SlideShare a Scribd company logo
1 of 13
HEKMAT ASEFI – DMC COLLEGE, GOA
university (India)
1
IT viruses
Table of Content
 What is Malware?
 Kinds of Malware
 Viruses and worms
 Trojans and Rootkits
 Spyware and keyloggers
 Disadvantage of Malware
 How do you get rid of malware?
 Ways to stay save from malware?
 How do you prevent malware?
 10 signs that your computer is infected with viruses,
Malware, or Trojans.
2
What is Malware?
The term malware is defined by malicious intent.
malware designed to damage or gain authorized
access to a private computer system.
This malicious software ( malware) created by
hackers to damage computer operations , gather
sensitive information.
3
Different types of malware
The term malware includes computer viruses .
There are many types and each one can damage
or computer like…
 worms, Trojan horses, rootkits, spyware,
adware Keyloggers and more. To get an
overview of the difference between all these
types of threats and the way they work, it makes
sense to divide them into groups.
4
Viruses and worms- The contagious
threat
 Viruses and worms are defined by their behavior –
malicious software designed to spread without the user’s
knowledge. A virus infects legitimate software and when
this software is used by the computer owner it spreads the
virus – so viruses need you to act before they can spread.
Computer worms, on the other hand, spread without user
action. Both viruses and worms can carry as so called
“payload” Malicious code designed to do damage.
5
Trojans and rootkits – The masked threat
 Trojans and rootkits are grouped together as they both seek to
conceal attacks on computers. Trojan Horses are malignant pieces of
software pretending to be benign applications. Users therefore
download them thinking they will get a useful piece of software and
instead end up with a malware infected computer. Rootkits are
different. They are a masking technique for malware, but do not
contain damaging software. Rootkit techniques were invented by
virus writers to conceal malware, so it could go unnoticed by
antivirus detection and removal programs. Today, antivirus products,
like Bull Guard Internet Security, strike back as they come with
effective rootkit removal tools.
6
Spyware and keyloggers - the financial
threat Spyware is software that spies on you, tracking your internet activities in
order to send advertising (Adware) back to your system.
 Records everything you type on your PC in order to glean your log- in
names, passwords, and other sensitive information, and send it on the
sours of the keylogging program. Many times keyloggers are used by
corporations and parents to acquire computer usage information.
7
Disadvantage of Malware
 Some of the disadvantages are:
 You can get viruses on your computer/laptop and this can cause many
problems
 Your computer /laptop can get slow
 Some of your application wont start
 You can get viruses on your computer and cause many Problems which can
damage your computer and can break your computer completely. usually,
malware displays pop- up ads on your desktop or steal your information.
Some of the nastier ones can even crash your computer and delete your
files also can make your computer slow on starting up applications such as
the internet. However, sometimes your application will not start as there
might be so much viruses on your computer they are stopping you to open
an application.
8
How do you get rid of malware?
 The best way to get rid of malware is to prevent it from getting
into your computer. That is why it is very important to have
security software such as antivirus, antispyware and firewall
software. With these three, you can be assured that malware will
not make it into your computer, or at least, such threats are
minimized. As long as the right software is used and you make
sure it can connect to the internet to receive updates, you don’t
have to worry much about malware. However, if your computer
is already infected with malware, depending on the
circumstance, you may need to reinstall your OS, reformat your
hard drive, or simply clean your computer using anti-spyware or
antivirus software if you still don’t have.
9
How can you prevent malware?
 Use Firefox instead of IE. Firefox is immune to much of the
most common malware tricks. With the addition of adblock
and no script its virtually impenetrable.
 Download spybot search and destroy (linked below). It can
immunize you from many different attack vectors, for added
security you use its teatimer app to protect your registry,
although it can be annoying.
10
10 Signs that your computer is
infected with Viruses, Malware, or
Trojans 1. My computer speaks to me.
2. My computer is running extremely slowly.
3. Application won’t start.
4. I cannot connect to the internet or it runs very slowly.
5. When I connect to the internet, all types of window open or the
browser displays pages I have not requested.
6. Where have my files gone?
7. Oh.. My antivirus has disappeared, my firewall is disabled
8. My computer is speaking a strange language.
9. Library files for running games, programs, etc. have disappeared from
my Computer.
11
10. My computer has gone mad …. Literally. 12
THANK YOU
13

More Related Content

What's hot

Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adwareRaja Kiran
 
Jeopardy
JeopardyJeopardy
Jeopardyzed_o07
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alamsahibe alam
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentationamy.covington215944
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 

What's hot (20)

Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware
SpywareSpyware
Spyware
 
Malware
MalwareMalware
Malware
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Adware
AdwareAdware
Adware
 
spyware
spyware spyware
spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Spyware
SpywareSpyware
Spyware
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
What is malware
What is malwareWhat is malware
What is malware
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 

Similar to HEKMAT ASEFI – DMC COLLEGE, GOA IT viruses

Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
The critical issues you face when not using antivirus software
The critical issues you face when not using antivirus softwareThe critical issues you face when not using antivirus software
The critical issues you face when not using antivirus softwareAntivirus Support
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smartKanha Sahu
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 

Similar to HEKMAT ASEFI – DMC COLLEGE, GOA IT viruses (20)

Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
The critical issues you face when not using antivirus software
The critical issues you face when not using antivirus softwareThe critical issues you face when not using antivirus software
The critical issues you face when not using antivirus software
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Virus project
Virus projectVirus project
Virus project
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
virus
virusvirus
virus
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Virus
VirusVirus
Virus
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

Recently uploaded

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

HEKMAT ASEFI – DMC COLLEGE, GOA IT viruses

  • 1. HEKMAT ASEFI – DMC COLLEGE, GOA university (India) 1 IT viruses
  • 2. Table of Content  What is Malware?  Kinds of Malware  Viruses and worms  Trojans and Rootkits  Spyware and keyloggers  Disadvantage of Malware  How do you get rid of malware?  Ways to stay save from malware?  How do you prevent malware?  10 signs that your computer is infected with viruses, Malware, or Trojans. 2
  • 3. What is Malware? The term malware is defined by malicious intent. malware designed to damage or gain authorized access to a private computer system. This malicious software ( malware) created by hackers to damage computer operations , gather sensitive information. 3
  • 4. Different types of malware The term malware includes computer viruses . There are many types and each one can damage or computer like…  worms, Trojan horses, rootkits, spyware, adware Keyloggers and more. To get an overview of the difference between all these types of threats and the way they work, it makes sense to divide them into groups. 4
  • 5. Viruses and worms- The contagious threat  Viruses and worms are defined by their behavior – malicious software designed to spread without the user’s knowledge. A virus infects legitimate software and when this software is used by the computer owner it spreads the virus – so viruses need you to act before they can spread. Computer worms, on the other hand, spread without user action. Both viruses and worms can carry as so called “payload” Malicious code designed to do damage. 5
  • 6. Trojans and rootkits – The masked threat  Trojans and rootkits are grouped together as they both seek to conceal attacks on computers. Trojan Horses are malignant pieces of software pretending to be benign applications. Users therefore download them thinking they will get a useful piece of software and instead end up with a malware infected computer. Rootkits are different. They are a masking technique for malware, but do not contain damaging software. Rootkit techniques were invented by virus writers to conceal malware, so it could go unnoticed by antivirus detection and removal programs. Today, antivirus products, like Bull Guard Internet Security, strike back as they come with effective rootkit removal tools. 6
  • 7. Spyware and keyloggers - the financial threat Spyware is software that spies on you, tracking your internet activities in order to send advertising (Adware) back to your system.  Records everything you type on your PC in order to glean your log- in names, passwords, and other sensitive information, and send it on the sours of the keylogging program. Many times keyloggers are used by corporations and parents to acquire computer usage information. 7
  • 8. Disadvantage of Malware  Some of the disadvantages are:  You can get viruses on your computer/laptop and this can cause many problems  Your computer /laptop can get slow  Some of your application wont start  You can get viruses on your computer and cause many Problems which can damage your computer and can break your computer completely. usually, malware displays pop- up ads on your desktop or steal your information. Some of the nastier ones can even crash your computer and delete your files also can make your computer slow on starting up applications such as the internet. However, sometimes your application will not start as there might be so much viruses on your computer they are stopping you to open an application. 8
  • 9. How do you get rid of malware?  The best way to get rid of malware is to prevent it from getting into your computer. That is why it is very important to have security software such as antivirus, antispyware and firewall software. With these three, you can be assured that malware will not make it into your computer, or at least, such threats are minimized. As long as the right software is used and you make sure it can connect to the internet to receive updates, you don’t have to worry much about malware. However, if your computer is already infected with malware, depending on the circumstance, you may need to reinstall your OS, reformat your hard drive, or simply clean your computer using anti-spyware or antivirus software if you still don’t have. 9
  • 10. How can you prevent malware?  Use Firefox instead of IE. Firefox is immune to much of the most common malware tricks. With the addition of adblock and no script its virtually impenetrable.  Download spybot search and destroy (linked below). It can immunize you from many different attack vectors, for added security you use its teatimer app to protect your registry, although it can be annoying. 10
  • 11. 10 Signs that your computer is infected with Viruses, Malware, or Trojans 1. My computer speaks to me. 2. My computer is running extremely slowly. 3. Application won’t start. 4. I cannot connect to the internet or it runs very slowly. 5. When I connect to the internet, all types of window open or the browser displays pages I have not requested. 6. Where have my files gone? 7. Oh.. My antivirus has disappeared, my firewall is disabled 8. My computer is speaking a strange language. 9. Library files for running games, programs, etc. have disappeared from my Computer. 11
  • 12. 10. My computer has gone mad …. Literally. 12