Professional Documents
Culture Documents
Types of Computer
Viruses
Malware
Antivirus Software
Computer Viruses
• Computer virus is a software program that has the
ability.
– to make copies of itself.
– And to attach itself to other programs or files.
• So, the next time you use your computer the virus
program is activated again.
• Infect disks by
• Infect files that
attaching itself to
• Infect executable are attached to
special programs
program files such email messages or
on the hard disk,
as word copied to disks and
called boot
processors, USB.
records.
spreadsheets, and • In this manner, it
• These are the
operating systems. can spread from
programs that the one computer to
computer uses to another.
start itself up.
• Infect computer
• Infect files on hardware such as
write-protected monitors and
discs, such as CD- keyboards.
ROMs. • It infects only
software.
Macro Program
Viruses Viruses
Types of
computer
viruses
Boot Viruses
Umbrella.
Sunday Cascade
3173
Examples
Michelangelo of Boot Devil.941
Viruses
Disk
Killer Eek (b)
Computer Trojan
Worms
Viruses horses
Spyware Spam
• Whenever the
computer system • It keeps a check on
every file that is • If it detects a
starts up, the
opened or run and virus, then the
Antivirus
on all Internet software tries to
software starts
traffic. remove the virus.
automatically.
McAfee Kaspersky
Norton AntiVirus
VirusScan AntiVirus
QuickHeal AntiVirus
• Let us study the Quick Heal Total Security system in
more detail to understand how an antivirus program
helps to secure your system.
©Oxford University Press Computer Viruses 34
• To start Quick Heal Total Security:
1 Click Start ► All
Programs ► Quick Heal
Total Security ► Quick
Heal Total Security.
Or
2
Double-click the Quick
Heal Antivirus icon in the
Windows system tray.
Or
3 Right-click Quick Heal
Antivirus icon in the
Windows system tray and
select Open Quick Heal
The Quick Heal Total Security
Total Security.
main window appears.
Top section
Middle section
Bottom section
1
Click Scan ► Full System
Scan.
2
Review the scan report and
click Close. 1
2
2. write-protected
A computer virus cannot infect files on ________________ discs.
3. Program
______________ viruses infect files that have extensions like .com, .exe,
etc.
4. macro
A _________ is a set of commands written by the user to be executed
later.
5. A ______________
Trojan horse is a program that appears useful, but is actually
programmed to pass the user’s data to someone else.
2. True
You should delete spam mails without reading them: ________
3. You should restrict access to your system both offline and online:
True
________
False
5. Computer viruses can infect a computer keyboard: ________