SlideShare a Scribd company logo
Computer Virus
Prepare by- Shripati pritam sahoo
Date:-may,2023
Table of Content
 History
 What is computer virus
 Symptoms
 Types of computer virus
 The spread of the virus
 What computer virus do
 Preventation from computer virus
 Best antivirus software
 Conclusion
History of computer virus
 The first computer virus was called creeper.It was
invented in the early 1970’s. Since then, millions
of viruses have been invented.
 The first known computer virus was written in
1981 by a man named Rich Skrenta. This virus
was termed Elk Cloner, and was the first computer
virus to appear outside the computer where it was
created in.
What is computer virus
 A computer virus is a malicious application used to
perform destructive activity on a device or local
network.
 The code’s malicious activity could damage the local
file system, steal data, interrupt services, download
additional malware, or any other actions coded into
the program by the malware author.
Symptoms
 Your computer or web browser has dramatically slowed down over a period of
a few days/a week
 Frequent freezing or crashing
 Modified or deleted files
 New programs or desktop icons that you do not recall installing/creating
 Programs running without your consent
 Programs closing without your consent
 Changes in your security settings
 Unusual emails/social media messages being sent without your permission to a
large audience
 Your default search engine has been changed without you altering it
 New toolbars in the web browser
 Browser links redirect to the wrong web page
Types of Computer virus
There are eight main virus types, some of which could be packaged with
other malware to increase the chance of infection and damage. The 8
major categories for viruses are:
1.Boot Sector virus- A boot sector virus damages or controls the boot sector on
the drive, rendering the machine unusable.
2.Direct action virus-When a user executes a harmless file attached with
malicious code, direct action viruses deliver a payload immediately.
3.Web scripting virus-Most browsers have defenses against malicious web
scripts, but older, unsupported browsers that allow an attacker to run code
on the local device.
4.Polymorphic virus-Polymorphic viruses make it more difficult for an antivirus
to detect and remove them
5.File infector virus-A threat actor uses file infector viruses to inject malicious
code into critical files that run the operating system or important programs
6.Browser hijacker- A virus that can change the settings on your browser
will hijack browser favorites, the home page URL and redirect you to a
malicious site
7.Resident virus- A virus that can access computer memory and sit until
a payload is delivered is considered a resident virus.
8.Macro virus- Microsoft Office files can run macros, and these macros
can be used to download additional malware or run malicious code. Macro
viruses deliver a payload when the file is opened, and the macro runs.
Latest viruses
 DEXTER-
 Dexter is a computer virus or point of sale
malware which infects computers running Microsoft
Windows and was discovered by IT security, in
December 2012.
 It infects PoS(point of sale) systems worldwide and
steals sensitive information such as Credit Card and
Debit Card information.
 REVETON-
1.In 2012, a major ransomware know as Reveton
began to spread.
2 .Reveton is a malware which attempts to extort
money from a user.
3 .It Claims that your computer has been used for
unauthorized activites.
 CRYPTOLOCKER-
1.encrypting ransomware appeard in 2013 known
as Crypto Locker.
2.cryptolocker demands a pyment with either a
moneyPak card or Bitcoin to recover the key.
3.cryptolocker to be extremely difficult to repair.
The spread of the virus
1.Infected applications move from one computer to
another easily because users are unaware their
application is infected and will share, transfer, or install
them without a care in the world.
2.Some users are unaware that their email software is
being controlled by the virus (mail hijack) and viruses
are actually emailing themselves to the contacts in the
email contacts list.
3.Users can also download viruses if they are using
pirated apps, or have accessed an infected code
repository.
What does a computer virus do?
The way a computer virus acts depends on how it’s coded. It could
be something as simple as a prank that doesn’t cause any damage,
or it could be leading to criminal activity and fraud. Many viruses
only affect a local device, but others spread across a network
environment to find other hosts.
How to prevent computer viruses
 Install antivirus software: Antivirus should run on
any device connected to the network. It’s your first
defense against viruses. Antivirus software stops
malware executables from running on your local
device.
 Don’t open executable email attachments: Many
malware attacks including ransomware start with a
malicious email attachment. Executable attachments
should never be opened, and users should avoid
running macros programmed into files such as
Microsoft Word or Excel.
 Keep your operating system updated: Developers for all
major operating systems release patches to remediate common
bugs . Always keep your operating system updated and stop
using end-of-life versions (e.g., Windows 7 or Windows XP).
 Avoid questionable websites: You should always keep your
browser updated with the latest patches, but avoiding these
sites will stop drive-by downloads or redirecting you to sites that
host malware.
 Don’t use pirated software: Free pirated software might be
tempting, but it’s often packaged with malware. Download
vendor software only from the official source and avoid using
software that’s pirated and shared.
Best antivirus software
1.McAfee
2.Nortan
3.TOTALAV
4.Intego
5.Bitdefender
6.Panda
7.PROTECT
Conclusion
In our technology- dependent society, the computer
is the mastert it controls our entertainment, our
power plants, our military and much more.
However, because of the dependency on the
computer and other technologies, the virus can easily
do millions or even billions of dollars in damage.
THANK YOU
Ad

More Related Content

Similar to computervirus.ppt (20)

presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
Abdullah-Al- Mahmud
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
Computer/Cyber/IT Security MCQ Questions
Computer/Cyber/IT Security MCQ QuestionsComputer/Cyber/IT Security MCQ Questions
Computer/Cyber/IT Security MCQ Questions
SONU HEETSON
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
Sarhad Baez
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Computer virus
Computer virusComputer virus
Computer virus
GHANA CHRISTIAN INTERNATIONAL HIGH SCHOOL
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
viruses
virusesviruses
viruses
khadija habib
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
Avinash Sinha
 
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
Chapter 2- Computer Threat.docChapter 2- Computer Threat.docChapter 2- Computer Threat.docChapter 2- Computer Threat.doc
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
WabiTiki
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Amirah Husna
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
Prakriti Sharma
 

Recently uploaded (20)

TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Ad

computervirus.ppt

  • 1. Computer Virus Prepare by- Shripati pritam sahoo Date:-may,2023
  • 2. Table of Content  History  What is computer virus  Symptoms  Types of computer virus  The spread of the virus  What computer virus do  Preventation from computer virus  Best antivirus software  Conclusion
  • 3. History of computer virus  The first computer virus was called creeper.It was invented in the early 1970’s. Since then, millions of viruses have been invented.  The first known computer virus was written in 1981 by a man named Rich Skrenta. This virus was termed Elk Cloner, and was the first computer virus to appear outside the computer where it was created in.
  • 4. What is computer virus  A computer virus is a malicious application used to perform destructive activity on a device or local network.  The code’s malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions coded into the program by the malware author.
  • 5. Symptoms  Your computer or web browser has dramatically slowed down over a period of a few days/a week  Frequent freezing or crashing  Modified or deleted files  New programs or desktop icons that you do not recall installing/creating  Programs running without your consent  Programs closing without your consent  Changes in your security settings  Unusual emails/social media messages being sent without your permission to a large audience  Your default search engine has been changed without you altering it  New toolbars in the web browser  Browser links redirect to the wrong web page
  • 6. Types of Computer virus There are eight main virus types, some of which could be packaged with other malware to increase the chance of infection and damage. The 8 major categories for viruses are: 1.Boot Sector virus- A boot sector virus damages or controls the boot sector on the drive, rendering the machine unusable. 2.Direct action virus-When a user executes a harmless file attached with malicious code, direct action viruses deliver a payload immediately. 3.Web scripting virus-Most browsers have defenses against malicious web scripts, but older, unsupported browsers that allow an attacker to run code on the local device. 4.Polymorphic virus-Polymorphic viruses make it more difficult for an antivirus to detect and remove them 5.File infector virus-A threat actor uses file infector viruses to inject malicious code into critical files that run the operating system or important programs
  • 7. 6.Browser hijacker- A virus that can change the settings on your browser will hijack browser favorites, the home page URL and redirect you to a malicious site 7.Resident virus- A virus that can access computer memory and sit until a payload is delivered is considered a resident virus. 8.Macro virus- Microsoft Office files can run macros, and these macros can be used to download additional malware or run malicious code. Macro viruses deliver a payload when the file is opened, and the macro runs.
  • 8. Latest viruses  DEXTER-  Dexter is a computer virus or point of sale malware which infects computers running Microsoft Windows and was discovered by IT security, in December 2012.  It infects PoS(point of sale) systems worldwide and steals sensitive information such as Credit Card and Debit Card information.
  • 9.  REVETON- 1.In 2012, a major ransomware know as Reveton began to spread. 2 .Reveton is a malware which attempts to extort money from a user. 3 .It Claims that your computer has been used for unauthorized activites.
  • 10.  CRYPTOLOCKER- 1.encrypting ransomware appeard in 2013 known as Crypto Locker. 2.cryptolocker demands a pyment with either a moneyPak card or Bitcoin to recover the key. 3.cryptolocker to be extremely difficult to repair.
  • 11. The spread of the virus 1.Infected applications move from one computer to another easily because users are unaware their application is infected and will share, transfer, or install them without a care in the world. 2.Some users are unaware that their email software is being controlled by the virus (mail hijack) and viruses are actually emailing themselves to the contacts in the email contacts list. 3.Users can also download viruses if they are using pirated apps, or have accessed an infected code repository.
  • 12. What does a computer virus do? The way a computer virus acts depends on how it’s coded. It could be something as simple as a prank that doesn’t cause any damage, or it could be leading to criminal activity and fraud. Many viruses only affect a local device, but others spread across a network environment to find other hosts.
  • 13. How to prevent computer viruses  Install antivirus software: Antivirus should run on any device connected to the network. It’s your first defense against viruses. Antivirus software stops malware executables from running on your local device.  Don’t open executable email attachments: Many malware attacks including ransomware start with a malicious email attachment. Executable attachments should never be opened, and users should avoid running macros programmed into files such as Microsoft Word or Excel.
  • 14.  Keep your operating system updated: Developers for all major operating systems release patches to remediate common bugs . Always keep your operating system updated and stop using end-of-life versions (e.g., Windows 7 or Windows XP).  Avoid questionable websites: You should always keep your browser updated with the latest patches, but avoiding these sites will stop drive-by downloads or redirecting you to sites that host malware.  Don’t use pirated software: Free pirated software might be tempting, but it’s often packaged with malware. Download vendor software only from the official source and avoid using software that’s pirated and shared.
  • 16. Conclusion In our technology- dependent society, the computer is the mastert it controls our entertainment, our power plants, our military and much more. However, because of the dependency on the computer and other technologies, the virus can easily do millions or even billions of dollars in damage.