COMPUTER VIRUSES AND ANTIVIRUSES
#1

COMPUTER VIRUSES AND ANTIVIRUSES : AN INSIGHT


.pptx   COMPUTER VIRUSES AND ANTIVIRUSES .pptx (Size: 589.56 KB / Downloads: 1)


TYPES OF INFECTANTS:


VIRUSES: Small piece of software that piggybacks on real programs
WORMS: Computer program that copies itself from machine to machine
E-MAIL VIRUSES :Moves around in e-mail messages
TROJAN HORSES: Claims to do one thing, but does something else


VIRUS: WORKING PHASES

INFECTION PHASE: The file is infected
ATTACK PHASE: The infected file is run, and virus shows its action


VIRUSES: WHAT THEY INFECT

System Sector Viruses Big GrinOS boot sector or the Master Boot Record
File Viruses Tonguerogram (COM and EXE) files
Macro Viruses Big Grinata files having macro programs
Companion Viruses : EXE files by installing a same-named COM file
Cluster Viruses :Changes the DOS directory information so that directory entries point to the virus code instead of the actual program
Batch File Viruses : batch files
Source Code Viruses : Source code, by adding Trojan code to it
Visual Basic Worms : Visual Basic Scripts


VIRUSES AND THE INTERNET

Comparatively small role in the spread of viruses
Only when someone mails an infected document to someone else OR makes one available on web site
Anonymous posting
Huge role in future


ANTI- VIRUS RESEARCH


IBM has been preparing a defense against fast spreading viruses
Built the first commercial-grade immune system
Can find, analyze and cure previously unknown viruses
Analysis center can analyze most viruses automatically
Greater speed and precision than human analysts can
Runs the viruses in a virtual environment

End-to-end security of the system allows the safe
submission of virus samples and ensures
authentication of new virus definitions.


CONCLUSION


VIRUSES HAVE STIMULATED SCIENTIFIC THINKING AND IDEAS
SOME IDEAS CAN ALSO BE EXPORTED INTO MEDICAL SCIENCE
SCOPE FOR FURTHER IMPROVEMENT AND RESEARCH
VIRUSES CAN ALSO BE PUT TO CONSTRUCTIVE USE(GOOD VIRUSES)
EACH USER MUST REALIZE THE GRAVE DANGER POSED BY VIRUSES
TAKE STEPS TO PREVENT INFECTION, AND IN CASE OF INFECTION, PROPER AND SAFE WAYS OF DEALING WITH THE INFECTION







Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: computer viruses by symptom, palmtop viruses 2012, computer viruses, can computer viruses be removed, anti viruses programs, computer viruses seminar report, computer viruses and spyware,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Paper Presentation on Software Development Automation by Computer Aided Software seminar paper 4 3,148 23-03-2016, 02:05 PM
Last Post: dhanabhagya
  Computer virus seminar addict 2 2,858 28-01-2013, 03:28 PM
Last Post: seminar details
  BRAIN COMPUTER INTERFACE project uploader 1 1,535 01-01-2013, 10:48 AM
Last Post: seminar details
  COMPUTER SCIENCE AND INFORMATION TECHNOLOGY SYLABUS seminar details 1 1,452 23-11-2012, 01:00 PM
Last Post: seminar details
  Computer Graphics ppt seminar details 1 4,872 31-10-2012, 01:09 PM
Last Post: seminar details
  Types and Functions of Jigs and Fixtures project uploader 1 3,221 27-10-2012, 04:11 PM
Last Post: seminar details
  Touch Screen Computer Displays seminar details 0 1,125 09-06-2012, 05:31 PM
Last Post: seminar details
  Computer Security Pretty Good Privacy seminar details 0 988 09-06-2012, 04:22 PM
Last Post: seminar details
  Artificial Intelligence- revolution in computer sciences seminar details 0 1,036 09-06-2012, 02:00 PM
Last Post: seminar details
  question for computer seminar details 0 797 09-06-2012, 12:13 PM
Last Post: seminar details

Forum Jump: