Your SlideShare is downloading. ×
0
As a risk or a threat in social media in               marketing
   What is malware?   Avoid malware   How to detect malware   How to get rid of malware   Computer viruses   Differe...
   Malware is short for malicious software   It’s usually includes viruses and spyware that    infects your computer or ...
   The easiest way is to keep your antivirus and    firewall up to date   Don’t open “trash mail” or visit any suspiciou...
   By monitoring your computer you will be able    to identify a possible malware   Especially if your computer is actin...
   Virus-protection programs on the computer    can handle most of the usual malwares   For more complicated malware it’...
   Computer viruses can be used as malware   The computer virus is a small software that    ”piggybacks on a program.  ...
   Viruses: Each time an infected program runs, the virus runs    too, and it infects other programs while it’s conscious...
   http://www.onguardonline.gov/articles/0011    -malware, 17.10.12   http://computer.howstuffworks.com/virus.ht    m, 1...
Upcoming SlideShare
Loading in...5
×

Malware

493

Published on

Assignment 4 by Max Lindholm

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
493
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
28
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Malware"

  1. 1. As a risk or a threat in social media in marketing
  2. 2.  What is malware? Avoid malware How to detect malware How to get rid of malware Computer viruses Different types of viruses Litterature
  3. 3.  Malware is short for malicious software It’s usually includes viruses and spyware that infects your computer or smartphone Malwares can be very troublesome and can even crash computers Criminals use malware for identity theft
  4. 4.  The easiest way is to keep your antivirus and firewall up to date Don’t open “trash mail” or visit any suspicious websites Back up your data
  5. 5.  By monitoring your computer you will be able to identify a possible malware Especially if your computer is acting slow, crashes or displays repeated error messages Other signs might be new unwanted toolbars, new icons on your desktop or changes in your internet homepage
  6. 6.  Virus-protection programs on the computer can handle most of the usual malwares For more complicated malware it’s good to take your computer to a ”tech support” or a manufacturer You can also report malwares to the federal trade commission
  7. 7.  Computer viruses can be used as malware The computer virus is a small software that ”piggybacks on a program. There are different types of viruses: viruses, e- mail viruses, trojan horses and worms
  8. 8.  Viruses: Each time an infected program runs, the virus runs too, and it infects other programs while it’s conscious E-mail viruses: E-mail viruses travels as an attachment to a e-mail. It also replicates by sending itself to other e-mail addresses Trojan horses: Is a computer program. It’s usually disguised as another program(for ex. a game). It can erase your hard disk. Trojan horses doesn’t replicate automatically Worms: Worms are small pieces of software that uses security holes and computer networks to reduplicate. They are often very advanced and scans network for security holes
  9. 9.  http://www.onguardonline.gov/articles/0011 -malware, 17.10.12 http://computer.howstuffworks.com/virus.ht m, 17.10.12 http://en.wikipedia.org/wiki/Malware,17.10. 12
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×