Ajay Kumar Bansal - Virus
Ajay Kumar Bansal - Virus
Vital Information
Resources under Siege
INDEX
OVERVIEW
TYPESOF VIRUSES
WHAT CAUSES COMPUTER VIRSUSES?
SYMPTOMS OF COMPUTER VIRSUES
EXAMPLES OF COMPUTER VIRSUES
HOW TO REMOVE A COMPUTER VIRUS
HOW TO PREVENT A COMPUTER VIRUS
CONCLUSION
OVERVIEW
of virus in computer
Resident Virus
Direct Action Virus
Polymorphic Virus
Browser Hijacker
A computer virus that can change the
settings on your browser will hijack
browser favorites, the home page URL,
and your search preferences and
redirect you to a malicious site. The site
could be a phishing site or an adware
page used to steal data or make
money for the attacker.
Direct Action Virus
When a user executes a seemingly
harmless file attached to malicious
code, direct-action viruses deliver a
payload immediately. These computer
viruses can also remain dormant until a
specific action is taken or a timeframe
passes.
Resident Virus
A virus that can access computer
memory and sit dormant until a
payload is delivered is considered a
resident virus. This malware may stay
dormant until a specific date or time
or when a user performs an action.
Polymorphic Virus
Malware authors can use
polymorphic code to change the
program’s footprint to avoid
detection. Therefore, it’s more
difficult for an antivirus to detect
and remove them.
Macro Virus
Microsoft Office files can run
macros that can be used to
download additional malware
or run malicious code. Macro
viruses deliver a payload
when the file is opened and
the macro runs.
What Causes Computer Viruses?
Morris Worm – One of the earliest and most pervasive computer virus
examples, this self-replicating computer program spread through the early
Internet in 1988, slowing down or crashing many machines.
Nimda – This particular type of worm targeted web servers and computers
running Microsoft Windows operating systems, spreading through multiple
infection vectors in 2001.
ILOVEYOU – A highly destructive worm that spread via email, disguised as
a love confession and caused widespread damage in 2000 by overwriting
files.
SQL Slammer – A fast-spreading computer worm that exploited
a vulnerability in Microsoft SQL Server, causing network congestion
and disrupting Internet services in 2003.
Stuxnet – A sophisticated worm designed to target and sabotage
industrial control systems, particularly Iran’s nuclear program, by
exploiting zero-day vulnerabilities in 2010.
CryptoLocker – This ransomware Trojan, which infected
hundreds of thousands of computers in 2013, encrypted
victims’ files and demanded a ransom for their decryption.
Conficker – Emerging in 2008, this worm exploited
vulnerabilities in Windows operating systems, creating a
massive botnet and causing widespread infection.
Tinba – First discovered in 2012, this banking Trojan
primarily targeted financial institutions, aiming to steal login
credentials and banking information.
Welchia – A worm that aimed to remove the Blaster worm
from infected systems and patch the exploited vulnerability
but caused unintended network congestion in 2003.
Shlayer – A macOS-specific Trojan that primarily spreads
through fake software updates and downloads, delivering
adware and potentially unwanted programs since 2018.
How to Remove a Computer Virus
Removing a computer virus can be a challenging task, but there
are several steps you can take to get rid of it.
Common steps to remove a computer virus
include:
Download and install antivirus software: Assuming you
don’t already have antivirus software installed, download and
install a real-time and on-demand solution, if possible. A real-
time malware scanner scans for viruses in the background while
you use the computer. You must start the on-demand scanner
whenever you want to scan your device.
Disconnect from the internet: Some computer viruses
use the internet connection to spread, so it’s best to disconnect
from the internet when removing a virus from your PC to prevent
further damage.
Delete any temporary files: Depending on the type of
virus, deleting temporary files can also delete the virus, as some
viruses are designed to initiate when your computer boots up.
Reboot your computer into safe mode: To help mitigate damages to
your computer while you remove a virus, reboot your device in ‘Safe
Mode.’ This will inhibit the virus from running and allow you to remove it
more effectively.
Run a virus scan: Run a full scan using your antivirus software, opting
for the most thorough or complete scanning option available. If possible,
cover all your hard drive letters during the scan.
Delete or quarantine the virus: Once the virus is detected, your
antivirus software will give you the option to delete or quarantine the
virus. Quarantining the virus will isolate it from the rest of your computer
to prevent it from causing further damage .
Reboot your computer: Assuming you’ve effectively removed the
virus, your computer can be rebooted. Simply turn on the device as you
would do so normally without initiating the “Safe Mode” option.
Update your browser and operating system: To complete the
virus removal process, update your operating system and web browser to
the latest version possible. Browser and OS Updates often contain fixes
for particular vulnerabilities and exploits.
Given the general nature of this process, the outcome may vary from virus
to virus and device to device. If you are unsure if you’ve effectively removed
a virus from your computer, contact an IT or computer professional for
assistance.
How to Prevent Computer Viruses
Computer viruses can damage your PC, send sensitive data to
attackers, and cause downtime until the system is repaired. You can
avoid becoming the next computer virus victim by following a few best
practices: