Submit Search
Upload
I Love You =D
•
Download as PPT, PDF
•
0 likes
•
354 views
B
BLACHBLACHBLACH
Follow
BLAH
Read less
Read more
Technology
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 11
Download now
Recommended
my first slide show
Iloveyou virus
Iloveyou virus
7esBoss12
I Love You =D
I Love You =D
BLACHBLACHBLACH
Most Malignant Viruses
Most Malignant Viruses
Manish Prasad
New Wordpad Document
New Wordpad Document
shoib_245
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
Web virus activity
Web virus activity
Sim_Dhillon
When love kills
When love kills
When love kills
Spain View Travel Guide
Computer virus
Computer virus
nutantripathi
Recommended
my first slide show
Iloveyou virus
Iloveyou virus
7esBoss12
I Love You =D
I Love You =D
BLACHBLACHBLACH
Most Malignant Viruses
Most Malignant Viruses
Manish Prasad
New Wordpad Document
New Wordpad Document
shoib_245
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
Web virus activity
Web virus activity
Sim_Dhillon
When love kills
When love kills
When love kills
Spain View Travel Guide
Computer virus
Computer virus
nutantripathi
Some Information About the Computer Virus and its effect on Computer and how does it find Victims.
Computer virus
Computer virus
Dikshyanta Dhungana
fully concept related to virus and some special type of viruses
Virus
Virus
sushant292
What is the MyDoom Virus? Who created MyDoom? How does MyDoom develop? How to prevent MyDoom from further spreading? Answers are here!
Mydoom virus
Mydoom virus
ssuser1eca7d
This a slide about Computer Virus and Spyware. By seeing this you all should have a good idea about various kinds of viruses and spyware.
Computer Virus and Spyware
Computer Virus and Spyware
Mahamudul Hassan Niaz
Virus presentation
Virus presentation
Abhinav Bansal
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
n|u - The Open Security Community
Computer Virus
Computer Virus
Amirah Husna
Computer worm
Computer worm
zelkan19
Open Cloud Security removal tool is designed with latest technology that removes any type of useless programs that harms the computer.
Remove open cloud security
Remove open cloud security
charliedavibrown
cfadw presentation
Virus worm trojan
Virus worm trojan
100701982
viruseseffects and their Execution
Assignment of virus
Assignment of virus
Huma Tariq
Computer Viruses- Grade 8-COMPUTER Types of computer viruses and their history
Computer Viruses
Computer Viruses
MikaPriya
Computer Viruses, a portion of a computer program that has been designed to furtively copy itself into other similar canons or computer codes. It's generally created by a prankster or defacer to effect a non-utilitarian result or to destroy data and program , in the case of ransomware.
What types of viruses can affect your computer
What types of viruses can affect your computer
AGR Technologies
It describes the basic Difference between viruses and worms and also the prevention techniques from them in a very easy way and simple language. Also describes the symptoms of system when affected by viruses and worms. Also has some examples of those.
Virus & Worms(20120628)
Virus & Worms(20120628)
Tejas Kolge
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer viruses
UltraUploader
info on Zotob Worm
Zotob Worm
Zotob Worm
yotengo4
Code Red Virus
Code Red Virus
smithz
Code Red Worm
Code Red Worm
RaDe0N
Cybercrime,Virus, Virus history, Types of viruses,Properties of viruses,Effects of being attacked by viruses, Virus defense
Cybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
M
M
monikamca
presentation about virus
Virus
Virus
Partha Bhunia
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
More Related Content
What's hot
Some Information About the Computer Virus and its effect on Computer and how does it find Victims.
Computer virus
Computer virus
Dikshyanta Dhungana
fully concept related to virus and some special type of viruses
Virus
Virus
sushant292
What is the MyDoom Virus? Who created MyDoom? How does MyDoom develop? How to prevent MyDoom from further spreading? Answers are here!
Mydoom virus
Mydoom virus
ssuser1eca7d
This a slide about Computer Virus and Spyware. By seeing this you all should have a good idea about various kinds of viruses and spyware.
Computer Virus and Spyware
Computer Virus and Spyware
Mahamudul Hassan Niaz
Virus presentation
Virus presentation
Abhinav Bansal
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
n|u - The Open Security Community
Computer Virus
Computer Virus
Amirah Husna
Computer worm
Computer worm
zelkan19
Open Cloud Security removal tool is designed with latest technology that removes any type of useless programs that harms the computer.
Remove open cloud security
Remove open cloud security
charliedavibrown
cfadw presentation
Virus worm trojan
Virus worm trojan
100701982
viruseseffects and their Execution
Assignment of virus
Assignment of virus
Huma Tariq
Computer Viruses- Grade 8-COMPUTER Types of computer viruses and their history
Computer Viruses
Computer Viruses
MikaPriya
Computer Viruses, a portion of a computer program that has been designed to furtively copy itself into other similar canons or computer codes. It's generally created by a prankster or defacer to effect a non-utilitarian result or to destroy data and program , in the case of ransomware.
What types of viruses can affect your computer
What types of viruses can affect your computer
AGR Technologies
It describes the basic Difference between viruses and worms and also the prevention techniques from them in a very easy way and simple language. Also describes the symptoms of system when affected by viruses and worms. Also has some examples of those.
Virus & Worms(20120628)
Virus & Worms(20120628)
Tejas Kolge
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer viruses
UltraUploader
info on Zotob Worm
Zotob Worm
Zotob Worm
yotengo4
Code Red Virus
Code Red Virus
smithz
Code Red Worm
Code Red Worm
RaDe0N
Cybercrime,Virus, Virus history, Types of viruses,Properties of viruses,Effects of being attacked by viruses, Virus defense
Cybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
M
M
monikamca
What's hot
(20)
Computer virus
Computer virus
Virus
Virus
Mydoom virus
Mydoom virus
Computer Virus and Spyware
Computer Virus and Spyware
Virus presentation
Virus presentation
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
Computer Virus
Computer Virus
Computer worm
Computer worm
Remove open cloud security
Remove open cloud security
Virus worm trojan
Virus worm trojan
Assignment of virus
Assignment of virus
Computer Viruses
Computer Viruses
What types of viruses can affect your computer
What types of viruses can affect your computer
Virus & Worms(20120628)
Virus & Worms(20120628)
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer viruses
Zotob Worm
Zotob Worm
Code Red Virus
Code Red Virus
Code Red Worm
Code Red Worm
Cybercrime: Virus and Defense
Cybercrime: Virus and Defense
M
M
Similar to I Love You =D
presentation about virus
Virus
Virus
Partha Bhunia
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
Lesson on - What is a virus and anti-virus?
What is a virus and anti virus
What is a virus and anti virus
Leonor Costa
a well built presentation on the I LOVE YOU virus, how it works, its effect and how one can protect himself against it.
I LOVE YOU VIRUS.pptx
I LOVE YOU VIRUS.pptx
EzraBehr
Viruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
sarah s
Computer viruses history
Computer viruses
Computer viruses
Ali Al Sarraf
The primary difference between a virus and a worm is that viruses must be triggered by the activation of their host; whereas worms are stand-alone malicious programs that can self-replicate and propagate independently as soon as they have breached the system.
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
Computer Virus
Computer Virus
bebo
computer virus notes with full detail step by step
computer virus with full detail
computer virus with full detail
sonykhan3
virus and antivirus
Virus and antivirus
Virus and antivirus
Prakriti Sharma
Virus09
Virus09
defler
Regards, MGC
History of Computer Virus
History of Computer Virus
Ammy Vijay
Learning Phase... :)
Virus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
Wikis 1 Assingment
Wikis 1 Assingment
cheauyih
Meant for Year 6
Viruses
Viruses
yuvan80
Rawa Abdullah mechanical engineer Upload this report to public.
computer virus Report
computer virus Report
rawaabdullah
Computer viruses
Computer viruses
shopnil786
Computer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
,fever ,virus ,torjan ,worm ,rootkit ,types of virus ,end of world ,computer ,computer science ,cse ,science ,hacking ,information security ,security ,mooja
Computer virus
Computer virus
Dark Side
What is a computer virus
What is a computer virus
sameer1993
Similar to I Love You =D
(20)
Virus
Virus
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
What is a virus and anti virus
What is a virus and anti virus
I LOVE YOU VIRUS.pptx
I LOVE YOU VIRUS.pptx
Viruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
Computer viruses
Computer viruses
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Computer Virus
Computer Virus
computer virus with full detail
computer virus with full detail
Virus and antivirus
Virus and antivirus
Virus09
Virus09
History of Computer Virus
History of Computer Virus
Virus, Worms And Antivirus
Virus, Worms And Antivirus
Wikis 1 Assingment
Wikis 1 Assingment
Viruses
Viruses
computer virus Report
computer virus Report
Computer viruses
Computer viruses
Computer viruses by joy chakraborty
Computer viruses by joy chakraborty
Computer virus
Computer virus
What is a computer virus
What is a computer virus
Recently uploaded
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
中 央社
Created for Professor Marwan Omar, Embry-Riddle Aeronautical University May 12, 2024
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
MasterG
Artificial Intelligence is referred to as machine intelligence, and it is rooted in binary codes and mathematical algorithms. It is a testament to human creativity and is capable of massive data processing, pattern recognition, and even self-learning. However, the realm of AI realm is confined.
AI mind or machine power point presentation
AI mind or machine power point presentation
yogeshlabana357357
Question de pré-engagement à remplir !
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Exakis Nelite
In today's digital world, trust is key to customer relationships, but keeping it is a huge challenge. Customers are well-informed and empowered, quick to change brands if their trust is broken, even if it costs them more. This puts a lot of pressure on organizations to handle trust and safety issues with great care and transparency. The challenge, however, is real. Fragmented solutions have left privacy, legal, and security teams in a perpetual cycle of catch-up, struggling to update privacy notices, manage customer data rights, and answer lengthy security questionnaires—all while trying to prove ROI to the business. It's a thankless job, filled with repetition, tedious tasks, and constant interdepartmental coordination. Combine this with fast regulatory changes and the quick evolution of AI, and it becomes overwhelming. Join this webinar to learn more about TrustArc's new innovative solution Trust Center, the only unified, no-code online hub for trust and safety information built for privacy, security, compliance, and legal teams. Trust Center streamlines your path to compliance, shortens the pre-sales cycle, and reduces both legal and regulatory risks, saving time, effort, and cost. This webinar will review: - Why companies are building unified Trust Centers for a robust privacy program. - How unified Trust Centers streamline sales cycles, ensure regulatory compliance, and reduce operational bottlenecks. - How compliance, legal, security, GRC, and privacy teams benefit from a unified Trust Center in terms of needs, pains, and outcomes. - How TrustArc Trust Center saves time and work while reducing legal, reputational, and compliance risk by effectively managing policies, notices, terms, and disclosures, and providing real-time updates on subprocessors.
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
FIDO Seminar RSAC 2024
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
FIDO Alliance
The presentation from our live stream where we shared insights from our new research into the 2024 Smart Building Startup Landscape. Memoori has seen a 33% Decrease in Funding Rounds Compared to the Previous Year. However, with $3.5 Billion invested in 2023 and over $2 Billion already invested in the first 4 months of 2024, the outlook for investment remains positive.
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
Memoori
The presentation was made in “Web3 Fusion: Embracing AI and Beyond” is more than a conference; it's a journey into the heart of digital transformation. The conference a provided a platform where the future of technology meets practical application. This three-day hybrid event, set in the heart of innovation, served as a gateway to the latest trends and transformative discussions in AI, Blockchain, IoT, AR/VR, and their collective impact on the information space.
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
AnitaRaj43
FIDO Seminar RSAC 2024
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
Discover the top CodeIgniter development companies that can elevate your project to new heights. Our blog explores the best firms known for their expertise in CodeIgniter framework development. From robust web applications to scalable solutions, these companies deliver excellence. Whether you're a startup or an enterprise, find the perfect match for your development needs on Top CSS Gallery's blog.
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
TopCSSGallery
FIDO Seminar RSAC 2024
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
2024 May Patch Tuesday
2024 May Patch Tuesday
Ivanti
GPS (Global Positioning System) is a satellite-based navigation system that allows users to determine their precise location anywhere on Earth.
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
danishmna97
Webinar Recording: https://www.panagenda.com/webinars/easier-faster-and-more-powerful-notes-document-properties-reimagined/ Have you ever felt frustrated by the small properties dialog in Notes? Had to create an agent or button to quickly change a field? Searched endlessly for the field you wanted to compare each time you selected a new document? Wished you could just make the damned thing bigger? Luckily, there is a solution – and you probably already have it installed! With the free panagenda Document Properties (Pro) you get the properties dialog you always needed. Big, resizable, full-text searchable. View multiple documents at once or compare them with a diff viewer. Modify any field, and finally have an easy way to handle profile documents for all users. Join HCL Lifetime Ambassador Julian Robichaux to discover how Document Properties can simplify your work and assist you daily when using Domino applications – in the client or the designer. You will never look back! Key takeaways from this session - What Document Properties is, which editions there are, and how you can find it in Notes and Domino Designer - How you can search for and edit any field, compare documents, or CSV export all data - How to find, edit, and even delete profile documents - Which configuration settings are available to customize feature
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
panagenda
Kitworks Team Study
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
Welcome to this session on UiPath Manufacturing and AI. In this session, we will discuss the importance UiPath plays with technology in the manufacturing and we will do an overview of AI and Document Understanding. Please join us to hear from UiPath and Community experts on why you might consider leveraging UiPath in manufacturing. Topics covered Community team overview The importance of UiPath technology for manufacturing UiPath AI and Document Understanding overview What is Document Understanding? DU Process Studio Template Components of DU Framework Q&A Speakers: Sebastian Seutter, Senior Industry Practice Director, UiPath, Inc. Priya Darshini, UiPath MVP RPA Solutions Architect Dzmitry Belanovski, Account Executive, UiPath, Inc.
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
DianaGray10
Generative AI refers to a class of machine learning algorithms that are designed to generate new data samples that are similar to those in the training data. Unlike traditional AI models that are trained to recognize patterns and make predictions, generative AI models have the ability to create entirely new data based on the patterns they have learned. This is achieved through techniques such as generative adversarial networks (GANs), variational autoencoders (VAEs), and transformer architectures, among others.
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
alexjohnson7307
Frisco Meetup- Automating Purchase Orders
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
AnubhavMangla3
Modern Vector Search, covering the biggest advances in the past ten years. Featuring HNSW, DiskANN, PQ, LVQ, Fused ADC
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
jbellis
At Skynet Technologies, our team of accessibility experts performs automated, semi-automated, and manual audits of websites and web applications as per WCAG 2.2 level AA, ADA, and section 508. Based on evaluations of the accessibility compliance level of the website’s UI, design, source code, navigation, interactive elements, and overall usability, we will provide a digital accessibility evaluation report with in-depth details of potential accessibility barriers and remediation recommendations. Get a manual website WCAG audit (2.0, 2.1, 2.2 level AA) for a small website: 10 pages: $2,500 within 7 business days 30 pages: $7,500 within 14 business days 50 pages: $12,500 within 28 business days For medium websites: 100 pages: $25,000 within 70 business days For larger websites or audits of all pages, please reach out hello@skynettechnologies.com.
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Skynet Technologies
Recently uploaded
(20)
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
AI mind or machine power point presentation
AI mind or machine power point presentation
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
2024 May Patch Tuesday
2024 May Patch Tuesday
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
I Love You =D
1.
I LOVE YOU
=D By Dan Houck But this cat dose not
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
TEH END
Download now