SlideShare a Scribd company logo
1 of 10
Download to read offline
Computer Malware
Introduction and origin of computer Malware
Malware is a computer program that can increase and covers
entirely your PC by Copying itself without your knowledge and
permission. Basically it spread from infected computer to an fresh
or uninfected computer , for example a user sending it over a
network or the internet, through removal medium such as a floppy
disk, CD, or USB drive.
Malware firstly came into existence in 1949 as a self-replicating
program by Mathematician John Von Neumann. At that period a
group of programmers develop a game called Core Wars, which
could produce every time it was run, and even saturate the memory
of other players’ computers then the developers of this strange
game also develop the first anti-virus, named Reaper for stopping
the Copies created by Core Wars.
What is Malware
A word Malware is derived from two different words
first is Malicious and second one is Software. Malware
is a general term for any kind of program which came
into existence to infect as well as harm your
Computer.
Different Types of Malware
1.Virus
A computer virus is that which attaches itself to a
legitimate program or files for damaging your
Computer and after that it can copy themselves to
spread rapidly in your entire PC.
2.Trojans
A Trojan is defined as a type of malware that appears
completely harmless but the real thing is that a Trojan
can create a “backdoor” on your PC so that a hacker
can easily get into your system. Though, Trojan cannot
replicate or duplicate themselves.
3.Worms
A worm is also a type of Computer Malware. It can
replicate itself with ease and also can do so without any
human support. Worms travel across computer
networks and can suck up a lot of system memory and
are also capable to crash entire networks.
4 Spyware
It is defined as a Malware having specific aim, as
running in the background to collects information from
your computer system or even your personnel data.
That’s why Spyware is a big threat for your confidential
data.
5. Adware
Adware is a word formed from combining
“Advertisements” and “Software” and is a ad-
supported software. Adware is not harmful as
compared to “Trojan” or “Spyware” but is
annoying due to its flooded of advertisements.
How Malware get transmitted to
your PC
Malware are transmitted through computer
networks, the internet and portable media such
as USB drives, DVDs and CDs. Besides that you
can receive malwares through email or by
copying a program onto a CD and installing it on
your PC.
Various Symptoms of Malware
1.Application that don’t work properly.
2.Unusual error messages.
3 file size Changes of no reason.
4.Printing doesn’t work correctly.
5An increase in the number of files on the system while nothing
has been added.
6.Date of last access doesn’t match with date of last use.
7. Lots of irritating pop-ups displaying on your browser.
8. System slows down, freezes or even crashes.
A best guide to protect your system from
Malware
At first you have to prepare your computer anti-viruses by
using a effective anti-virus and always keep it updated for
complete protection. This is because viruses can change and
become undetected by certain programs and this can only
be preventing by updating the virus definitions offered by
the software Company.
http://cleanpcsolutions.com/
Thanks
for
Watching

More Related Content

Viewers also liked

LPC Role of Clinical Supervsion
LPC Role of Clinical SupervsionLPC Role of Clinical Supervsion
LPC Role of Clinical SupervsionGlenn Duncan
 
bastter -_agulhada_do_didi
bastter -_agulhada_do_didibastter -_agulhada_do_didi
bastter -_agulhada_do_didiPaulo Klosowski
 
Search engine and web crawler
Search engine and web crawlerSearch engine and web crawler
Search engine and web crawlervinay arora
 
LPC Models and Techniques in Clinical Supervision
LPC Models and Techniques in Clinical SupervisionLPC Models and Techniques in Clinical Supervision
LPC Models and Techniques in Clinical SupervisionGlenn Duncan
 

Viewers also liked (6)

Osimis pitch
Osimis pitchOsimis pitch
Osimis pitch
 
Dvojna praksa liječnika, javno i privatno?
Dvojna praksa liječnika, javno i privatno?Dvojna praksa liječnika, javno i privatno?
Dvojna praksa liječnika, javno i privatno?
 
LPC Role of Clinical Supervsion
LPC Role of Clinical SupervsionLPC Role of Clinical Supervsion
LPC Role of Clinical Supervsion
 
bastter -_agulhada_do_didi
bastter -_agulhada_do_didibastter -_agulhada_do_didi
bastter -_agulhada_do_didi
 
Search engine and web crawler
Search engine and web crawlerSearch engine and web crawler
Search engine and web crawler
 
LPC Models and Techniques in Clinical Supervision
LPC Models and Techniques in Clinical SupervisionLPC Models and Techniques in Clinical Supervision
LPC Models and Techniques in Clinical Supervision
 

Recently uploaded

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Clean PC Threats | Complete Solutions for PC

  • 2. Introduction and origin of computer Malware Malware is a computer program that can increase and covers entirely your PC by Copying itself without your knowledge and permission. Basically it spread from infected computer to an fresh or uninfected computer , for example a user sending it over a network or the internet, through removal medium such as a floppy disk, CD, or USB drive. Malware firstly came into existence in 1949 as a self-replicating program by Mathematician John Von Neumann. At that period a group of programmers develop a game called Core Wars, which could produce every time it was run, and even saturate the memory of other players’ computers then the developers of this strange game also develop the first anti-virus, named Reaper for stopping the Copies created by Core Wars.
  • 3. What is Malware A word Malware is derived from two different words first is Malicious and second one is Software. Malware is a general term for any kind of program which came into existence to infect as well as harm your Computer.
  • 4. Different Types of Malware 1.Virus A computer virus is that which attaches itself to a legitimate program or files for damaging your Computer and after that it can copy themselves to spread rapidly in your entire PC. 2.Trojans A Trojan is defined as a type of malware that appears completely harmless but the real thing is that a Trojan can create a “backdoor” on your PC so that a hacker can easily get into your system. Though, Trojan cannot replicate or duplicate themselves.
  • 5. 3.Worms A worm is also a type of Computer Malware. It can replicate itself with ease and also can do so without any human support. Worms travel across computer networks and can suck up a lot of system memory and are also capable to crash entire networks. 4 Spyware It is defined as a Malware having specific aim, as running in the background to collects information from your computer system or even your personnel data. That’s why Spyware is a big threat for your confidential data.
  • 6. 5. Adware Adware is a word formed from combining “Advertisements” and “Software” and is a ad- supported software. Adware is not harmful as compared to “Trojan” or “Spyware” but is annoying due to its flooded of advertisements.
  • 7. How Malware get transmitted to your PC Malware are transmitted through computer networks, the internet and portable media such as USB drives, DVDs and CDs. Besides that you can receive malwares through email or by copying a program onto a CD and installing it on your PC.
  • 8. Various Symptoms of Malware 1.Application that don’t work properly. 2.Unusual error messages. 3 file size Changes of no reason. 4.Printing doesn’t work correctly. 5An increase in the number of files on the system while nothing has been added. 6.Date of last access doesn’t match with date of last use. 7. Lots of irritating pop-ups displaying on your browser. 8. System slows down, freezes or even crashes.
  • 9. A best guide to protect your system from Malware At first you have to prepare your computer anti-viruses by using a effective anti-virus and always keep it updated for complete protection. This is because viruses can change and become undetected by certain programs and this can only be preventing by updating the virus definitions offered by the software Company. http://cleanpcsolutions.com/