Вы находитесь на странице: 1из 8

COMPUTER VIRUS AND ITS

SOLUTION
An
An Overview….
Overview….
Sushanta Kumar Parida
AA Student
Student Of
Of Computer
Computer Science
Science
Engineering,
Engineering, Regd
Regd No.
No. 0401229114
0401229114
E-Mail
E-Mail ID:
ID: susdhi@indiatimes.
susdhi@indiatimes. com
com
Under The Guidance
Of
Prof. Abhaya Samal, H.O.D, Comp. Sc. Engg.
VENUE: Hotel Akbari, Cuttack, Orissa.
Cyber talk on virus
•Virus and its definition

•History of virus

•Working of virus

•Solution of virus

•Conclusion
Virus and its definition
• Vital Information Resources Under Siege .
• Viruses can be intentionally destructive.By destroying data, many
other viruses are fairly benign or merely annoying.
• Viruses are somewhat less common than network-borne worms.
• In common parlance, the term virus is often extended to refer to
worms, trojan horses and other sorts of malware.
• The predominant negative effect of viruses is their uncontrolled self-
reproduction, which wastes or overwhelms computer resources.
• The insertion of a virus into the program is termed as an "infection",
and the infected file, or executable code that is not part of a file, is
called a "host“.
History of viruses

•Program called "Elk Cloner” is credited with being the first computer virus to
appear

•The first PC virus was a boot sector virus called (c)Brain, created in 1986 by two
brothers, Basit and Amjad Farooq Alvi, operating out of Lahore

•During the 1980s, real computers started to spread to businesses and homes because of
popularity. By the late 1980s, PCs were widespread in businesses, homes and college
campuses
•Since the mid-1990s, macro viruses have become common. Most of these viruses are
written in the scripting languages for Microsoft programs such as Word and Excel.
These viruses spread in Microsoft Office by infecting documents and spreadsheets.

•Macro viruses pose unique problems for detection software. Since Word and
Excel were also available for Mac OS, most of these viruses were able to spread
on Macintosh computers as well. Numerically, most of these viruses did not have
the ability to send infected e-mail.
Working of virus

 Replication strategies
 Nonresident viruses-Non resident viruses can be thought of as consisting of a finder module and a replication
module. The finder module is responsible for finding new files to infect. For each new executable file the finder
module encounters, it calls the replication module to infect that file
 Resident viruses-Resident viruses contain a replication module that is similar to the one that is employed by
nonresident viruses. However, this module is not called by a finder module. Instead, the virus loads the
replication module into memory when it is executed and ensures that this module is executed each time the
operating system is called to perform a certain operation.

few older viruses called companion viruses[3] do not have
Companion viruses-A
host files per se, but exploit MS-DOS. A companion virus creates new files
(typically .COM but can also use other extensions such as ".EXD") that have
the same file names as legitimate .EXE files. When a user types in the name
of a desired program, if he does not type in ".EXE" but instead does not
specify a file extension, DOS will assume he meant the file with the extension
that comes first in alphabetical order and run the virus. For instance, if a user
had "(filename).COM" (the virus) and "(filename).EXE" and the user typed
"filename", he will run "(filename).COM" and run the virus.
Solution from virus destruction
• Anti-virus software and other countermeasures.

• This software has the potential abilitiy to detect viruses which may not be discovered by anti-
virus security firms. The second and most common method of virus detection is to create a
list of virus signature definitions.

• Aladdin---eSafe from Aladdin Knowledge Systems is a comprehensive gateway-based


family of anti-virus security products.

• Cat Computer Services—Quick Heal antivirus with its proactive and reactive
technologies ensure complete protection from viruses, Trojans, back doors, worms, macro
viruses, and other malicious programs.
Conclusion
 Will the anti-virus camp begin to win the battle, turning the
virus growth curve the other direction
 We should expect to see younger, less-technologically
inclined people creating and disseminating a greater
number of more potent viruses. The future looks bright
indeed - for the computer virus.
 It is not easy for the Viruses to affect Linux platform.
 There are several thousand known viruses for Windows.As c
an be seen in browsing Symantec's encyclopedia of viruses.
THANK YOU

Вам также может понравиться