (7)

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Rohan dev
Rohan devRohan dev
Rohan dev
 
Computer virus
Computer virusComputer virus
Computer virus
 
CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
 
Chemistry pbl
Chemistry pblChemistry pbl
Chemistry pbl
 
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICT
 

Similar a Computer virus

Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
jnnj
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
Anuj Pawar
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
makanaya
 

Similar a Computer virus (20)

Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
computer virus.pptx
computer virus.pptxcomputer virus.pptx
computer virus.pptx
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
As computer virus
As computer virusAs computer virus
As computer virus
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Computer virus

  • 1. Computer Virus
  • 2. What is a computer virus ?
  • 3.  Computer virus is a program that is loaded onto your computer without your knowledge and runs against your wishes.  They perform some activities like deleting files or disturbing your computer settings.  If a file that contains virus is executed or copied onto another computer, then that computer will also be "infected" by the same virus.
  • 4. When virus will affect our computer ?
  • 5.
  • 6. Computer virus affect mostly attack.com, .exe, .sys, .bin, .pif etc Virus can affect any files on your computer. Virus will generally infect executable files or data files, such as word or excel documents
  • 7. How to protect your computer against viruses ?
  • 8. -:: To Protect computer against viruses, follow these steps ::- ( 3 simple Steps ) Turn on the firewall. Keep your computer up-to-date. Install Microsoft Security Essentials and keep it up to date.
  • 9. How Do I Prevent A Virus ?
  • 10. Load only software from original disks or CD's. Pirated or copied software is always a risk for a virus. Execute only programs of which you are familiar as to their origin. Programs sent by email should always be suspicious. Computer uploads and "system configuration" changes should always be performed by the person who is responsible for the computer. Password protection should be employed. Purchase or download a anti-virus program that runs as you boot or work your computer. Up-date it frequently. There are free anti-virus programs available.
  • 12. The computer runs slower than usual.  The computer crashes, and then it restarts every few minutes.  Applications on the computer do not work correctly.  Strange sounds or music plays from the speakers unexpectedly.  A program disappears from the computer even though you did not intentionally remove the program.  You cannot print items correctly.  Disks or disk drives are inaccessible.