ANTI VIRUS !! BY : NOOR SHAFIQAH BT NOOR SHAM
COMPUTER VIRUS A computer virus is a  computer program  that can copy itself and infect a computer without permission or knowledge of the user.
VIRUS The original may modify the copies or the copies may modify themselves, as occurs in a  metamorphic virus . A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a  floppy disk ,  CD ,  USB drive  or by the Internet. Additionally, viruses can spread to other computers by infecting files on a  network file system  or a file system that iViruses are sometimes confused with  computer worms  and  Trojan horses . A worm, however, can spread itself to other computers without needing to be transferred as part of a host. s accessed by another computer.
WHY PEOPLE CREATE COMPUTER VIRUSES?? They are deliberately created by programmers, or by people who use virus creation software. Computer viruses can only do what the programmers have programmed them to do. Viruses have been written as research projects, pranks,  vandalism , to attack the products of specific companies, to distribute political messages, and financial gain from  identity theft ,  spyware , and  cryptoviral extortion . Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby. Additionally, many virus writers oppose deliberately destructive payload routines.
VECTORS  &  HOST Viruses have targeted various types of transmission media or hosts. This list is not exhaustive: Binary  executable files  (such as  COM files  and  EXE  files in  MS-DOS ,  Portable Executable  files in  Microsoft Windows , and  ELF  files in Linux)  Volume Boot Records  of  floppy disks  and hard disk partitions  The  master boot record  (MBR) of a hard disk  General-purpose  script  files (such as  batch files  in  MS-DOS  and  Microsoft Windows ,  VBScript  files, and  shell script  files on  Unix-like  platforms).  Application-specific script files (such as  Telix -scripts)  Documents that can contain  macros  (such as  Microsoft Word  documents,  Microsoft Excel  spreadsheets,  AmiPro  documents, and  Microsoft Access  database files)  Cross-site scripting  vulnerabilities in web applications
METHODS TO AVOID DETECTION Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example the  CIH virus , or  Chernobyl Virus , infects  Portable Executable  files. Because those files had many empty gaps, the virus, which was 1  KB  in length, did not add to the size of the file.
ANTI VIRUS SOFTWARE Antivirus software consists of  computer programs  that attempt to identify, thwart and eliminate  computer viruses  and other malicious software ( malware ). Antivirus software typically uses two different techniques to accomplish this: Examining (scanning)  files  to look for known viruses matching definitions in a virus dictionary  Identifying suspicious behavior from any computer program which might indicate infection. Such analysis may include data captures, port monitoring and other methods.
CONCLUSION Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus depend on severity of the type of virus.
THANK  YOU!!

Antivirus!!

  • 1.
    ANTI VIRUS !!BY : NOOR SHAFIQAH BT NOOR SHAM
  • 2.
    COMPUTER VIRUS Acomputer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.
  • 3.
    VIRUS The originalmay modify the copies or the copies may modify themselves, as occurs in a metamorphic virus . A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk , CD , USB drive or by the Internet. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that iViruses are sometimes confused with computer worms and Trojan horses . A worm, however, can spread itself to other computers without needing to be transferred as part of a host. s accessed by another computer.
  • 4.
    WHY PEOPLE CREATECOMPUTER VIRUSES?? They are deliberately created by programmers, or by people who use virus creation software. Computer viruses can only do what the programmers have programmed them to do. Viruses have been written as research projects, pranks, vandalism , to attack the products of specific companies, to distribute political messages, and financial gain from identity theft , spyware , and cryptoviral extortion . Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby. Additionally, many virus writers oppose deliberately destructive payload routines.
  • 5.
    VECTORS & HOST Viruses have targeted various types of transmission media or hosts. This list is not exhaustive: Binary executable files (such as COM files and EXE files in MS-DOS , Portable Executable files in Microsoft Windows , and ELF files in Linux) Volume Boot Records of floppy disks and hard disk partitions The master boot record (MBR) of a hard disk General-purpose script files (such as batch files in MS-DOS and Microsoft Windows , VBScript files, and shell script files on Unix-like platforms). Application-specific script files (such as Telix -scripts) Documents that can contain macros (such as Microsoft Word documents, Microsoft Excel spreadsheets, AmiPro documents, and Microsoft Access database files) Cross-site scripting vulnerabilities in web applications
  • 6.
    METHODS TO AVOIDDETECTION Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example the CIH virus , or Chernobyl Virus , infects Portable Executable files. Because those files had many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file.
  • 7.
    ANTI VIRUS SOFTWAREAntivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software ( malware ). Antivirus software typically uses two different techniques to accomplish this: Examining (scanning) files to look for known viruses matching definitions in a virus dictionary Identifying suspicious behavior from any computer program which might indicate infection. Such analysis may include data captures, port monitoring and other methods.
  • 8.
    CONCLUSION Once acomputer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus depend on severity of the type of virus.
  • 9.