SlideShare a Scribd company logo
1 of 13
WELCOME
Computer virus
What is a computer virus? Computer virus are small software programs that are designed to spread from one computer to another and to interface with computer operation. A virus might corrupt or delete data on your computer ,use your e-mail program to spread itself to other computers ,or even erase everything on your hard disk Computer viruses are often spread by attachments in e-mail messages or instant messaging messages. That is why is essential that you never open e-mail attachments unless you know who it’s from and you are expecting it. Virus can be disguised as attachments of funny Images , greeting cards , or audio and video files
[object Object]
To help avoid computer viruses , it’s essential that you keep your computer current with the latest updates and antivirus tools, stay informed  about recent threats , run your computer as a standard user and that you follow a few basic rules when you surf the Internet, downloads files , and open attachments .
Computer virus is a kind of malicious software written intentionally to enter a computer without the user’s permission or knowledge , with an ability to replicate it self , thus continuing to spread . Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system.,[object Object]
Types of virus  There are different types of computer virus could be classified . Let us have at look at them  A virus should never be assumed harmless and left on the system . Most common type of virus are mentioned below.
Overwrite viruses Virus of this kind is characterized by fact that it deletes the information contained in the files that it  infects , rendering them partially or totally useless once they have been infected  The only way to clean a file infected by an overwrite virus is to delete the file completely ,thus losing the original content  Example : way trivial.88.d
Boot Viruses This type of viruses affects the boot sector of a floppy or hard disk. This is a crucial part of a disk , in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.  The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive. Examples : AntiEXE , Polyboot.b.
Worms virus A worm is a program very similar to a virus ; it has the ability to self-replicate , and can lead to negative effects on your system and most importantly they are detected and eliminating by antivirus. Examples: Mapson etc.,
A virus, once installed on your computer, can easily corrupt or delete data from your computer. we have heard countless times from people, " But I did not open any email attachments, how can I be infected?" While it is true that a majority of viruses are hidden within email attachments, they can also be downloaded into our computers in the form of images, videos, or even instant messages Do not open email attachments if you do not know the sender, this is asking for trouble. Lets move on to identifying infected computers., it is our responsibility to quickly identify the signs of virus infections. Computers with virus infections will often show some of the following symptoms. Please note, that the issues listed below may be caused by several problems, such as spyware, and are not specific to viruses. Your computer may be slow to start or shut down. You may be missing data on your hard drive or, in worst case scenarios, lose all data on the drive. You may experience strange error messages or you computer will shut down unexpectedly. Your fonts may be distorted and overlap or you may experience difficulties in printing. If you do not have an anti virus program, first thing to do is get one! In the meantime you may use the services of an online virus removal tool. Many of the popular anti virus programs offer this service.

More Related Content

What's hot

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
 
Viruses
VirusesViruses
Viruses
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Malware
MalwareMalware
Malware
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Virus
VirusVirus
Virus
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 

Viewers also liked (10)

Touch Screen - by Suma
Touch Screen - by SumaTouch Screen - by Suma
Touch Screen - by Suma
 
Geetha
GeethaGeetha
Geetha
 
Display Devices - by Sumithra
Display Devices - by SumithraDisplay Devices - by Sumithra
Display Devices - by Sumithra
 
UPS - by Damodaran
UPS - by DamodaranUPS - by Damodaran
UPS - by Damodaran
 
Algorithm.ppt
Algorithm.pptAlgorithm.ppt
Algorithm.ppt
 
Power Electronics and Switch Mode Power Supply
Power Electronics and Switch Mode Power SupplyPower Electronics and Switch Mode Power Supply
Power Electronics and Switch Mode Power Supply
 
Basic Ups
Basic UpsBasic Ups
Basic Ups
 
Switch mode power supply
Switch mode power supplySwitch mode power supply
Switch mode power supply
 
Algorithm and flowchart
Algorithm and flowchartAlgorithm and flowchart
Algorithm and flowchart
 
Algorithms and Flowcharts
Algorithms and FlowchartsAlgorithms and Flowcharts
Algorithms and Flowcharts
 

Similar to Sowmya

virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisaDom Mike
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingmentcheauyih
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 

Similar to Sowmya (20)

virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 

More from Santhosh Sundar

Cryptovirology - by Malathi
Cryptovirology - by MalathiCryptovirology - by Malathi
Cryptovirology - by MalathiSanthosh Sundar
 
Evolution of Computers - by Solomon
Evolution of Computers - by SolomonEvolution of Computers - by Solomon
Evolution of Computers - by SolomonSanthosh Sundar
 
IT Companies - by Bharathi
IT Companies - by BharathiIT Companies - by Bharathi
IT Companies - by BharathiSanthosh Sundar
 
Remote Sensing - by Ashwini
Remote Sensing - by AshwiniRemote Sensing - by Ashwini
Remote Sensing - by AshwiniSanthosh Sundar
 
Input Devices - by Anil kumar
Input Devices - by Anil kumarInput Devices - by Anil kumar
Input Devices - by Anil kumarSanthosh Sundar
 
Operating System - by Vedananda
Operating System - by VedanandaOperating System - by Vedananda
Operating System - by VedanandaSanthosh Sundar
 

More from Santhosh Sundar (6)

Cryptovirology - by Malathi
Cryptovirology - by MalathiCryptovirology - by Malathi
Cryptovirology - by Malathi
 
Evolution of Computers - by Solomon
Evolution of Computers - by SolomonEvolution of Computers - by Solomon
Evolution of Computers - by Solomon
 
IT Companies - by Bharathi
IT Companies - by BharathiIT Companies - by Bharathi
IT Companies - by Bharathi
 
Remote Sensing - by Ashwini
Remote Sensing - by AshwiniRemote Sensing - by Ashwini
Remote Sensing - by Ashwini
 
Input Devices - by Anil kumar
Input Devices - by Anil kumarInput Devices - by Anil kumar
Input Devices - by Anil kumar
 
Operating System - by Vedananda
Operating System - by VedanandaOperating System - by Vedananda
Operating System - by Vedananda
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Sowmya

  • 3. What is a computer virus? Computer virus are small software programs that are designed to spread from one computer to another and to interface with computer operation. A virus might corrupt or delete data on your computer ,use your e-mail program to spread itself to other computers ,or even erase everything on your hard disk Computer viruses are often spread by attachments in e-mail messages or instant messaging messages. That is why is essential that you never open e-mail attachments unless you know who it’s from and you are expecting it. Virus can be disguised as attachments of funny Images , greeting cards , or audio and video files
  • 4.
  • 5. To help avoid computer viruses , it’s essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats , run your computer as a standard user and that you follow a few basic rules when you surf the Internet, downloads files , and open attachments .
  • 6.
  • 7. Types of virus There are different types of computer virus could be classified . Let us have at look at them A virus should never be assumed harmless and left on the system . Most common type of virus are mentioned below.
  • 8. Overwrite viruses Virus of this kind is characterized by fact that it deletes the information contained in the files that it infects , rendering them partially or totally useless once they have been infected The only way to clean a file infected by an overwrite virus is to delete the file completely ,thus losing the original content Example : way trivial.88.d
  • 9. Boot Viruses This type of viruses affects the boot sector of a floppy or hard disk. This is a crucial part of a disk , in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk. The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive. Examples : AntiEXE , Polyboot.b.
  • 10. Worms virus A worm is a program very similar to a virus ; it has the ability to self-replicate , and can lead to negative effects on your system and most importantly they are detected and eliminating by antivirus. Examples: Mapson etc.,
  • 11.
  • 12. A virus, once installed on your computer, can easily corrupt or delete data from your computer. we have heard countless times from people, " But I did not open any email attachments, how can I be infected?" While it is true that a majority of viruses are hidden within email attachments, they can also be downloaded into our computers in the form of images, videos, or even instant messages Do not open email attachments if you do not know the sender, this is asking for trouble. Lets move on to identifying infected computers., it is our responsibility to quickly identify the signs of virus infections. Computers with virus infections will often show some of the following symptoms. Please note, that the issues listed below may be caused by several problems, such as spyware, and are not specific to viruses. Your computer may be slow to start or shut down. You may be missing data on your hard drive or, in worst case scenarios, lose all data on the drive. You may experience strange error messages or you computer will shut down unexpectedly. Your fonts may be distorted and overlap or you may experience difficulties in printing. If you do not have an anti virus program, first thing to do is get one! In the meantime you may use the services of an online virus removal tool. Many of the popular anti virus programs offer this service.
  • 13.