You are on page 1of 9

Presentation Title =VIRUS!

=
By : Mohamad Syafeeq Haqimi Bin Abdul Halim from 4 ICT Email : syafeeqhaqimi@yahoo.com

Appreciation
First of all, i want to say thank you to all teacher and my friend whose helping me to completed this presentation. I am also want to say thankfulness to Allah s.w.t because i succeed in making of this presentation. The title of this presentation is VIRUS. Secondly, i want to say thank you to my ICT teacher, Puan Yuslinda Yusoff because help me to find out information about VIRUS in the internet and also my friend Faris help me to complete this coursework Lastly, i want to say thank you to my mother, Lailane and for all teacher or friends whoever help me.

(CONTENTS)
MEANING OF VIRUS COMPUTER VIRUS>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> DIFFERENT TYPES OF COMPUTER VIRUSES TYPES OF VIRUSES>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> CONCLUSION HOW TO PREVENT A VIRUSES VIRUS >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

COMPUTER VIRUS
A computer virus is a computer program that can copy itself and infect a computer. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

TYPES OF VIRUS
Trojan Horse: A trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls. Worms: A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail. Bootsector Virus: A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks.

Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes. Rootkit Virus: A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files. Polymorphic Viruses: A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect. Logic Bombs/Time Bombs: These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.

How to prevent a viruses


How To Prevent Computer Viruses How can we prevent computer viruses is the big question that millions of users make everyday. The first rule in this eternal battle for computer security is to have an up-to-date antivirus. Notice the word up-to-date. That means that your antivirus software needs to be updated every day. Viruses are always appearing, so do not sub estimate them. In less than 24 hours your antivirus could be obsolete. The next important rule is still related to actualizations. Although you may have your antivirus updated, that doesn't mean that there are other weaknesses in your system. As a matter of fact, there isn't an unbreachable computer. Even the most expensive system can be cracked by an expert. So, it doesn't matter if you have a guardian dog tied at the front entrance of your house if your windows are open. That's why the rest of your software needs to be updated. The first piece of software that needs to be actualized is the operating system.

Almost eighty percent of the world uses Microsoft software. Hence, it is the favorite victim of black hat hackers. Configure your Windows configuration so it can make automatic actualizations that can prevent computer viruses.
The same thing goes for productivity software like Microsoft Office or even entertainment software like computer games. All software is under constant changes once it is delivered into the market. Consider the millions of possible configurations that a computer program needs to affront once it is introduced.

Conclusion
Virus, a special program which can do destructive also annoying things, it is a very tricky thing, because there are lots of different viruses, some of them might format your hard disk or they can make copies of itself without the user knowing about itetc. they all have different behaviours but all of them do things that you may not like to see to your computer. Before we know how to protect ourselves, we need to know how viruses work. Viruses are very annoying, because they spread. But they are not spreading in a normal way which you can see; they hide in the boot sector of a storage device, and this storage device can either be a floppy disk or CDROM that youve just borrowed from your friend. After it gets into your computer, it will do what the designer of this virus told it to do, it can be make millions of copies, or format the hard disketc. how can people get away from this thing that you cannot see? For the problem like this, people have made those anti-virus programs to find the virus, I strongly recommend you to have an anti-virus program, because you may never know what it actually in the file you are looking. In a PC, if a virus gets in, it will begin to spread it self, and do damage to it. Can we stop it? Yes, virus has always been a big problem to PCs, and there are many solutions as well, its just whether people actually do it or not. We can like have regular whole system virus scan e.g. every week. We can also use the floppy disk or CD-ROM that you trust, but even if you trust the source of it, you will still need to have a virus scan before you open it. Be careful with all the files that you have downloaded from the internet, because you may never know is it a clean file. Regular anti-virus program update will do as well. And if we can actually do these things properly, there shall be less problem form the virus.

Coursework Materials (http)


I found the materials for this presentation. Web address :- http:// www.coursework.info www.google.com.my

You might also like