SlideShare a Scribd company logo
1 of 15
Avoiding Email viruses
What is a virus?

Viruses are, by definition, small infections that
   replicate inside the cells of a living organism.
Like their predecessors, a computer virus is a
   program which can replicate itself and then
   spread from one computer to another.
Sometimes, malware, adware and spyware are
   called viruses, although they cannot replicate
   themselves. Instead, they can exploit the
   security of the computer as well as computers
   within their network.
Some viruses can harm a computer’s data or
   performance, but many are harmless.
Why are viruses
created?
We all dread the knowledge that our
 computer may be infected with a
 virus. But why would anyone go
 to the trouble and expense of
 creating one? There are many
 reasons why a computer virus
 may be created. Here are some of
 them…
1. To Control the
          computer

This enables the creator of the virus to
attack web servers by having each
infected computer sent information to the
server, thus overloading the system, and
shutting down the server (which may
host a rival website). It can also be used
to send spam to infected computers.
2. To generate money

The virus may pretend to offer free
spyware or virus removal tools. Once
installed, they will “scan” your computer
and find all sorts of viruses that they will
remove, provided you pay for the full
version of the application.
3. To steal your
      information
They may actually be able to keep
track of everything you type on the
keyboard, thus providing access to
your passwords, account numbers
and personal information.
4. Just because they
          can
Yes, some people would stoop this low
to deliver a message, such as a virus
which would cause your computer to
restart with the message: “billy gates
why do you make this possible? Stop
making money and fix your software!”
(actual virus!)
5. To shut down a
 computer or network
Although viruses that shut down a
computer are not as common as they
once were, viruses to shut down a
network are very common. Known as a
DNS (denial of service), they will cause a
excess amount of activity on a network,
shutting it down eventually.
Email and viruses

One of the most prevalent ways to
spread a virus is by using Email.
Although most of us use Email on a
daily basis, many of us are naïve of
the consequences of a “bad” Email.
Let’s look at some of the ways that
viruses are spread by Email.
1. A Virus as an Email
          Hoax

Although not the worse thing that can
happen, an email may contain false
information (a child needing an organ
transplant or a virus warning). This will
not infect your computer, but can clog up
the email servers of the recipients,
making it a waste of time, resources and
energy. To read more about email
hoaxes, see Hoax-Slayer.
2. In an Email
          attachment
This is a clear reason why you don’t open
attachments if you are not sure who sent them, or if
they are authentic. These attachments can contain
viruses which run programs, or infect programs on
your computer (such as Word or Excel). The harm
only occurs if you open the attachment, so if you are
unsure, delete the email. Caution: If your contacts
have been affected by a virus, they may be sending
you a rogue infection without you knowing. In this
case, to be safe, save the attachment to your hard
drive, and then scan it with your virus scanner.
3. In the body of the
           Email

It is now possible to place a virus right into the
e-mail. In this case, the virus will be
automatically triggered when you open the
email. This is done by embedding the message
into the email. You will usually see a warning
asking you to click if you want to see embedded
information. Only do this if you are certain of
the source. Also, be wary of URLS (links to a
web page) which may actually link you to a site
where a virus will be downloaded. If you are not
certain of the sender, don’t open URLS in your
email.
Summary

• Verify the source of any suspicious email
  before you open it
• Do not blindly forward e-mail
• Do not open attachments or links unless you
  are certain of the sender
• Use caution when authorizing your computer
  to display content of trustworthy sources
• Make sure that your email program does not
  automatically download and open
  attachments or display HTML content
  (embedded)
Resources

Click on these links for more information

• Top Ways People Get Infected by an Email
  Virus
• Why do People Create Computer Viruses?
• Top Ten Best Free Anti-Virus Programs
• Top Five Current Email Scams You Should
  Know About
For more information:

  Contact me: mprine@sdccd.edu

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virusDark Side
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all timeAlefyaM
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 

What's hot (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus
computer viruscomputer virus
computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Viewers also liked

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
SCORE Fellowship Final Report
SCORE Fellowship Final ReportSCORE Fellowship Final Report
SCORE Fellowship Final ReportAnna Comas-Quinn
 
Computer viruses
Computer virusesComputer viruses
Computer virusesshopnil786
 
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Jaime Sánchez
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
mechanical eng anna university final year Project thesis of bio plastics
mechanical eng anna university final year Project thesis of bio plastics mechanical eng anna university final year Project thesis of bio plastics
mechanical eng anna university final year Project thesis of bio plastics Pichaimuthu MPM
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
The Real Threats to Your Presentation Success
The Real Threats to Your Presentation SuccessThe Real Threats to Your Presentation Success
The Real Threats to Your Presentation SuccessMichelle Mazur
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Online grocery store
Online grocery storeOnline grocery store
Online grocery storeKavita Sharma
 
Consumer Perception Towards Online Grocery Stores
Consumer Perception Towards Online Grocery StoresConsumer Perception Towards Online Grocery Stores
Consumer Perception Towards Online Grocery StoresTanveer Singh Rainu
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 

Viewers also liked (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
SCORE Fellowship Final Report
SCORE Fellowship Final ReportSCORE Fellowship Final Report
SCORE Fellowship Final Report
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses And Hacking
Viruses And HackingViruses And Hacking
Viruses And Hacking
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
mechanical eng anna university final year Project thesis of bio plastics
mechanical eng anna university final year Project thesis of bio plastics mechanical eng anna university final year Project thesis of bio plastics
mechanical eng anna university final year Project thesis of bio plastics
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
The Real Threats to Your Presentation Success
The Real Threats to Your Presentation SuccessThe Real Threats to Your Presentation Success
The Real Threats to Your Presentation Success
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
parasites
parasites parasites
parasites
 
Online grocery store
Online grocery storeOnline grocery store
Online grocery store
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Security threats
Security threatsSecurity threats
Security threats
 
Consumer Perception Towards Online Grocery Stores
Consumer Perception Towards Online Grocery StoresConsumer Perception Towards Online Grocery Stores
Consumer Perception Towards Online Grocery Stores
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 

Similar to Avoiding email viruses

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptxLESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptxMarkemmanLopez
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisaDom Mike
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
What types of viruses can affect your computer
What types of viruses can affect your computerWhat types of viruses can affect your computer
What types of viruses can affect your computerAGR Technologies
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 

Similar to Avoiding email viruses (20)

Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Sowmya
SowmyaSowmya
Sowmya
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
Dangers Of The Internet Essay
Dangers Of The Internet EssayDangers Of The Internet Essay
Dangers Of The Internet Essay
 
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptxLESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Virus
VirusVirus
Virus
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
When love kills
When love killsWhen love kills
When love kills
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
What types of viruses can affect your computer
What types of viruses can affect your computerWhat types of viruses can affect your computer
What types of viruses can affect your computer
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

More from San Diego Continuing Education

More from San Diego Continuing Education (20)

Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017
 
No one cares about your damn emails
No one cares about your damn emailsNo one cares about your damn emails
No one cares about your damn emails
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
 
An introduction to diabetes
An introduction to diabetesAn introduction to diabetes
An introduction to diabetes
 
An end to net neutrality
An end to net neutralityAn end to net neutrality
An end to net neutrality
 
Burning fat
Burning fatBurning fat
Burning fat
 
Security gap in Internet Explorer
Security gap in Internet ExplorerSecurity gap in Internet Explorer
Security gap in Internet Explorer
 
Osteoarthritis
OsteoarthritisOsteoarthritis
Osteoarthritis
 
Healthy communication presentation
Healthy communication presentationHealthy communication presentation
Healthy communication presentation
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Review of brain plasticity
Review of brain plasticityReview of brain plasticity
Review of brain plasticity
 
Depression
DepressionDepression
Depression
 
5 technologies that have changed our lives
5 technologies that have changed our lives5 technologies that have changed our lives
5 technologies that have changed our lives
 
Communications presentation
Communications presentationCommunications presentation
Communications presentation
 
Depression & anxiety
Depression & anxietyDepression & anxiety
Depression & anxiety
 
Finding reliable health information online
Finding reliable health information onlineFinding reliable health information online
Finding reliable health information online
 
Windows 7: The Basics
Windows 7:  The BasicsWindows 7:  The Basics
Windows 7: The Basics
 
Week 4 internet overview
Week 4 internet overviewWeek 4 internet overview
Week 4 internet overview
 
Finding a purpose
Finding a purposeFinding a purpose
Finding a purpose
 
Social networks
Social networks Social networks
Social networks
 

Recently uploaded

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 

Recently uploaded (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Avoiding email viruses

  • 2. What is a virus? Viruses are, by definition, small infections that replicate inside the cells of a living organism. Like their predecessors, a computer virus is a program which can replicate itself and then spread from one computer to another. Sometimes, malware, adware and spyware are called viruses, although they cannot replicate themselves. Instead, they can exploit the security of the computer as well as computers within their network. Some viruses can harm a computer’s data or performance, but many are harmless.
  • 3. Why are viruses created? We all dread the knowledge that our computer may be infected with a virus. But why would anyone go to the trouble and expense of creating one? There are many reasons why a computer virus may be created. Here are some of them…
  • 4. 1. To Control the computer This enables the creator of the virus to attack web servers by having each infected computer sent information to the server, thus overloading the system, and shutting down the server (which may host a rival website). It can also be used to send spam to infected computers.
  • 5. 2. To generate money The virus may pretend to offer free spyware or virus removal tools. Once installed, they will “scan” your computer and find all sorts of viruses that they will remove, provided you pay for the full version of the application.
  • 6. 3. To steal your information They may actually be able to keep track of everything you type on the keyboard, thus providing access to your passwords, account numbers and personal information.
  • 7. 4. Just because they can Yes, some people would stoop this low to deliver a message, such as a virus which would cause your computer to restart with the message: “billy gates why do you make this possible? Stop making money and fix your software!” (actual virus!)
  • 8. 5. To shut down a computer or network Although viruses that shut down a computer are not as common as they once were, viruses to shut down a network are very common. Known as a DNS (denial of service), they will cause a excess amount of activity on a network, shutting it down eventually.
  • 9. Email and viruses One of the most prevalent ways to spread a virus is by using Email. Although most of us use Email on a daily basis, many of us are naïve of the consequences of a “bad” Email. Let’s look at some of the ways that viruses are spread by Email.
  • 10. 1. A Virus as an Email Hoax Although not the worse thing that can happen, an email may contain false information (a child needing an organ transplant or a virus warning). This will not infect your computer, but can clog up the email servers of the recipients, making it a waste of time, resources and energy. To read more about email hoaxes, see Hoax-Slayer.
  • 11. 2. In an Email attachment This is a clear reason why you don’t open attachments if you are not sure who sent them, or if they are authentic. These attachments can contain viruses which run programs, or infect programs on your computer (such as Word or Excel). The harm only occurs if you open the attachment, so if you are unsure, delete the email. Caution: If your contacts have been affected by a virus, they may be sending you a rogue infection without you knowing. In this case, to be safe, save the attachment to your hard drive, and then scan it with your virus scanner.
  • 12. 3. In the body of the Email It is now possible to place a virus right into the e-mail. In this case, the virus will be automatically triggered when you open the email. This is done by embedding the message into the email. You will usually see a warning asking you to click if you want to see embedded information. Only do this if you are certain of the source. Also, be wary of URLS (links to a web page) which may actually link you to a site where a virus will be downloaded. If you are not certain of the sender, don’t open URLS in your email.
  • 13. Summary • Verify the source of any suspicious email before you open it • Do not blindly forward e-mail • Do not open attachments or links unless you are certain of the sender • Use caution when authorizing your computer to display content of trustworthy sources • Make sure that your email program does not automatically download and open attachments or display HTML content (embedded)
  • 14. Resources Click on these links for more information • Top Ways People Get Infected by an Email Virus • Why do People Create Computer Viruses? • Top Ten Best Free Anti-Virus Programs • Top Five Current Email Scams You Should Know About
  • 15. For more information: Contact me: mprine@sdccd.edu