Anda di halaman 1dari 13

PRESENTATION

ON COMPUTER
VIRUS

What is computer
Virus?
* A computer virus is a software program with a ability to

make copies of itself ,which attacks itself to other


applications or files.
* A virus is a small piece of software that piggybacks on
real programs in order to get executed
* Once its running, it spreads by inserting copies of itself
into other executable code or documents

Types of computer

Virus.

There are three types of computer virus


Boot virus
Program virus
Micro virus

Computer Virus Timeline


1949
Theories for self-replicating programs are first developed.
1981
Apple Viruses 1, 2, and 3 are some of the first viruses in the wild, or in the
public domain. Found on the Apple II operating system, the viruses spread
through Texas A&M via pirated computer games.
1983
Fred Cohen, while working on his dissertation, formally defines a computer virus
as a computer program that can affect other computer programs by modifying
them in such a way as to include a (possibly evolved) copy of itself.
1986
Two programmers named Basit and Amjad replace the executable code in the
boot sector of a floppy disk with their own code designed to infect each 360kb
floppy accessed on any drive. Infected floppies had Brain for a volume label.
1987
The Lehigh virus, one of the first file viruses, infects command.com files.
1988
One of the most common viruses, Jerusalem, is unleashed. Activated every
Friday the 13th, the virus affects both .exe and .com files and deletes any
programs run on that day.
MacMag and the Scores virus cause the first major Macintosh outbreaks.

B OOT

VIRUS :

Boot viruses infects the boot records of hard disk


and floppy disks. Generally these are considered
more dangerous than program viruses.

Program Virus
These viruses infect program files, which have
extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or .SCR.
program files are attractive targets for computer virus
because they are widely used and have relativity, simple
formats to which viruses can attach themselves.

Macro

Viruses

These viruses infects data files. For example, Microsoft


word document and template files are susceptible to
macro virus attacks they spread rapidly as infected
documents are shared on networks or downloaded from
internet sites.

Trojan
A Trojan Horse is a program that does something else that the
user thought it would do. It is mostly done to someone on
purpose. The Trojan Horses are usually masked so that they look
interesting, for example a saxophone.Wav file that interests a
person collecting sound samples of instruments. A Trojan Horse
differs from a destructive virus in that it doesn't reproduce. There
has been a password trojan out in AOL land (the American On
Line). Password30 and Pasword50 which some people thought
were wav. files, but they were disguised and people did not know
that they had the trojan in their systems until they tried to
change their passwords.
According to an administrator of AOL, the Trojan steals passwords
and sends an E-mail to the hackers fake name and then the
hacker has your account in his hands.

worm
A worm is a program which spreads usually over
network connections.
Unlike a virus which attach itself to a host
program, worms always need a host program to
spread.
In practice, worms are not normally associated
with one person computer systems.
They are mostly found in multi-user systems
such as Unix environments.
A classic example of a worm is Robert Morrisis
Internet-worm 1988.

What a computer virus do?


A virus tries to take control of computer system it has
infected at the first opportunity availible.it makes copies of
itself and also try to carry harmful task written in its program.
This process can happen so quickly that the user is not even
aware of the presence of a virus in his/her computer.

Top 5 Sources of Computer Virus


Attack
The most potent and vulnerable threat of computer users is virus
attacks. Virus attacks hampers important work involved with data and
documents. It is imperative for every computer user to be aware about
the software and programs that can help to protect the personal
computers from attacks. One must take every possible measure in
order to keep the computer systems free from virus attacks. The top
sources of virus attacks are highlighted below:
Downloadable Programs
Cracked Software
Email Attachments
Internet
Booting From CD

Best antivirus software.


Norton antivirus.
MacAfee virus scan
Kaspersky antivirus

THANK YOU!

Anda mungkin juga menyukai