Skip to main content

Make a Simple Antivirus using vb.net



Introduction

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, to refer to many different types of malware and adware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. They are heuristic analysis and signature scanning. In signature scanning only single virus can be detected at a time where as in The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-virus security firms have yet to create a signature for.

Proposed System

 
Simple antivirus is an application which shows the way of approaching a generic antivirus product. Unlike to some antivirus products which binds themselves to specific signatures of some particular viruses, this simulation provides a generic approach by which we are able to detect more than a single virus with a common virus code in the database.
For the users of antivirus products who would like to know the simulation of an  antivirus the Virus Detection System is an application which shows the way of approaching a generic antivirus product
Unlike to some antivirus products which binds themselves to specific signatures of some particular viruses, this simulation provides a generic approach by which we are able to detect more than a single virus with a common virus code in the database.
 FACT FINDING TECHNIQUES

            System analysis during is a fact finding followed by the analysis of the facts. During the fact finding the emphasis is on the requirements like understanding the ongoing process including why and how they are performed, identifying data used in information processing activities, determining the process timing and identifying system controls. 
Simple antivirus is an application which shows the way of approaching a generic antivirus product”. This includes record review, interview of management using some questionnaire, scanning inspection and observation. 

Record review: 

              In the beginning of the study of the project to collect initial information, I preferred to record review technique the information is collected by examining. 

 Manual scanning reports 

 Manual scan files

By taking the Scanning review of the registers, reports, I get the whole idea how the manual Screen works and hence logical designing of the system becomes easier.





 Interview of management 


The whole system investigation part is done by making interview of the concerned people, user etc. 

In this interview I asked them about the current process of the Scanning and problem related to the system .I also asked them about their expectations about the system and I got some idea about the working of the system. 


Observations


I have also observed the existing system and how the scan virus and then how the user maintains scanning data according to user. By making into consideration all these things I begin to work on my system.



Scope of system
                

                       The proposed system is developed so as to reduce the hard work, space, time and manpower.it is advantageous in numerous ways. The propose system wish to fulfill the user’s Requirement with the following features: 



 The proposed system scan the files of user as well as operating system 



Limitations And Enhancement Of System 

Though the system working is fast but the person operating it must have the knowledge of the system. This system is designed for “Antivirus Sample” specially But if we have to used it for the other organizations we have made little changes to it. 
To print formatted report it requires “Microsoft office one note “which is provided in the “Microsoft office 2007”.so it requires Microsoft office 2007.  Every software has some weakness, and to overcome this enhancement are needed that make software powerful.in future, few good changes will definitely make this software more powerful to work.  Following enhancement can remove its weakness: 
the access to confidential information by unauthorized user. 

Conclusion
  
                             A long string of degrees behind a name of person does not determine his success.it is necessary to have strong foundation of values based knowledge which includes numerous others soft skills like conflict resolving and decision making, competitive business intelligence, developing positive attitude self-motivation to leadership, rules of game at work etc. 
A right mix of knowledge, attitude and appropriate skills is essential for success so one should have confidence; creativity and proactive mind set.one should know how to work smart. 

So, I decided to work on project and developed “antivirus sample”. 
By developing this software I come to know the difficulties arising in saving videos and how to resolve them to get faster access and required result at any stage in the system.it help us to understand to development of Scanning oriented project throughout Ely. 
“This project gave  me enormous experience and confidence in real world of development …!”
The “Antivirus sample” is a generic antivirus approach that will detect the suspicious behaviors of the files that are scanned and it avoids the pitfalls of the signature scanning method and provides a full security to the user.

Comments

Post a Comment

Popular posts from this blog

IMAGE STEGANOGRAPHY using visual basic 2010 express (vb.net) bca mca projects

INTRODUCTION Steganography    is   a   subject,   which   is   rarely   touched   upon   by   most   IT   security   Enthusiasts.   Steganography   is   the   practice   of   hiding   private   or   sensitive   information   within   an   ordinary   message.   Steganography   involves  hiding  information  so  it  appears  that  no  information  is  hidden  at  all.  If  a  person  or  person  view  the  object  that  the  information  is  hidden  of  he  or will  have  no  idea  that  there  is  any  hidden  information  therefore  the  person  will  not  attempt  decrypt  the  information. Steganography...

Food world supermarket system project doc vb.net

Introduction • It is easy to manage mini markets as the customers entering such stores are less and the items in the inventory too is less. Even with few human resource deployment and paper works, small supermarkets or mini-markets can be effectively managed. But, the case is no so with big supermarkets with tens of thousands of items in various inventories and high traffic flow of customers and retailers. • Gone are those days when a shop owner used to manage all his sales and accounts on paper. This job is now performed with these management tools which not only record the sales but also notify the retailer about the items low in stock. • The reordering of items is also provided by Super Market System. It has an interface to communicate with vendors providing the required goods. • Now let me tell you what happens when the reordered items reach the warehouse. The item is added into the warehouse by reading its bar code through a bar-code scanner and its quan...