You are on page 1of 17

By- Swati Verma

B.A.III (COMPUTER APPLICATION DEPARTMENT) ISABELLA THOBURN P.G. COLLEGE

WHO I AM ??
Capable of spreading through an entire network of computers, infecting every machine thats incapable of protecting itself. Can destroy important files, corrupt data, slow down the speed of infected computer, unexpectedly closes the important programs. Capable of infecting other computer programs by modifying them to include a copy of itself.
VIRUSES: Know Your Enemy

FILE VIRUSES BOOT SECTOR VIRUSES

MACRO VIRUSES
NETWORK VIRUSES E-mail VIRUSES

VIRUSES: Know Your Enemy

By attaching itself to other programs, executable files, drive

files or compressed files. Spread by loading themselves in system memory.


Examples of file virus-

Randex, Meve, Mr Klunky


VIRUSES: Know Your Enemy

Affects the boot sector of a hand disk. Virus loads into memory during every boot sequence. Examples of boot sector virus are-

Polyboot.B, AntiEXE
VIRUSES: Know Your Enemy

Infect files that are created using certain applications or

programs that contain macros. It includes Microsoft Office Documents such as Word documents Excel Spreadsheets PowerPoint presentations Access databases and other similar application files. Examples of macro virus are Relax, Bablas.
VIRUSES: Know Your Enemy

Proficient in quickly spreading across a LAN or even over the

internet Spreads through shared resources such as shared drives and folders. Examples of network viruses are Nimda and SQLSlammer

VIRUSES: Know Your Enemy

Spreads to all the contacts located in the hosts email

address book. Spreads to the new hosts address book contacts and then proceeds to send itself to all those contacts as well. Examples of E-mail viruses are SirCam virus

VIRUSES: Know Your Enemy

Trojan Horses

Trojans dont spread themselves. Trojans horses disguise themselves as useful software available for download on the internet. Native users download and run them and realise their mistakes later. WormsCan invade computers usually via a network. Deny service to legitimate users by inordinate amounts of processing and communication resources for self propagation. SpywareSlow down computers with their semi-intensive usage of processing power. Bringing up annoying pop-up windows at the most inappropriate VIRUSES: Know Your Enemy times
9

Original operating system installation CD should be bootable.

If antivirus has an option of making a bootable CD, so make use of it


because it will help us if the need ever arises. Use of well reputed antivirus and update it daily . Make sure that antivirus automatically scans any newly inserted discs for viruses, especially if we tend to exchange data between our office and home computers. Avoid opening mails with attachments unless we are absolutely sure that they are from trusted sources. Keep all the documents and important programs backed up on a CD, Pen drives, or any other storage media.

VIRUSES: Know Your Enemy

10

Computer always stop responding when we try to use certain software.

This could also take place due to corruption of an essential file required by that software.
When we receive an e-mail message that has a strange attachment.

When we open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
There is a double extension on an attachment that we recently open

such as .jpg.vbs or .gif.exe.


Strange dialogue boxes or message boxes appear on the screen. New icons that we did not place on the Desktop appear, and are not

associated with any recently installed programs.


A program disappears from the computer, and we didnt uninstall it. Windows will not start because certain critical system files are missing,

and we receive error messages listing those files.


The computer runs very slowly and it takes a long time to start. New programs do not install properly. Windows restarts unexpectedly.
VIRUSES: Know Your Enemy

11

ENTER THE ANTIVIRUS!


Antivirus software mainly work in two ways. When a computer virus is reported, it is thoroughly

examined and a signature file is created that will help the antivirus program identify and deal with it. This inoculation is added to the antivirus software database and is used when scanning computers to identify and destroy viruses. computer and if a program showing virus like behaviour, a red flag is raised and the program or file is destroyed or quarantined, and reported to the user .
VIRUSES: Know Your Enemy

Heuristic Method, heuristic monitor all activity on a

12

Q- How long am I entitled to free updates after I register?

Q- Does it have an antivirus agent running in the

background? Q- Does this entitle me to free customer support? Q- How regularly are the virus signature updates released? Q- How easy is it to update? Q- Does it integrate with my e-mail program? Q- How easy is it to scan files? Q- Is it bootable?

VIRUSES: Know Your Enemy

13

Get rid of all viruses. Uninstall old antivirus.

Ensure that our system is running well.


Exit that our system is running well. Exit all running programs.

VIRUSES: Know Your Enemy

14

Panda ActiveScan

www.pandasoftware.com/activescan/ Features No need to install any programs. Scans, disinfects and eliminates over 90,000 viruses worms and Trojans from all system devices, hard disks, compressed files and all our e-mail folders. Updated every day, so each scan will able to detect even a latest viruses. GFI Online Trojan Scan www.windowsecurity.com/trojanscan/ Features Specialized in detection and removal of Trojans from our computers. VIRUSES: Know Your Enemy

15

Norton Antivirus 2005 Pros- Excellent interface; great virus definition support. Cons- Significantly system heavy; no real-time spyware detection. McAfee Virus Scan Home 9.0 Pros- Improved interface; not too heavy on system resources.

Cons- No integrated firewall; no real-time spyware detection.

NOD32 Antivirus System 2.0 Pros- very light on the system; excellent heuristic engines, frequent

virus definition update in small packages.

Cons- no integrated firewall interface aimed at advanced users.

Avast!4 Home Edition Pros- Free; light ion the system and very effective against

viruses. Cons- Barebones antivirus with no frills such as a firewall or spyware VIRUSES: Know Your Enemy scanner.

16

VIRUSES: Know Your Enemy

17

You might also like