logging in or signing up Computer virus aSGuest61539 Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Copy Does not support media & animations WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 1558 Category: Education License: Some Rights Reserved Like it (0) Dislike it (0) Added: August 19, 2010 This Presentation is Public Favorites: 0 Presentation Description No description available. Comments Posting comment... Premium member Presentation Transcript Slide 1: Introduction Name : Ankur Sharma Class : IX Section : A Roll Number : 20 Subject : Computer Topic : Viruses Teacher : Mr. Ajay Dobhal Session : “2010-2011” Slide 2: Acknowledgement I am grateful to all those who have helped me in completing this project. First of all, I would like to thank our principal Mrs. R. Tadepalli for her support and guidance, which helped me to complete my project. I am also grateful to my Computer Teacher Mr. Ajay Dobhal who inspired me and gave guidance and data needed for my project. Last, but not the least, I am deeply grateful to my parents and sisters who gave me the maximum understanding and data needed for my project. Slide 3: Topic Viruses Slide 4: What are viruses ? Full form of “Virus” V I R U S VITAL INFORMATION RESOURCE UNDER SEIZED Virus A computer virus is a computer program that can copy itself and infect a computer. A true virus can spread from one computer to another when its host is taken to the target computer through Internet, CD, DVD, Floppy Disk, Pen Drive and other removable medium. Slide 5: How does a virus works ? A Virus is a malicious code whose chief purpose is to copy itself and maybe doing something malicious along the way. To do this, it needs to enter in an execution stream. The virus can get itself called by adding a line to a configuration script, appending itself to files which are to be opened and maybe processed, or getting the OS or a process to run it through an exploit. Slide 6: Some Viruses Creeper – It was first detected on ARPANET, the forerunner the of Internet in the early 1970s. It was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971. Elk Cloner – It was the computer virus to appear outside the single computer or lab where it was created. It was created by Richard Skrentra in 1981. Slide 7: Top 3 Viruses Bagle – Seen in 2004. Estimated damage about 10 billions of $. MSBlast – Seen in 2003. Estimated damage about 6-10 billions of $. ILOVEYOU – Seen in 2000. Estimated damage about 5.7 billions of $. Slide 8: Protection from Virus Get a high quality anti – virus as well as anti – spyware. Set up a software firewall. If you don’t have a software firewall built in then upgrade your operating system. Set up your computer so that it doesn’t autolaunches files, updates, security checks, html pages, cookies, etc. without your permission. Slide 9: Bibliography The following information has been taken from : www.wikipedia.com www.ask.com www.yahoo.com www.google.com Thank You, Ankur. You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.