Title Computer Viruses: Ms. Aparna Kulkarni SYCM-1 Roll No: 52 Mr. P. S. Phule Ms. Tambat Ms. I Don't Know The Name.
Title Computer Viruses: Ms. Aparna Kulkarni SYCM-1 Roll No: 52 Mr. P. S. Phule Ms. Tambat Ms. I Don't Know The Name.
COMPUTER VIRUSES
Prepared by:
Ms. Aparna Kulkarni
SYCM-1
Roll no : 52
Guide
Mr. P. S. Phule
Ms. Tambat
Ms. I Don’t Know The Name..
What is computer virus?
A computer virus is a computer program that can copy
itself and infect a computer.
Used to refer to other types of malware, adware, and
spyware programs that do not have the reproductive
ability.
Was first detected in APRANET (Advanced Projects
Research Agency Network) in 1970.
Virus
Spread in one of three ways:
Rogue Legitimate
Software Software
Destructive Productive
How Viruses Work?
A virus is a small piece of software that piggybacks on
real programs.
In order to replicate itself, a virus must be permitted to
execute code and write to memory.
Hence many viruses attach themselves to executable
files.
When the user attempts to open that specific
program, the virus opens along with it.
It damages the software by copying itself many times.
Types of Computer Viruses:
Viruses
Infect as many files as possible Slows down the computer speed Infect files when they are copied Does not slow down the speed
What Can They Do?
Format disk
Copy, Delete and Rename
Copy themselves with new configuration information
Modify file dates and extensions
Call another computer to upload and download files
They replace the file
How To Notice?
Computer operation becomes sluggish
Programs take longer to load
Disk space decreases rapidly
Unusual and frequent access to the Disk Drive
RAM decreases rapidly or steadily
Computer halts with or without messages
Bad disk sectors increases steadily
Programs encounter errors
Files mysteriously disappear
Who Are Rogue Programmers?
Create viruses for different reasons.
The reasons of creating the viruses are:
1. Psycho Cases:
-- For fun
-- Release Anger
-- To Take Revenge
2. Profit earners:
-- For Antivirus Marketing
3. Info Attackers
--Disrupt the enemy’s information and
network
What To Do?
Safe computing methods
-- Detection System
What To Do?
You Must—
-- Keep backup
-- Pre run check ups
-- Reformat hard disks
Observe operation time
Reinitialize the system
Use Good Antivirus System