Skip to main content

Best presentation on computer virus

ABSTRACT:

Computer viruses  poses problems for users of personal computers.These viruses have been from mid 1980s.A computer virus is a special kind of computer program which spreads across disks by making copies of itself.In order to infect a computer the virus should have the chance to execute its code.As long as the computer is infected with virus can copy itself to other files or disks that are accessed.


DEFINITION:A computer virus is a software program with a ability to make copies of itself ,which attacks itself to other applications  or files.

Types of computer Virus.

§ There are three types of computer virus

v Boot virus

v Program virus                                                                

v Micro virus

1. Boot virus:  Boot viruses infects the boot records of hard disk and floppy disks. Generally these are considered more dangerous than program viruses.

2. Program Virus:  These viruses infect program files, which have extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or .SCR. program files are attractive targets for computer virus because they are widely used and have relativity, simple formats to which  viruses can attach themselves.

3. Macro Viruses:  These viruses infects data files. For example, Microsoft word document and template files are susceptible to macro virus attacks they spread rapidly as infected documents are shared on networks or downloaded from internet sites.

Ø A virus tries to take control of computer system it has infected at the first opportunity availible.it makes copies of itself and also try to carry harmful task written in its program. This process can happen so quickly that the user is not even aware of the presence of a virus in his/her computer



Top 5 Sources of Computer Virus Attack:

v The most potent and vulnerable threat of computer users is virus attacks. Virus attacks hampers important work involved with data and documents. It is imperative for every computer user to be aware about the software and programs that can help to protect the personal computers from attacks. One must take every possible measure in order to keep the computer systems free from virus attacks.  The top sources of virus attacks are highlighted below:

Ø Downloadable Programs

Ø Cracked Software

Ø Email Attachments

Ø Internet

Ø Booting From CD



Best antivirus software.

§ Norton antivirus.

§ MacAfee virus scan

§ Kaspersky antivirus

Comments

Popular posts from this blog

Wi-vi the wifi vision

ABSTRACT: A new technology known as  Wi-Vi is bouncing up with a good progress.It is similar Radar and Sonar imaging..it depends on radio signals  of wifi.I monitor movements of people in closed rooms or behind a wall. Wi-Vi was created by Dina Katabi ,a professor  in MIT,and her graduate student Fadel Adib. Wi-Vi technology can detect number of humans in a closed room. Enable communication through a wall without carrying a wireless device.Identify simple gestures from behind a wall. This Wi-Vi signals uses Wi-Fi signals,as Wi-Fi signals can penetrate through walls. Wi-Vi relies on a simple hardware of 2.GHz  Wi-Fi radios small enough to be portably used.Integrated in hand held devices.Low power Wi-Fi signals are used. A Wi-Vi system constitutes-  1.Two transmitting antennas 2.single receiver. This technology is based on principle of Rada and Sonar.Radar and Sonar works on Doppler effect. This technology uses reflected Wi-Fi signals...

Brain chips

Introduction: Thousands of people around the world suffer from paralysis they need to depend on some one for even some basic   tasks brain chips can become  a handy at this case .Brains are made with a view to enhance the memory of human beings, to help paralyzed patients, and are also intended to serve military purposes. It is likely that implantable computer chips acting as sensors, This is like a implantable computer chip in brain. This consists of both biological and electronic term's. A chip in the Braingate system is of 100 hair thin electrodes.It senses electromagnetic signature of Neutrons.The Brain chip provides fast and reliable connection between the brain of a severely disabled person and personal computer. Braingate is a technology is a technology by which the electrical signal is exchanged by neurons within the brains are used to execute body moment .  Hardware of brain chips  It mainly consists of. Four parts ->chips: A Four ...

The truth about hacking

The Process of attempting to gain or successfully    gaining, unauthorized access to computer resources   is called   Hacking. Hacking is been a part of Computer for over 40 year's.The first hacker is from MIT In  the  computer  security  context,  a  hacker  is someone who  seeks  and  exploits  weaknesses  in  a  computer system  or  computer  network.  The programers prefer to refer them as crakers. This are the main reasons for hacker to hack a system. -Just for fun. -Show off. -Notify many people their thought. -Steal important information. -Destroy enemy’s computer network during the war. Hacking is mainly divided into two types - ethical hacking - unethical hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.This is Often done to protect from. Hacking Unethical hacking  is often ...