Introduction
A computer virus
is a computer program that can copy itself and infect a computer without
permission or knowledge of the user. The term "virus" is also
commonly used, albeit erroneously, to refer to many different types of malware
and adware programs. The original virus may modify the copies, or the copies
may modify themselves, as occurs in a metamorphic virus. anti-virus software
that can detect and eliminate known viruses after the computer downloads or
runs the executable. There are two common methods that an anti-virus software
application uses to detect viruses. The first, and by far the most common
method of virus detection is using a list of virus signature definitions. They
are heuristic analysis and signature scanning. In signature scanning only
single virus can be detected at a time where as in The second method is to use a heuristic algorithm to find viruses
based on common behaviors. This method has the ability to detect viruses that
anti-virus security firms have yet to create a signature for.
Proposed System
Simple antivirus is an application which shows the way of
approaching a generic antivirus product. Unlike to some antivirus products
which binds themselves to specific signatures of some particular viruses, this
simulation provides a generic approach by which we are able to detect more than
a single virus with a common virus code in the database.
For the users of antivirus products who would like to know
the simulation of an antivirus the Virus
Detection System is an application which shows the way of approaching a generic
antivirus product
Unlike to some antivirus products which binds themselves to
specific signatures of some particular viruses, this simulation provides a
generic approach by which we are able to detect more than a single virus with a
common virus code in the database.
FACT FINDING TECHNIQUES
System analysis during is a fact
finding followed by the analysis of the facts. During the fact finding the
emphasis is on the requirements like understanding the ongoing process
including why and how they are performed, identifying data used in information
processing activities, determining the process timing and identifying system
controls.
Simple antivirus is an
application which shows the way of approaching a generic antivirus product”.
This includes record review, interview of management using some questionnaire,
scanning inspection and observation.
Record review:
In the beginning of the study of
the project to collect initial information, I preferred to record review
technique the information is collected by examining.
Manual scanning reports
Manual scan files
By taking the Scanning
review of the registers, reports, I get the whole idea how the manual Screen
works and hence logical designing of the system becomes easier.
Interview of
management
The whole system
investigation part is done by making interview of the concerned people, user
etc.
In this interview I asked
them about the current process of the Scanning and problem related to the
system .I also asked them about their expectations about the system and I got
some idea about the working of the system.
Observations
I have also observed the existing system and how the scan
virus and then how the user maintains scanning data according to user. By
making into consideration all these things I begin to work on my system.
Scope of system
The proposed system is
developed so as to reduce the hard work, space, time and manpower.it is
advantageous in numerous ways. The propose system wish to fulfill the user’s Requirement with the
following features:
The proposed system scan the files of user as
well as operating system
Limitations And Enhancement Of System
Though the system working is
fast but the person operating it must have the knowledge of the system. This
system is designed for “Antivirus Sample” specially But if we have to used it
for the other organizations we have made little changes to it.
To print
formatted report it requires “Microsoft office one note “which is provided in
the “Microsoft office 2007”.so it requires Microsoft office 2007. Every software has some weakness, and to
overcome this enhancement are needed that make software powerful.in future, few
good changes will definitely make this software more powerful to work. Following enhancement can remove its
weakness:
the access to confidential
information by unauthorized user.
Conclusion
A long string of degrees behind a name of person does not determine his
success.it is necessary to have strong foundation of values based knowledge
which includes numerous others soft skills like conflict resolving and decision
making, competitive business intelligence, developing positive attitude
self-motivation to leadership, rules of game at work etc.
A right mix of knowledge, attitude and appropriate skills is
essential for success so one should have confidence; creativity and proactive
mind set.one should know how to work smart.
So, I decided to work on
project and developed “antivirus sample”.
By developing this software I come to know the difficulties
arising in saving videos and how to resolve them to get faster access and
required result at any stage in the system.it help us to understand to
development of Scanning oriented project throughout Ely.
“This project gave me enormous experience and
confidence in real world of development …!”
The “Antivirus sample” is a generic antivirus approach that
will detect the suspicious behaviors of the files that are scanned and it
avoids the pitfalls of the signature scanning method and provides a full
security to the user.
Chandrakala shinde
ReplyDelete