ABSTRACT
This research project deals with the design and development of a malicious software removal application (antivirus) that will be able to identify and eliminate unwanted malicious software from the personal computer (pc). Examples of these malicious software are Virus, Worms, Trojan, Spyware etc. These unwanted programs replicates by inserting copy of itself (possibly modified). The moment the replication succeeds, the affected areas are then said to be infected, and thus they start to perform harmful activities on infected hosts, such as stealing hard disk space, cpu time, accessing private information, corrupting data, spamming contacts or logging their key strokes and possibly sending important information back to their creator, they do so without the users consent, causing economic damages worth billions of dollars each year, due to system failure ,wasting computer resources and increasing maintenance cost. The software will maintain a database of known virus signatures and will use these signatures to identify intruding virus on the computer system. The malicious software removal application graphical user interface as well as the implementation of the application logic will be performed with the Microsoft visual basic high level programming language. The database will be created using Sublime text editor and saved as “.db.” having file extension, to represent a light data base.
TABLE OF CONTENT
CHAPTERONE:
Introduction
1.1 Background of study
1.2 Statement of the problem
1.3 Aim and Objectives
1.4 Scope of Study
1.5 Significance of the study
1.6 Material source of data
1.7 Project layout
CHAPTER TWO:
Literature review
2.1 Background review of existing work
2.2 Analysis of existing work
2.3 Contribution of the existing work
2.4 Gaps identified
2.5 Area of possible improvement
CHAPTER THREE:
System Analysis and design
3.1 Information on existing systems
3.2 Problems associated with the existing system
3.3 Capabilities of the new system
3.4 Data flow diagrams
3.5 Program flowchart
CHAPTER FOUR:
Design and implementation
4.2 Input design
4.3 Output design
4.4 System screen shots
4.5 Test