presentation on virus
TRANSCRIPT
COURSE PRESENTATION
Dept. of Information Science & Library ManagementUniversity of Rajshahi
Presented by:Abdullah-Al-MahmudRoll:13112956Session: [email protected]
PRESENTATION TOPIC : Virus Types of Virus Troubleshooting a virus affected PC
Computer Virus virus is a malware program is able to copy itself infect a computer without the permission of the user and
interfere in computer operation may corrupt or delete data on computer, make slow the system,
take control and even erase everything on the hard disk. Viruses can spread through the attachments in e-mails, instants
messages from one computer to another computer. Random browsing and downloading from Internet is another cause of virus infecting. ( access)
Types of virus: Computer viruses are different in types. Such as:
File deleting virus: caused permanent damage of critical files which are a
part of operating system or data files.
Boot sector virus: It infects the hard disk. When the computer is turned
on, the virus launches immediately and is loaded into memory, enabling it to control the computer.
Macro virus: A macro virus is a computer virus that infects
document files (MS Word), spreadsheet file (MS Excel) or presentation file (MS PowerPoint) and causes a sequence of actions to be performed automatically when the application is started. (Packaged)
Trojan Horse: A Trojan horse virus is so named due to fact that the actual
malicious software is programmed inside an innocent piece of software. Trojan horses do not replicate themselves like other viruses. This virus can delete data, blocking data, modifying data, copying data and disrupting the performance of computers. Hackers use Trojan for stealing important information such as credit card number, passwords etc.
Retrovirus: Retrovirus is another type of virus which tries to attack
and disable the anti-virus application running on the computer. A retrovirus can be considered as anti-antivirus.
Rootkit virus: Rootkit themselves are not harmful; they are simply used
to hide malware. Rootkit allow viruses and malware to hide by disguising as necessary files that antivirus software will overlook.
Mass Mailer Viruses: Mass Mailer Viruses search e-mail programs like MS
outlook for e-mail addresses which are stored in the address book and replicate by e-mailing themselves to the addresses stored in the address book of the e-mail program
Symptoms:
Slow performance File missing Few programs don’t work Unusual error message Take much time in starting Extra files Anti-virus is disable
How to Troubleshoot a Virus affected PC:
Method 1: System Restore Method 2: Scans
Method 3: Clean install
Troubleshoot viruses through Anti-viruses:
Step 1: Back up data Before starting the virus removal process, we have to make
sure that all of our important data is backed up.
Step 2: Install anti-virus The computer should already have an anti-virus program
installed. But if don’t then it should ensure to have an anti-virus. There are many free and commercial anti-viruses available in the market. Highly used and reliable anti-viruses are Norton, McAfee, Vipre, Kaspersky, Avast, Panda, Avira, Microsoft Security Essentials etc. It also required a few anti-malware programs.
Steps 3: reboot in save mode In order for a virus to do anything, it needs to be run. Safe
mode only loads the most essential files for windows to run, which may stop almost all virus from activating. This will allow identify and remove them.
Step 4: scans Run a full system scan with anti-virus program that is already
installed. After finishing virus scan run each additional anti-malware scans. Each program is capable of removing any infections it finds.
Step 5: test the computer After the scans have all completed, reboot normally and test
computer’s performance. Run web-browser and other programs to ensure that the virus infection is gone.
We know prevention is better than cure. To help avoid computer viruses its essential to stay informed about the recent threats, avoid browsing and downloading from unauthorized sites and take immediate scan when connect with any unknown device like pendrive.
THANK YOU