SlideShare a Scribd company logo
1 of 1
Download to read offline
Dangers of the Internet Essay
Dangers of the Internet
There are many pitfalls and perils on the Internet. Some of them are easy to avoid while other are not so obvious. Some of the Pitfalls and perils
are annoying, while others are deadly to your computer. Still others are humorous and entertaining. There are many dangers on the Internet. This
paper will try to cover some of them.
The biggest dangers of the Internet are virus. Viruses are small programs that "infect" computers. Most viruses are made to "steal" and or
"destroy" data stored on the infected computer. Viruses, that destroy data, write their code into afile and when that file is accessed it rewrites itself
in to more files until the virus corrupters or "infects" a file that the computer needs to run...show more content...
E–mailed Viruses are harder to avoid. Opening an attached file can trigger them or by touching the message that contains the attached file and
then the file menu bar of the E–mail program. (Email Hole Exposes Computers) The seconded way to start a virus is because of a hole in
Netscape's mail program and also MS's Outlook. A new way for Viruses to be spread by E
–mail is to put the whole code for the virus in the
subject line that way when the computer read the subject line it unwittingly activated the virus. The newest way for people to get viruses is
through the web pages. This is done by putting the virus code into a script on the web page, now when the page is accessed the viruses executes
the viruses code. (Virus Thrives on HTML) This can make a virus very prolific if a lot of people visit the web page.
Crackers use viruses for their destructive ways. Crackers are people who go out of their way to cause damage to other peoples systems
through the use of viruses and direct hacking. Crackers are not hackers. Calling a Cracker a hacker is like comparing a red delicious apple to a
golden delicious apple. Hackers are computer enthuses that hack, break in to, systems in order to learn about the system. Hackers as a rule do
not do any damage to the system. Crackers are the ones to give hackers bad repartitions. Crackers use virus
Get more content on HelpWriting.net

More Related Content

Similar to Dangers Of The Internet Essay

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
HARSORA_SEJAL
 

Similar to Dangers Of The Internet Essay (20)

Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
Information security
Information securityInformation security
Information security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 

More from Dltk Custom Writing Paper Montreat

Peloponnesian War Research Paper
Peloponnesian War Research PaperPeloponnesian War Research Paper
Peloponnesian War Research Paper
Dltk Custom Writing Paper Montreat
 
Essay About Gender Identity
Essay About Gender IdentityEssay About Gender Identity
Essay About Gender Identity
Dltk Custom Writing Paper Montreat
 
How To Write A Year Round School Essay
How To Write A Year Round School EssayHow To Write A Year Round School Essay
How To Write A Year Round School Essay
Dltk Custom Writing Paper Montreat
 
Thesis About Homelessness
Thesis About HomelessnessThesis About Homelessness
Thesis About Homelessness
Dltk Custom Writing Paper Montreat
 
Learning Theory Behaviorism Essay Example
Learning Theory Behaviorism Essay ExampleLearning Theory Behaviorism Essay Example
Learning Theory Behaviorism Essay Example
Dltk Custom Writing Paper Montreat
 
Electronic Media
Electronic MediaElectronic Media
Justice Is The End Of Government Essay
Justice Is The End Of Government EssayJustice Is The End Of Government Essay
Justice Is The End Of Government Essay
Dltk Custom Writing Paper Montreat
 

More from Dltk Custom Writing Paper Montreat (15)

Social Acceptance Today
Social Acceptance TodaySocial Acceptance Today
Social Acceptance Today
 
Psychoanalytic Theory Research Paper
Psychoanalytic Theory Research PaperPsychoanalytic Theory Research Paper
Psychoanalytic Theory Research Paper
 
In The Skin Of A Lion Anaylsis Essay
In The Skin Of A Lion Anaylsis EssayIn The Skin Of A Lion Anaylsis Essay
In The Skin Of A Lion Anaylsis Essay
 
Persuasive Essay Outline For Euthanasia
Persuasive Essay Outline For EuthanasiaPersuasive Essay Outline For Euthanasia
Persuasive Essay Outline For Euthanasia
 
Brazil Essay
Brazil EssayBrazil Essay
Brazil Essay
 
American History X Thesis
American History X ThesisAmerican History X Thesis
American History X Thesis
 
Encountering Conflict
Encountering ConflictEncountering Conflict
Encountering Conflict
 
Peloponnesian War Research Paper
Peloponnesian War Research PaperPeloponnesian War Research Paper
Peloponnesian War Research Paper
 
Essay About Gender Identity
Essay About Gender IdentityEssay About Gender Identity
Essay About Gender Identity
 
How To Write A Year Round School Essay
How To Write A Year Round School EssayHow To Write A Year Round School Essay
How To Write A Year Round School Essay
 
Thesis About Homelessness
Thesis About HomelessnessThesis About Homelessness
Thesis About Homelessness
 
Learning Theory Behaviorism Essay Example
Learning Theory Behaviorism Essay ExampleLearning Theory Behaviorism Essay Example
Learning Theory Behaviorism Essay Example
 
Coke Vs. Pepsi
Coke Vs. PepsiCoke Vs. Pepsi
Coke Vs. Pepsi
 
Electronic Media
Electronic MediaElectronic Media
Electronic Media
 
Justice Is The End Of Government Essay
Justice Is The End Of Government EssayJustice Is The End Of Government Essay
Justice Is The End Of Government Essay
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 

Recently uploaded (20)

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Dangers Of The Internet Essay

  • 1. Dangers of the Internet Essay Dangers of the Internet There are many pitfalls and perils on the Internet. Some of them are easy to avoid while other are not so obvious. Some of the Pitfalls and perils are annoying, while others are deadly to your computer. Still others are humorous and entertaining. There are many dangers on the Internet. This paper will try to cover some of them. The biggest dangers of the Internet are virus. Viruses are small programs that "infect" computers. Most viruses are made to "steal" and or "destroy" data stored on the infected computer. Viruses, that destroy data, write their code into afile and when that file is accessed it rewrites itself in to more files until the virus corrupters or "infects" a file that the computer needs to run...show more content... E–mailed Viruses are harder to avoid. Opening an attached file can trigger them or by touching the message that contains the attached file and then the file menu bar of the E–mail program. (Email Hole Exposes Computers) The seconded way to start a virus is because of a hole in Netscape's mail program and also MS's Outlook. A new way for Viruses to be spread by E –mail is to put the whole code for the virus in the subject line that way when the computer read the subject line it unwittingly activated the virus. The newest way for people to get viruses is through the web pages. This is done by putting the virus code into a script on the web page, now when the page is accessed the viruses executes the viruses code. (Virus Thrives on HTML) This can make a virus very prolific if a lot of people visit the web page. Crackers use viruses for their destructive ways. Crackers are people who go out of their way to cause damage to other peoples systems through the use of viruses and direct hacking. Crackers are not hackers. Calling a Cracker a hacker is like comparing a red delicious apple to a golden delicious apple. Hackers are computer enthuses that hack, break in to, systems in order to learn about the system. Hackers as a rule do not do any damage to the system. Crackers are the ones to give hackers bad repartitions. Crackers use virus Get more content on HelpWriting.net