SlideShare una empresa de Scribd logo
1 de 15
Welcome
Topic
Overview
 •   What is anti virus? & short history of it.
 •   How an antivirus work?
 •   Configuring antivirus software?
 •   Some of the symptoms of an infected
     computer?
 •   Deleting Identified Virus files manually?
 •   Antivirus Effectiveness.
 •   Antivirus Damaged files.
 •   Online Antivirus scanning.
 •   some popular Antivirus.
What is anti virus?

Antivirus Software is a computer program that
identify and remove computer viruses, and other
malicious software like Worms and Trojans from an
infected computer. Not only this, an antivirus
software also protects the computer from further
virus attacks.
The first anti-virus software in 1987. Fix, a German
astrophysicist and amateur computer programmer
developed software to combat the first computer
virus “in the wild," which means that the virus had
escaped the confines of the lab or network .
How an Antivirus works ?

An Antivirus works Using dictionary Approach
The antivirus software examines each and
every file in a computer and examines its
content with the virus definitions stored in its
virus dictionary. A virus dictionary is an inbuilt
file belonging to an antivirus software that
contains code identified as a virus by the
antivirus authors.
Configuring an antivirus software ?

Configuring your Antivirus software Adjust the
settings to scan all files. Also, ensure that real
time scanning is enabled by default. Create a
recovery/reference/cure disk because if a boot
sector or MBR virus attack the system, it may fail
to boot. In that case, recovery cure disk can be
used to boot the system and remove the virus.
Read the vendors manual. This will help you to
understand the advanced options and how to use
them according to your preference.
Some of the symptoms of infected
             computer
Folder Options disappears from the Tools. Now,
hidden files cannot be viewed. Changing registry
values has no effect. Reedit doesn’t works, when
you try to invoke it from the RUN box. Task
Manager has been disabled by Administrator. In
My Computer, Auto play option appears instead
of Open in every drive you enter i.e. when you
click on your drive letters (C, D, E etc) a window
opens to select any one program to Open with.
Computer becomes slow and there is noticeable
delay in characters to appear on screen when you
press in keyboard.
Deleting Identified Virus files manually

Deleting Identified Virus files manually Identify files say like
autorun.inf or mswin32.dll.vbs in the root of all drives or in
your system drive. You can also delete a file from DOS. the
command DIR /w/a displays all hidden files and folders. with
command attrib -s -h -r <filename>.
 Then del <filename> A virus also hides itself in the System
Volume Information and PREFETCH folder. So it might be a
good idea to turn off System Restore for a while. To prevent
future infections in your USB Drive, what you could try is
create an empty autorun.inf file and set read only attribute to
it. This should prevent a malicious autorun.inf taking its place .
Antivirus Effectiveness

 Studies in December 2007 showed that the
effectiveness of antivirus software had decreased in
the previous year, particularly against unknown or zero
day attacks. The computer magazine c't found that
detection rates for these threats had dropped from 40-
50% in 2006 to 20-30% in 2007.
 At that time, the only exception was the NOD32
antivirus, which managed a detection rate of 68
percent Anti-virus programs are not always effective
against new viruses, even those that use non-
signature-based methods that should detect new
viruses. The reason for this is that the virus designers
test their new viruses on the major anti-virus
applications to make sure that they are not detected
before releasing them into the wild.
Antivirus Damaged files

Files which have been damaged by computer
viruses are normally damaged beyond
recovery. Anti-virus software removes the
virus code from the file during
disinfection, but this does not always restore
the file to its undamaged state. In such
circumstances, damaged files can only be
restored from existing backups; installed
software that is damaged requires re-
installation.
Some popular Antivirus:
When select an Antivirus Software ?

An Antivirus Software Real-Time Scanning
antivirus software is automatically running in the
background on a continuous basis, scanning files
and folders for possible virus attacks as they are
opened or executed, and checking e-mails as they
are downloaded. Most commercial antivirus
software provide real time scanning.
Online Antivirus scanning

    Some antivirus vendors maintain websites
    with free online scanning capability of the
    entire computer, critical areas only, local disks,
    folders or files. Periodic online scanning is a
    good idea for those that run antivirus
    applications on their computers because
    those applications are frequently slow to catch
    threats.
.
Online Antivirus scanning cont….
• One of the first things that malicious software
  does in an attack is disable any existing antivirus
  software and sometimes the only way to know of
  an attack is by turning to an online resource that
  isn't already installed on the infected computer
Tha
nks
  For Joining

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Computer virus
 Computer virus Computer virus
Computer virus
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Malware
MalwareMalware
Malware
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Similar a Antivirus (20)

Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Antivirus
AntivirusAntivirus
Antivirus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Virus
VirusVirus
Virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Anti virus
Anti virusAnti virus
Anti virus
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 

Más de ava & araf co.

Business comminucation
Business comminucationBusiness comminucation
Business comminucationava & araf co.
 
Completion of the accounting cycle
Completion of the accounting cycleCompletion of the accounting cycle
Completion of the accounting cycleava & araf co.
 
Wax showpitch(manufacturing cost of product)
Wax showpitch(manufacturing cost of product)Wax showpitch(manufacturing cost of product)
Wax showpitch(manufacturing cost of product)ava & araf co.
 
Absolutely fantasticslideshow
Absolutely fantasticslideshowAbsolutely fantasticslideshow
Absolutely fantasticslideshowava & araf co.
 
features of windows7 & 8(trail)
features of windows7 & 8(trail)features of windows7 & 8(trail)
features of windows7 & 8(trail)ava & araf co.
 

Más de ava & araf co. (8)

Matter
MatterMatter
Matter
 
Monitor(lcd & crt)
Monitor(lcd & crt)Monitor(lcd & crt)
Monitor(lcd & crt)
 
Business comminucation
Business comminucationBusiness comminucation
Business comminucation
 
Completion of the accounting cycle
Completion of the accounting cycleCompletion of the accounting cycle
Completion of the accounting cycle
 
Wax showpitch(manufacturing cost of product)
Wax showpitch(manufacturing cost of product)Wax showpitch(manufacturing cost of product)
Wax showpitch(manufacturing cost of product)
 
Adjusting the account
Adjusting the accountAdjusting the account
Adjusting the account
 
Absolutely fantasticslideshow
Absolutely fantasticslideshowAbsolutely fantasticslideshow
Absolutely fantasticslideshow
 
features of windows7 & 8(trail)
features of windows7 & 8(trail)features of windows7 & 8(trail)
features of windows7 & 8(trail)
 

Último

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Antivirus

  • 3. Overview • What is anti virus? & short history of it. • How an antivirus work? • Configuring antivirus software? • Some of the symptoms of an infected computer? • Deleting Identified Virus files manually? • Antivirus Effectiveness. • Antivirus Damaged files. • Online Antivirus scanning. • some popular Antivirus.
  • 4. What is anti virus? Antivirus Software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks. The first anti-virus software in 1987. Fix, a German astrophysicist and amateur computer programmer developed software to combat the first computer virus “in the wild," which means that the virus had escaped the confines of the lab or network .
  • 5. How an Antivirus works ? An Antivirus works Using dictionary Approach The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary. A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.
  • 6. Configuring an antivirus software ? Configuring your Antivirus software Adjust the settings to scan all files. Also, ensure that real time scanning is enabled by default. Create a recovery/reference/cure disk because if a boot sector or MBR virus attack the system, it may fail to boot. In that case, recovery cure disk can be used to boot the system and remove the virus. Read the vendors manual. This will help you to understand the advanced options and how to use them according to your preference.
  • 7. Some of the symptoms of infected computer Folder Options disappears from the Tools. Now, hidden files cannot be viewed. Changing registry values has no effect. Reedit doesn’t works, when you try to invoke it from the RUN box. Task Manager has been disabled by Administrator. In My Computer, Auto play option appears instead of Open in every drive you enter i.e. when you click on your drive letters (C, D, E etc) a window opens to select any one program to Open with. Computer becomes slow and there is noticeable delay in characters to appear on screen when you press in keyboard.
  • 8. Deleting Identified Virus files manually Deleting Identified Virus files manually Identify files say like autorun.inf or mswin32.dll.vbs in the root of all drives or in your system drive. You can also delete a file from DOS. the command DIR /w/a displays all hidden files and folders. with command attrib -s -h -r <filename>. Then del <filename> A virus also hides itself in the System Volume Information and PREFETCH folder. So it might be a good idea to turn off System Restore for a while. To prevent future infections in your USB Drive, what you could try is create an empty autorun.inf file and set read only attribute to it. This should prevent a malicious autorun.inf taking its place .
  • 9. Antivirus Effectiveness Studies in December 2007 showed that the effectiveness of antivirus software had decreased in the previous year, particularly against unknown or zero day attacks. The computer magazine c't found that detection rates for these threats had dropped from 40- 50% in 2006 to 20-30% in 2007. At that time, the only exception was the NOD32 antivirus, which managed a detection rate of 68 percent Anti-virus programs are not always effective against new viruses, even those that use non- signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild.
  • 10. Antivirus Damaged files Files which have been damaged by computer viruses are normally damaged beyond recovery. Anti-virus software removes the virus code from the file during disinfection, but this does not always restore the file to its undamaged state. In such circumstances, damaged files can only be restored from existing backups; installed software that is damaged requires re- installation.
  • 12. When select an Antivirus Software ? An Antivirus Software Real-Time Scanning antivirus software is automatically running in the background on a continuous basis, scanning files and folders for possible virus attacks as they are opened or executed, and checking e-mails as they are downloaded. Most commercial antivirus software provide real time scanning.
  • 13. Online Antivirus scanning Some antivirus vendors maintain websites with free online scanning capability of the entire computer, critical areas only, local disks, folders or files. Periodic online scanning is a good idea for those that run antivirus applications on their computers because those applications are frequently slow to catch threats. .
  • 14. Online Antivirus scanning cont…. • One of the first things that malicious software does in an attack is disable any existing antivirus software and sometimes the only way to know of an attack is by turning to an online resource that isn't already installed on the infected computer
  • 15. Tha nks For Joining