SlideShare a Scribd company logo
1 of 12
Computer VirusComputer Virus
ByBy
Dr. Pravin H. GhosekarDr. Pravin H. Ghosekar
M.Sc.(C/S), MCM, DBM, M.Phil(IT), M.Phil(Comm), MBA, BJ. Ph.D.M.Sc.(C/S), MCM, DBM, M.Phil(IT), M.Phil(Comm), MBA, BJ. Ph.D.
HOD Computer DepartmentHOD Computer Department
Dhanwate National CollegeDhanwate National College
NagpurNagpur
08/10/201008/10/2010
Virus
• A Computer virus is a program (mostly written in
Assembly language) that can copy itself and infect
a computer without permission or knowledge of the
user.
• The virus program lies hidden and attacks
surprisingly to a host, replicates and infects new
hosts.
• A virus acts according to instructions written in
the program.
• The virus may modify or copies themselves, as
occurs in a biological virus.
• Some viruses are programmed to damage the
computer by damaging programs, deleting files, or
reformatting the hard disk. Other virus programs
simply replicate themselves and make their
presence known by presenting text, video, or audio
Virus
The first PC virus ‘Brain Virus’ was discovered (and created)
in 1986 by two Pakistani Brothers at Lahore. Some of the
popular viruses are :
• Brain
• Disk Washer
• Stone
• Jerusalem
• DIR II
• Dark Avenger
• Joshi
• Raindrop
• DieHard
• I Love you
• W32
• PWS-LegMir
•
Types of Virus
• Partition Table / Boot sector viruses
• When the computer is booted, control comes to
the first physical sector of a disk, which
contains a very tiny code that loads in a
partition table and passes control to the boot
sector.
• In a disk having a boot sector virus, the first
instruction in the boot sector is changed so
that it points to the area where the virus is
located.
• Hence when the computer is booted with a boot
sector virus, the virus gets into the system
before Operating System
Types of Virus
File Viruses
• These viruses do not infect the boot sector
partition table but they infect the executable
files ( i.e. EXE and COM extension files and
sometimes even overlay files i.e. OV/OVR
extension )
• These viruses get themselves attached at the
beginning or the end of an executable file
System Infectors
• The System Infector Viruses enter the system
though device driver files. These viruses get
attached to various parts of the operating
system.
• It may attract on IO.SYS, MSDOS.SYS and
COMMAND.COM.
Trojan Horses
• In computers, a Trojan horse is a program in which
malicious or harmful code is contained inside harmless
program or data in such a way that it can get control and
do its chosen form of damage, such as damaging the file
allocation table on our hard disk.
• The term comes from Greek mythology about the Trojan
War. According to legend, the Greeks presented the
citizens of Troy with a large wooden horse in which they
had secretly hidden their warriors. During the night, the
warriors emerged from the wooden horse and overran the
city.
• Trojan horses are the very common and are found mostly
on Computer Bulletin Boards.
• Trojans are used and appears to perform a desirable
function but it performs undisclosed malicious functions.
For eg. Waterfalls.scr
WORM
• A computer worm is a self-replicating computer
program.
• It uses a network to send copies of itself to
other nodes (computer terminals on the
network) and it may do so without any user
intervention.
• Worms almost always cause harm to the
network, if only by consuming bandwidth,
whereas viruses almost always corrupt or
modify files on a targeted computer.
• Worms may cause harm to a computer system's
hosted data, functional performance, or
networking throughput, when executed.
For. Ex. Morris Worm, Mydoom, ExploreZip
SPYWARE
• Spyware is computer software that is
installed secretly on a personal computer
to intercept or take partial control over
the computer, without the user's
knowledge.
• Spyware is a software that secretly
monitors the user's behavior, and
perform activities for financial or
personal gain
Ex. Cool WebSearch, Internet Optimizer, Zango,
HuntBar, Movieland,etc.
Antivirus
• Antivirus softwares are computer programs
that attempt to identify, neutralize or eliminate
malicious software.
• The term "antivirus" is used to combat a wide
range of threats, including virus, worms, trojan
horses and other malware.
• Antivirus software can monitor our system for
any virus attack from the outside world viz.
Internet, floppy, CD, USB, etc. during
downloading/copying of files.
• It can also detect and take action if virus is
found on a disk.
Eg. QuickHeal, AVG, Avira, Nortan, eScan, FSecure, NP etc.
Anti Spy virus
• In response to the emergence of spyware,
Antispyware are develop to protect computer
from spyware attack.
• An anti spyware program can protect our
computer against spyware. There are numbers
of anti spyware softwares that are available on
the Internet.
• Most of the antispyware softwares are
available free on the Internet. But these free
anti spyware can even harm our system; they
may be virus or spyware itself. Before using any
free anti spyware we need to check the
reliability of this software.
Firewall
• A firewall is a device or set of devices configured
to permit, deny, encrypt all computer traffic
between different security area based upon a set
of rules and other criteria.
• A firewall's basic task is to regulate some of the
flow of traffic between computer networks of
different trust levels.
• It prevents unauthorized users on the Internet
from reading the files and programs on the LAN.
• Users behind firewall can access Internet services,
but can’t provide them or intranet services to
others outside the firewall. Using firewall, we can
also restrict users from visiting to the specific
sites.
ThanksThanks

More Related Content

What's hot

Types of Software - Y9 Computing
Types of Software - Y9 ComputingTypes of Software - Y9 Computing
Types of Software - Y9 ComputingMrJRogers
 
Firmware (Embedded system Software)
Firmware (Embedded system Software)Firmware (Embedded system Software)
Firmware (Embedded system Software)QuinnWolver
 
Introduction to Computer Softwares
Introduction to Computer SoftwaresIntroduction to Computer Softwares
Introduction to Computer SoftwaresNaresh Dubey
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and softwareKarl John Piocos
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application softwareSowmini Gowda
 
Hardware , software and filmware
Hardware , software and filmwareHardware , software and filmware
Hardware , software and filmwareMH Shihab
 
Contents of Computer Software
Contents of Computer SoftwareContents of Computer Software
Contents of Computer SoftwareAvinash Rouniyar
 
Computer Software introduction
Computer  Software introductionComputer  Software introduction
Computer Software introductionfaisalahmed2017
 
Software and hardware presentation
Software and hardware presentationSoftware and hardware presentation
Software and hardware presentationnjabulo madonsela
 
Garcia Act4 Patience
Garcia Act4 PatienceGarcia Act4 Patience
Garcia Act4 Patiencetrixie garcia
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software Ankit Sangwan
 
Application software and Peopleware
Application software and PeoplewareApplication software and Peopleware
Application software and PeoplewareAngelica Villegas
 
Basics of computer
Basics of computerBasics of computer
Basics of computerAbdul Wahab
 
ITFT - Hardware & software concept
ITFT - Hardware & software conceptITFT - Hardware & software concept
ITFT - Hardware & software conceptNavneet Kaur
 

What's hot (20)

Computer software
Computer software Computer software
Computer software
 
Hardware and Software
Hardware and SoftwareHardware and Software
Hardware and Software
 
What is software
What is softwareWhat is software
What is software
 
Types of Software - Y9 Computing
Types of Software - Y9 ComputingTypes of Software - Y9 Computing
Types of Software - Y9 Computing
 
Firmware (Embedded system Software)
Firmware (Embedded system Software)Firmware (Embedded system Software)
Firmware (Embedded system Software)
 
Introduction to Computer Softwares
Introduction to Computer SoftwaresIntroduction to Computer Softwares
Introduction to Computer Softwares
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and software
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application software
 
Presentation on computer software
Presentation on computer softwarePresentation on computer software
Presentation on computer software
 
Hardware , software and filmware
Hardware , software and filmwareHardware , software and filmware
Hardware , software and filmware
 
Contents of Computer Software
Contents of Computer SoftwareContents of Computer Software
Contents of Computer Software
 
Computer Software introduction
Computer  Software introductionComputer  Software introduction
Computer Software introduction
 
Software and hardware presentation
Software and hardware presentationSoftware and hardware presentation
Software and hardware presentation
 
Garcia Act4 Patience
Garcia Act4 PatienceGarcia Act4 Patience
Garcia Act4 Patience
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software
 
Application software and Peopleware
Application software and PeoplewareApplication software and Peopleware
Application software and Peopleware
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
Types of software
Types of softwareTypes of software
Types of software
 
Introduction to Software
Introduction to SoftwareIntroduction to Software
Introduction to Software
 
ITFT - Hardware & software concept
ITFT - Hardware & software conceptITFT - Hardware & software concept
ITFT - Hardware & software concept
 

Similar to Dr. Pravin Ghosekar Explains Computer Viruses, Types of Malware and How to Protect Against Them

6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their typesNeha Kurale
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus workschinmay kelkar
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_wargames12
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 

Similar to Dr. Pravin Ghosekar Explains Computer Viruses, Types of Malware and How to Protect Against Them (20)

6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
information about virus
information about virusinformation about virus
information about virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

More from PravinGhosekar

Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetPravinGhosekar
 
Introduction to Hardware and Software
Introduction to Hardware and SoftwareIntroduction to Hardware and Software
Introduction to Hardware and SoftwarePravinGhosekar
 
Introduction to Computer & ICT
Introduction to Computer & ICTIntroduction to Computer & ICT
Introduction to Computer & ICTPravinGhosekar
 
Role of ICT in Teaching Learning
Role of ICT in Teaching LearningRole of ICT in Teaching Learning
Role of ICT in Teaching LearningPravinGhosekar
 
Overview of BCCA Project
Overview of BCCA ProjectOverview of BCCA Project
Overview of BCCA ProjectPravinGhosekar
 
Impact of Web Application on Education
Impact of Web Application on EducationImpact of Web Application on Education
Impact of Web Application on EducationPravinGhosekar
 
Introduction to Multimedia
Introduction to MultimediaIntroduction to Multimedia
Introduction to MultimediaPravinGhosekar
 
Job opportunities in IT
Job opportunities in ITJob opportunities in IT
Job opportunities in ITPravinGhosekar
 
Job opportunities in e-comm, export, insurance
Job opportunities in e-comm, export, insuranceJob opportunities in e-comm, export, insurance
Job opportunities in e-comm, export, insurancePravinGhosekar
 
Communication fundamentals
Communication fundamentalsCommunication fundamentals
Communication fundamentalsPravinGhosekar
 
Introduction to system
Introduction to systemIntroduction to system
Introduction to systemPravinGhosekar
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 

More from PravinGhosekar (18)

Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Introduction to Hardware and Software
Introduction to Hardware and SoftwareIntroduction to Hardware and Software
Introduction to Hardware and Software
 
Input Output devices
Input Output devicesInput Output devices
Input Output devices
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Introduction to Computer & ICT
Introduction to Computer & ICTIntroduction to Computer & ICT
Introduction to Computer & ICT
 
Wireless Banking
Wireless BankingWireless Banking
Wireless Banking
 
Role of ICT in Teaching Learning
Role of ICT in Teaching LearningRole of ICT in Teaching Learning
Role of ICT in Teaching Learning
 
Overview of BCCA Project
Overview of BCCA ProjectOverview of BCCA Project
Overview of BCCA Project
 
Impact of Web Application on Education
Impact of Web Application on EducationImpact of Web Application on Education
Impact of Web Application on Education
 
Introduction to Multimedia
Introduction to MultimediaIntroduction to Multimedia
Introduction to Multimedia
 
Job opportunities in IT
Job opportunities in ITJob opportunities in IT
Job opportunities in IT
 
Job opportunities in e-comm, export, insurance
Job opportunities in e-comm, export, insuranceJob opportunities in e-comm, export, insurance
Job opportunities in e-comm, export, insurance
 
Communication fundamentals
Communication fundamentalsCommunication fundamentals
Communication fundamentals
 
dbms
dbmsdbms
dbms
 
Project management
Project managementProject management
Project management
 
Introduction to system
Introduction to systemIntroduction to system
Introduction to system
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 

Recently uploaded

INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRRsarwankumar4524
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxAsifArshad8
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Escort Service
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comsaastr
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this periodSaraIsabelJimenez
 
Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptxogubuikealex
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...漢銘 謝
 
Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEMCharmi13
 
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...Henrik Hanke
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRachelAnnTenibroAmaz
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
proposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeegerproposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeegerkumenegertelayegrama
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.KathleenAnnCordero2
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
Internship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SEInternship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SESaleh Ibne Omar
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxRoquia Salam
 
CHROMATOGRAPHY and its types with procedure,diagrams,flow charts,advantages a...
CHROMATOGRAPHY and its types with procedure,diagrams,flow charts,advantages a...CHROMATOGRAPHY and its types with procedure,diagrams,flow charts,advantages a...
CHROMATOGRAPHY and its types with procedure,diagrams,flow charts,advantages a...university
 

Recently uploaded (19)

INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this period
 
Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptx
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
 
Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEM
 
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
proposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeegerproposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeeger
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
Internship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SEInternship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SE
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptx
 
CHROMATOGRAPHY and its types with procedure,diagrams,flow charts,advantages a...
CHROMATOGRAPHY and its types with procedure,diagrams,flow charts,advantages a...CHROMATOGRAPHY and its types with procedure,diagrams,flow charts,advantages a...
CHROMATOGRAPHY and its types with procedure,diagrams,flow charts,advantages a...
 

Dr. Pravin Ghosekar Explains Computer Viruses, Types of Malware and How to Protect Against Them

  • 1. Computer VirusComputer Virus ByBy Dr. Pravin H. GhosekarDr. Pravin H. Ghosekar M.Sc.(C/S), MCM, DBM, M.Phil(IT), M.Phil(Comm), MBA, BJ. Ph.D.M.Sc.(C/S), MCM, DBM, M.Phil(IT), M.Phil(Comm), MBA, BJ. Ph.D. HOD Computer DepartmentHOD Computer Department Dhanwate National CollegeDhanwate National College NagpurNagpur 08/10/201008/10/2010
  • 2. Virus • A Computer virus is a program (mostly written in Assembly language) that can copy itself and infect a computer without permission or knowledge of the user. • The virus program lies hidden and attacks surprisingly to a host, replicates and infects new hosts. • A virus acts according to instructions written in the program. • The virus may modify or copies themselves, as occurs in a biological virus. • Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Other virus programs simply replicate themselves and make their presence known by presenting text, video, or audio
  • 3. Virus The first PC virus ‘Brain Virus’ was discovered (and created) in 1986 by two Pakistani Brothers at Lahore. Some of the popular viruses are : • Brain • Disk Washer • Stone • Jerusalem • DIR II • Dark Avenger • Joshi • Raindrop • DieHard • I Love you • W32 • PWS-LegMir •
  • 4. Types of Virus • Partition Table / Boot sector viruses • When the computer is booted, control comes to the first physical sector of a disk, which contains a very tiny code that loads in a partition table and passes control to the boot sector. • In a disk having a boot sector virus, the first instruction in the boot sector is changed so that it points to the area where the virus is located. • Hence when the computer is booted with a boot sector virus, the virus gets into the system before Operating System
  • 5. Types of Virus File Viruses • These viruses do not infect the boot sector partition table but they infect the executable files ( i.e. EXE and COM extension files and sometimes even overlay files i.e. OV/OVR extension ) • These viruses get themselves attached at the beginning or the end of an executable file System Infectors • The System Infector Viruses enter the system though device driver files. These viruses get attached to various parts of the operating system. • It may attract on IO.SYS, MSDOS.SYS and COMMAND.COM.
  • 6. Trojan Horses • In computers, a Trojan horse is a program in which malicious or harmful code is contained inside harmless program or data in such a way that it can get control and do its chosen form of damage, such as damaging the file allocation table on our hard disk. • The term comes from Greek mythology about the Trojan War. According to legend, the Greeks presented the citizens of Troy with a large wooden horse in which they had secretly hidden their warriors. During the night, the warriors emerged from the wooden horse and overran the city. • Trojan horses are the very common and are found mostly on Computer Bulletin Boards. • Trojans are used and appears to perform a desirable function but it performs undisclosed malicious functions. For eg. Waterfalls.scr
  • 7. WORM • A computer worm is a self-replicating computer program. • It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. • Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. • Worms may cause harm to a computer system's hosted data, functional performance, or networking throughput, when executed. For. Ex. Morris Worm, Mydoom, ExploreZip
  • 8. SPYWARE • Spyware is computer software that is installed secretly on a personal computer to intercept or take partial control over the computer, without the user's knowledge. • Spyware is a software that secretly monitors the user's behavior, and perform activities for financial or personal gain Ex. Cool WebSearch, Internet Optimizer, Zango, HuntBar, Movieland,etc.
  • 9. Antivirus • Antivirus softwares are computer programs that attempt to identify, neutralize or eliminate malicious software. • The term "antivirus" is used to combat a wide range of threats, including virus, worms, trojan horses and other malware. • Antivirus software can monitor our system for any virus attack from the outside world viz. Internet, floppy, CD, USB, etc. during downloading/copying of files. • It can also detect and take action if virus is found on a disk. Eg. QuickHeal, AVG, Avira, Nortan, eScan, FSecure, NP etc.
  • 10. Anti Spy virus • In response to the emergence of spyware, Antispyware are develop to protect computer from spyware attack. • An anti spyware program can protect our computer against spyware. There are numbers of anti spyware softwares that are available on the Internet. • Most of the antispyware softwares are available free on the Internet. But these free anti spyware can even harm our system; they may be virus or spyware itself. Before using any free anti spyware we need to check the reliability of this software.
  • 11. Firewall • A firewall is a device or set of devices configured to permit, deny, encrypt all computer traffic between different security area based upon a set of rules and other criteria. • A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. • It prevents unauthorized users on the Internet from reading the files and programs on the LAN. • Users behind firewall can access Internet services, but can’t provide them or intranet services to others outside the firewall. Using firewall, we can also restrict users from visiting to the specific sites.