SlideShare a Scribd company logo
1 of 25
Abhinit Kumar Sharma
 INTRODUCTION
 The basics of computer Virus
 Summarizing what they are ?
 How they attack ?
 What we can do to protect our selves ?
 What is Computer Virus ?
A comp. Virus is a coded program that is
written in Assembly or System
programming language to modify existing
program and perform a series of action
without user consent.
 HISTORY OF COMPUTER VIRUSES
The Pre-Historic Period
The Early Times
The Middle Ages
The Current Picture
The Emerging Scenario
 CLASSIFICATION OF VIRUSES
General Classification Of Viruses
Behavioral Classification of Viruses
 General Classification Of Virus
Viruses
Boot
Sector
Viruses
Directory
Viruses
Floppy
Disk Boot
Sector
Viruses
Hard Disk
Master
Boot
Record
(MBR)/
Partition
Table
Viruses
Macro
Virus
Parasitic
Virus
File
Viruses
 Behavioral Classification of Virus
 Nature Of Attack
 Deception Techniques Employed
 Frequency of Infection
 Nature Of Attack
Viruses
Direct
Action
Viruses
Resident
Virus
 Deception Techniques Employed
Viruses
Stealth
Virus
Batch File
Virus
Multipartite
Viruses
Polymorphic
Virus
Cavity
Virus
Tunneling
Virus
Camouflage
Viruses
Armored
Viruses
Companion
Viruses
 Frequency of Infection
Fast
Infector
Virus
Slow
Infector
Viruses
Sparse
Infector
Viruses
Viruses
Discover
y
Assimilation
Eradicatio
n
Gestatio
n
The propagated
virus is activated
Users become aware of
the virus and isolate it
Vaccine for the virus
is developed
When the use of vaccine become
widespread the virus is eradicated
The same or a
diff. developer
develops a diff.
strain of a new
virus and the
progress begins
afresh
The virus spreads
to other systems
Activation
Propagation
STAGE - 1
STAGE - 2
STAGE - 3
STAGE - 4
STAGE - 5
STAGE - 7
The created virus
is released to the
outside world
STAGE - 6
Creation
 LIFE CYCLE OF A VIRUS
 QUALITIES OF A VIRUS
 A virus must incorporate a replicating routine.
 A virus should be able to install itself in the RAM.
 A virus has a trademark trigger routine.
 Some viruses have an encryption routine.
 Most viruses are designed to exhibit some sort of
stealth characteristics to avoid detection.
 HOW DOES VIRUS WORKS
 Enter by email,downloads,floppy disk or hacking
 Then make copies of itself to spread.
 They will wait for the signal for being activated.
SYMPTOMS OF A VIRUS
INFECTION
 Graphics and unusual text will appear.
 Music will play for no reason.
 Program and data file suddenly corrupted.
 Disk volume is changed.
 Files and directories have been changed suddenly.
 Your computer goes slowdown.
 System memory have been changed.
 Hardware devices begin to exhibit unusual behavour.
 Interrupt vector have been changed.
 HOW VIRUSES SPREAD
SO QUICKLY ?
 The larger amount of spreading the virus is user base, the
more widespread and quicker the infection.
 The level of piracy is also influence to spread.
The complexity & characteristics of the virus code helps a
virus to spread effectively.
 Internet is also cause to spread the virus quickly.
 POSITIVE VIRUS
 A virus is ‘bad’ or ‘good’ depends on the virus developer.
 Virus is made of two parts.
 Propagation mechanism.
 Payload.
 Propagation mechanism Spreads comp. To comp.
 It is a technical challenge that lets fun of designing it.
 Propagated virus automatically spreading until halted.
 Entire meaning is easy to get and hard to recover.
 Ex. If a virus which acts as anti-virus that detect the
negative virus and remove from the system.
 “I LOVE YOU” VIRUS
 A love letter which is win32 based on e-mail
attachments.
 HOW DO I GET IT ?
 Attachment named : LOVE-LETTER-FOR YOU.TXT
 The warning is protect.vbs.
 When it opened virus infects to the system.
 Unless you are sure that the doc. Is free from virus.
 If you are unsure than ask to the sender to confirm.
 Difficult to open .mp2 , .mp3 , .midi , .wav Etc.
 Difficult to open .jpg , .bmp , .gif etc
 What is Anti-Virus
Anti-Virus is a specialized utility
program which is used to detect , eradicate
and prevent viruses.
DIFFERENT ANTI-VIRUS TECHNOLOGY
Hook Driver
It provides databases in notes.
Extension Manager
It allows a program to be run
natively.
 HOW EFFECTIVE IS AN ANTI-
VIRUS SW IS ?
 Methodology of detecting, and incorporate anti-virus.
They have their own database to compare string of virus
string to detect.
An intelligent virus may breakdown your anti-virus sw.
Timely and regularly upgrade the anti-virus sw
If more than one user use one computer ,always check
all local drives after download any data.
COULD ANTI-VIRUS
PROGRAM ITSELF BE INFECTED?
 Clever virus may infect the anti-virus sw.
 Parallel you might be use the another corporate anti-virus.
 If one fails than the other might be detect.
 The developer make an anti-virus sw after confirmation.
 QUALITIES OF AN ANTI-VIRUS
SW.
 Directly it remove to your system memory.
 Example of virus which is same as cancer cells.
Two ways of virus detection.
 Signature based like polymorphic virus.
 Rule based like genetic in nature.
 Cat and mouse game bet’n developer and writers.
 LIMITATIONS OF ANTI-VIRUS
PROGRAMS
 Limited database virus strings.
 old version can’t detect.
 Directly not work on on-line services.
 Restricted coverage area for an anti-virus sw
 CONCLUSION
While using diff. External Data storage devices like cd’s,
floppy disk
scan all the system with the help of upgrade anti-virus
soft-ware.
The hazard ness cause by the virus to our system for
which we have to take care.
 “PREVENTION IS ALLWAYES BETTER THAN
CURE”.
Thank You !!!

More Related Content

What's hot

Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Virusesmartingarcia300
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingmentcheauyih
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemLee Ray
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus softwarekhalid umer
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 

What's hot (20)

Anti virus
Anti virusAnti virus
Anti virus
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 

Viewers also liked

Arabic Translation: نظام مكافحة التجسس الاستباقي بوصفه جزءاً من استمرارية الأ...
Arabic Translation: نظام مكافحة التجسس الاستباقي بوصفه جزءاً من استمرارية الأ...Arabic Translation: نظام مكافحة التجسس الاستباقي بوصفه جزءاً من استمرارية الأ...
Arabic Translation: نظام مكافحة التجسس الاستباقي بوصفه جزءاً من استمرارية الأ...Dr. Lydia Kostopoulos
 
Universal Design for Learning & the iPad
Universal Design for Learning & the iPadUniversal Design for Learning & the iPad
Universal Design for Learning & the iPadChris Walton
 
Senior Contract Specialist Roles and Responsibilities at PG&E
Senior Contract Specialist Roles and Responsibilities at PG&ESenior Contract Specialist Roles and Responsibilities at PG&E
Senior Contract Specialist Roles and Responsibilities at PG&EAlberto Rocha
 
Gita Classi prime Scuola San Giovanni Bosco Imola
Gita Classi prime Scuola San Giovanni Bosco ImolaGita Classi prime Scuola San Giovanni Bosco Imola
Gita Classi prime Scuola San Giovanni Bosco ImolaDavide Aruta
 
ความรู้เบื้องต้นเกี่ยวกับสิ่งมีชีวิต
ความรู้เบื้องต้นเกี่ยวกับสิ่งมีชีวิตความรู้เบื้องต้นเกี่ยวกับสิ่งมีชีวิต
ความรู้เบื้องต้นเกี่ยวกับสิ่งมีชีวิตประกายทิพย์ แซ่กี่
 

Viewers also liked (19)

ตาราง
ตารางตาราง
ตาราง
 
ทั่วไป
ทั่วไปทั่วไป
ทั่วไป
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Tagmax_ebooklet
Tagmax_ebookletTagmax_ebooklet
Tagmax_ebooklet
 
Image analysis
Image analysisImage analysis
Image analysis
 
Arabic Translation: نظام مكافحة التجسس الاستباقي بوصفه جزءاً من استمرارية الأ...
Arabic Translation: نظام مكافحة التجسس الاستباقي بوصفه جزءاً من استمرارية الأ...Arabic Translation: نظام مكافحة التجسس الاستباقي بوصفه جزءاً من استمرارية الأ...
Arabic Translation: نظام مكافحة التجسس الاستباقي بوصفه جزءاً من استمرارية الأ...
 
Universal Design for Learning & the iPad
Universal Design for Learning & the iPadUniversal Design for Learning & the iPad
Universal Design for Learning & the iPad
 
Question 4
Question 4Question 4
Question 4
 
Senior Contract Specialist Roles and Responsibilities at PG&E
Senior Contract Specialist Roles and Responsibilities at PG&ESenior Contract Specialist Roles and Responsibilities at PG&E
Senior Contract Specialist Roles and Responsibilities at PG&E
 
Who says 'everything's alright' (3)
Who says 'everything's alright'  (3)Who says 'everything's alright'  (3)
Who says 'everything's alright' (3)
 
Gita Classi prime Scuola San Giovanni Bosco Imola
Gita Classi prime Scuola San Giovanni Bosco ImolaGita Classi prime Scuola San Giovanni Bosco Imola
Gita Classi prime Scuola San Giovanni Bosco Imola
 
Appilicious
AppiliciousAppilicious
Appilicious
 
White Stone logo
White Stone logoWhite Stone logo
White Stone logo
 
Appilicious
AppiliciousAppilicious
Appilicious
 
інтернет і соц. сеті
інтернет і соц. сетіінтернет і соц. сеті
інтернет і соц. сеті
 
Presentation1
Presentation1Presentation1
Presentation1
 
อะตอมและนิวเคลียส
อะตอมและนิวเคลียสอะตอมและนิวเคลียส
อะตอมและนิวเคลียส
 
ความรู้เบื้องต้นเกี่ยวกับสิ่งมีชีวิต
ความรู้เบื้องต้นเกี่ยวกับสิ่งมีชีวิตความรู้เบื้องต้นเกี่ยวกับสิ่งมีชีวิต
ความรู้เบื้องต้นเกี่ยวกับสิ่งมีชีวิต
 
Hardware & networking
Hardware & networkingHardware & networking
Hardware & networking
 

Similar to Malware

Similar to Malware (20)

Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptx
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer viruses
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Recently uploaded

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 

Recently uploaded (20)

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 

Malware

  • 2.  INTRODUCTION  The basics of computer Virus  Summarizing what they are ?  How they attack ?  What we can do to protect our selves ?
  • 3.  What is Computer Virus ? A comp. Virus is a coded program that is written in Assembly or System programming language to modify existing program and perform a series of action without user consent.
  • 4.  HISTORY OF COMPUTER VIRUSES The Pre-Historic Period The Early Times The Middle Ages The Current Picture The Emerging Scenario
  • 5.  CLASSIFICATION OF VIRUSES General Classification Of Viruses Behavioral Classification of Viruses
  • 6.  General Classification Of Virus Viruses Boot Sector Viruses Directory Viruses Floppy Disk Boot Sector Viruses Hard Disk Master Boot Record (MBR)/ Partition Table Viruses Macro Virus Parasitic Virus File Viruses
  • 7.  Behavioral Classification of Virus  Nature Of Attack  Deception Techniques Employed  Frequency of Infection
  • 8.  Nature Of Attack Viruses Direct Action Viruses Resident Virus
  • 9.  Deception Techniques Employed Viruses Stealth Virus Batch File Virus Multipartite Viruses Polymorphic Virus Cavity Virus Tunneling Virus Camouflage Viruses Armored Viruses Companion Viruses
  • 10.  Frequency of Infection Fast Infector Virus Slow Infector Viruses Sparse Infector Viruses Viruses
  • 11. Discover y Assimilation Eradicatio n Gestatio n The propagated virus is activated Users become aware of the virus and isolate it Vaccine for the virus is developed When the use of vaccine become widespread the virus is eradicated The same or a diff. developer develops a diff. strain of a new virus and the progress begins afresh The virus spreads to other systems Activation Propagation STAGE - 1 STAGE - 2 STAGE - 3 STAGE - 4 STAGE - 5 STAGE - 7 The created virus is released to the outside world STAGE - 6 Creation  LIFE CYCLE OF A VIRUS
  • 12.  QUALITIES OF A VIRUS  A virus must incorporate a replicating routine.  A virus should be able to install itself in the RAM.  A virus has a trademark trigger routine.  Some viruses have an encryption routine.  Most viruses are designed to exhibit some sort of stealth characteristics to avoid detection.
  • 13.  HOW DOES VIRUS WORKS  Enter by email,downloads,floppy disk or hacking  Then make copies of itself to spread.  They will wait for the signal for being activated.
  • 14. SYMPTOMS OF A VIRUS INFECTION  Graphics and unusual text will appear.  Music will play for no reason.  Program and data file suddenly corrupted.  Disk volume is changed.  Files and directories have been changed suddenly.  Your computer goes slowdown.  System memory have been changed.  Hardware devices begin to exhibit unusual behavour.  Interrupt vector have been changed.
  • 15.  HOW VIRUSES SPREAD SO QUICKLY ?  The larger amount of spreading the virus is user base, the more widespread and quicker the infection.  The level of piracy is also influence to spread. The complexity & characteristics of the virus code helps a virus to spread effectively.  Internet is also cause to spread the virus quickly.
  • 16.  POSITIVE VIRUS  A virus is ‘bad’ or ‘good’ depends on the virus developer.  Virus is made of two parts.  Propagation mechanism.  Payload.  Propagation mechanism Spreads comp. To comp.  It is a technical challenge that lets fun of designing it.  Propagated virus automatically spreading until halted.  Entire meaning is easy to get and hard to recover.  Ex. If a virus which acts as anti-virus that detect the negative virus and remove from the system.
  • 17.  “I LOVE YOU” VIRUS  A love letter which is win32 based on e-mail attachments.  HOW DO I GET IT ?  Attachment named : LOVE-LETTER-FOR YOU.TXT  The warning is protect.vbs.  When it opened virus infects to the system.  Unless you are sure that the doc. Is free from virus.  If you are unsure than ask to the sender to confirm.  Difficult to open .mp2 , .mp3 , .midi , .wav Etc.  Difficult to open .jpg , .bmp , .gif etc
  • 18.  What is Anti-Virus Anti-Virus is a specialized utility program which is used to detect , eradicate and prevent viruses.
  • 19. DIFFERENT ANTI-VIRUS TECHNOLOGY Hook Driver It provides databases in notes. Extension Manager It allows a program to be run natively.
  • 20.  HOW EFFECTIVE IS AN ANTI- VIRUS SW IS ?  Methodology of detecting, and incorporate anti-virus. They have their own database to compare string of virus string to detect. An intelligent virus may breakdown your anti-virus sw. Timely and regularly upgrade the anti-virus sw If more than one user use one computer ,always check all local drives after download any data.
  • 21. COULD ANTI-VIRUS PROGRAM ITSELF BE INFECTED?  Clever virus may infect the anti-virus sw.  Parallel you might be use the another corporate anti-virus.  If one fails than the other might be detect.  The developer make an anti-virus sw after confirmation.
  • 22.  QUALITIES OF AN ANTI-VIRUS SW.  Directly it remove to your system memory.  Example of virus which is same as cancer cells. Two ways of virus detection.  Signature based like polymorphic virus.  Rule based like genetic in nature.  Cat and mouse game bet’n developer and writers.
  • 23.  LIMITATIONS OF ANTI-VIRUS PROGRAMS  Limited database virus strings.  old version can’t detect.  Directly not work on on-line services.  Restricted coverage area for an anti-virus sw
  • 24.  CONCLUSION While using diff. External Data storage devices like cd’s, floppy disk scan all the system with the help of upgrade anti-virus soft-ware. The hazard ness cause by the virus to our system for which we have to take care.  “PREVENTION IS ALLWAYES BETTER THAN CURE”.