1 / 21

WELCOME

WELCOME. A SEMINAR ON ANTIVIRUS. CONTENTS. 1.INTRODUCTION 2.TYPES OF VIRUSES 3.VIRUS PROTECTION 4.BEST AV PRODUCT ? 5.CONCLUSION. INTRODUCTION.

Télécharger la présentation

WELCOME

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WELCOME www.applebuz.com

  2. A SEMINAR ON ANTIVIRUS www.applebuz.com

  3. CONTENTS 1.INTRODUCTION 2.TYPES OF VIRUSES 3.VIRUS PROTECTION 4.BEST AV PRODUCT ? 5.CONCLUSION www.applebuz.com

  4. INTRODUCTION A virus reproduces, usually without your permission or knowledge. In general terms they have an infection phase where they reproduce widely and an attack phase where they do whatever damage they are programmed to do (if any). There are a large number of virus types. www.applebuz.com

  5. A virus is a program that reproduces its own code. • Generally, the first thing a virus does is to reproduce (i.e., infect). • Some viruses use a variety of techniques to hide themselves. • On some defined trigger, some viruses will then activate. • Not all viruses activate, but all viruses steal system resources and often have bugs that might do destructive things. www.applebuz.com

  6. Number of Viruses: Lots and lots. Virus Names: It's not easy nor standardized. How Serious Are Viruses? Worms spreading due to user inattention are a serious threat. Hardware& Software Threats: Viruses are not the only things that can cause damage. Consider some hardware problems &software problems www.applebuz.com

  7. VIRUS TYPES Viruses come into different categories based on their characteristics. We're going to describe two different types of category systems: what they infect and how they infect. Because they are so common. www.applebuz.com

  8. What They Infect? Viruses can infect a number of different portions of the computer's operating and file system. These include: System Sectors Macros Batch Files www.applebuz.com

  9. SYSTEM SECTORS: System sectors (MBR and DBR) are often targets for viruses. These boot viruses use all of the common viral techniques to infect and hide themselves. They can also be "dropped" by some file infectors. www.applebuz.com

  10. MACRO VIRUSES: • With macro languages the line between pure data files and executable files is blurring. • An infected file might be attached to an E-mail. Don't automatically run attached files. • Be careful of E-mail programs that use other programs with macros to display or create incoming mail. www.applebuz.com

  11. Batch files: • Batch files can be used to transmit binary executable code and either be or drop viruses. • @ECHO OFF:[ a label of specific form I won't mention ]COPY %0.BAT C:\Q.COM>NULC:\Q[ binary data ] • To detect these viruses look for two signs: • An odd label at the start of the batch file • A batch file that is too large for the text in it. www.applebuz.com

  12. HOW VIRUSES INFECT Viruses are sometimes also categorized by how they infect. These categories include: Polymorphic VirusesViruses change their characteristics as they infect. Stealth VirusesViruses try to actively hide themselves from anti-virus or system software. Fast and Slow InfectorsViruses infect in a particular way to try to avoid specific anti-virus software. www.applebuz.com

  13. Multipartite VirusesViruses that may fall into more than one of the top classes. Cavity (Spacefiller) VirusesViruses that attempt to maintain a constant file size when infecting. Tunneling VirusesViruses that try to "tunnel" under anti-virus software while infecting. Camouflage VirusesViruses that attempted to appear as a benign program to scanners. NTFS ADS VirusesViruses that ride on the alternate data streams in the NT File System. www.applebuz.com

  14. SPECIAL TYPE: VIRUS DROPPER • A dropper is a program that, when run will attempt to install a regular virus onto your hard disk. • A Trojan program that installs a virus onto your system is called a dropper. • Fortunately, because of technical difficulties, droppers are hard to program and therefore rare. www.applebuz.com

  15. VIRUS PROTCTION Anti virus software helps using techniques of: Scanning Integrity Checking Interception www.applebuz.com

  16. SCANNING: Scanning depends on prior knowledge of a virus in order to detect it. This is done by recognizing some sort of signature that represents the virus or some program characteristic that indicates a virus may be present. Scanners allow you to check programs before execution. That is their main advantage. www.applebuz.com

  17. Integrity checking: Integrity products record information about your system for later comparison in order to detect changes. Just detecting changes is not enough, however; the detection must have some "intelligence" behind it to avoid confusion. www.applebuz.com

  18. Interception: Monitoring for system-level routines that perform destructive acts can help, but such monitoring is fairly easily bypassed. Do not depend on it alone. www.applebuz.com

  19. BEST AV PRODUCT First, understand how your anti-virus product works. Then, start with a known-clean computer and follow specific steps to assure good virus detection/protection. Do research on specific products before purchase. www.applebuz.com

  20. Disable Scripting The Windows Scripting Host is used by few but makes many avenues of mischief available to malicious software. Consider removing or deactivating it. www.applebuz.com

  21. Conclusion: Mostly I conclude updating our ANTIVIRUS is important because viruses are increasing day by day. First, understand how your anti-virus product works. Then, start with a known-clean computer and follow specific steps to assure good virus detection/protection. www.applebuz.com

More Related