SlideShare a Scribd company logo
What is the ILOVEYOU Virus?
The Love Bug, ILOVEYOU, is often mistakenly
labeled a computer virus. However, it is crucial to
clarify that it is, in fact, a worm. The key
distinction lies in the method of propagation.
While a virus relies on a “host file” to trigger the
infection and subsequent activation on each
infected computer, a worm diverges from this
pattern.
Origin and Spread of the ILOVEYOU Virus
A Filipino computer programmer named Onel de Guzman
designed and unleashed the “ILOVEYOU” virus. He
incorporated the virus into the source code he submitted for
his final thesis while studying as an undergraduate computer
student at the AMA Computer College. But the original goal of
ILOVEYOU wasn’t to cause unwarranted destruction of the
victim’s computer. In his thesis draft, Onel de Guzman
outlined his program’s objective of acquiring Windows
passwords and extracting internet accounts stored on the
victim’s computer. The “ILOVEYOU” virus, which he
developed, was designed to fulfill these goals.
The spread of the virus
On May 4, 2000, the infection commenced when
a spammed email message reached the
Philippines, enticing recipients with the subject
line “ILOVEYOU.” The email enticed the
recipients to open the attached document,
purportedly a love letter from the sender.
Impact and Damage of the ILOVEYOU Virus
Soon as the love bug hit the internet, its effect
was overreaching and devastating. Within
hours of its first sighting in the Philippines, the
worm had tunneled its way across Asia,
Europe, and North America. Its propagation
outpaced the Melissa virus — which struck a
year earlier, affecting about 1 million
computers — by approximately 15 times.
In simple terms, a "time bomb virus" is like a hidden
computer program that is set to go off at a certain
time, just like a time bomb in the movies. When it
activates, it can do harmful things to your computer,
such as deleting files, damaging your data, or even
making your computer stop working. The idea behind
such a virus is to cause trouble or harm your
computer on a specific date or under certain
conditions, and it's meant to be a surprise attack.
A "logical bomb virus" is like a hidden trap on
your computer. It sits quietly until a specific
condition, like a certain date or event, is met.
When that condition is triggered, the virus can
cause problems, like deleting files or damaging
your computer. It's similar to a time bomb, but
instead of a timer, it relies on specific actions or
events.
A "worm virus" is like a digital germ that can
spread from one computer to another. It doesn't
need you to do anything; it can move on its own.
Once it infects your computer, it can copy itself
and then send those copies to other computers,
often causing damage or stealing information
along the way. It's like a contagious disease for
computers.
A "boot sector virus" is like a sneaky bug that
infects the starting part of your computer's
operating system. When you turn on your
computer, this virus activates and can harm your
system by corrupting important files or making
your computer not start up properly. It's like a
bad apple hidden in the first bite of your
computer's startup process.
A "macro virus" is like a tiny troublemaker that
hides inside documents, such as Word or Excel
files. When you open one of these infected
documents, the virus can run and cause
problems on your computer, like deleting files or
spreading itself to other documents. It's like a
small but annoying gremlin that gets into your
paperwork and causes chaos.
A "script virus" is like a sneaky piece of code
that can run on your computer without your
permission. It can cause various issues like
stealing your personal information, slowing
down your computer, or spreading to other parts
of your system. It's like a digital troublemaker
that can mess with your computer's workings.
A "Trojan horse virus" is like a deceptive package. It
appears to be something useful or harmless, but
when you open it or run it, it secretly carries hidden
malware into your computer. This malware can then
do harmful things, like stealing your personal
information, damaging your files, or giving control of
your computer to cybercriminals. It's like a fake gift
that turns out to be a dangerous surprise.
ict  motivation and lesson for grade seven
ict  motivation and lesson for grade seven
ict  motivation and lesson for grade seven
ict  motivation and lesson for grade seven
ict  motivation and lesson for grade seven
ict  motivation and lesson for grade seven
ict  motivation and lesson for grade seven
ict  motivation and lesson for grade seven
ict  motivation and lesson for grade seven

More Related Content

Similar to ict motivation and lesson for grade seven

Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Aakash Baloch
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100701982
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
actanimation
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Virus09
Virus09Virus09
Virus09defler
 

Similar to ict motivation and lesson for grade seven (20)

Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
MALWARE
MALWAREMALWARE
MALWARE
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computervirus
Computervirus Computervirus
Computervirus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
virus
virusvirus
virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus09
Virus09Virus09
Virus09
 
Sowmya
SowmyaSowmya
Sowmya
 

Recently uploaded

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Sourabh Kumar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
ricssacare
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 

ict motivation and lesson for grade seven

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. What is the ILOVEYOU Virus? The Love Bug, ILOVEYOU, is often mistakenly labeled a computer virus. However, it is crucial to clarify that it is, in fact, a worm. The key distinction lies in the method of propagation. While a virus relies on a “host file” to trigger the infection and subsequent activation on each infected computer, a worm diverges from this pattern.
  • 10. Origin and Spread of the ILOVEYOU Virus A Filipino computer programmer named Onel de Guzman designed and unleashed the “ILOVEYOU” virus. He incorporated the virus into the source code he submitted for his final thesis while studying as an undergraduate computer student at the AMA Computer College. But the original goal of ILOVEYOU wasn’t to cause unwarranted destruction of the victim’s computer. In his thesis draft, Onel de Guzman outlined his program’s objective of acquiring Windows passwords and extracting internet accounts stored on the victim’s computer. The “ILOVEYOU” virus, which he developed, was designed to fulfill these goals.
  • 11. The spread of the virus On May 4, 2000, the infection commenced when a spammed email message reached the Philippines, enticing recipients with the subject line “ILOVEYOU.” The email enticed the recipients to open the attached document, purportedly a love letter from the sender.
  • 12. Impact and Damage of the ILOVEYOU Virus Soon as the love bug hit the internet, its effect was overreaching and devastating. Within hours of its first sighting in the Philippines, the worm had tunneled its way across Asia, Europe, and North America. Its propagation outpaced the Melissa virus — which struck a year earlier, affecting about 1 million computers — by approximately 15 times.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. In simple terms, a "time bomb virus" is like a hidden computer program that is set to go off at a certain time, just like a time bomb in the movies. When it activates, it can do harmful things to your computer, such as deleting files, damaging your data, or even making your computer stop working. The idea behind such a virus is to cause trouble or harm your computer on a specific date or under certain conditions, and it's meant to be a surprise attack.
  • 22.
  • 23. A "logical bomb virus" is like a hidden trap on your computer. It sits quietly until a specific condition, like a certain date or event, is met. When that condition is triggered, the virus can cause problems, like deleting files or damaging your computer. It's similar to a time bomb, but instead of a timer, it relies on specific actions or events.
  • 24.
  • 25. A "worm virus" is like a digital germ that can spread from one computer to another. It doesn't need you to do anything; it can move on its own. Once it infects your computer, it can copy itself and then send those copies to other computers, often causing damage or stealing information along the way. It's like a contagious disease for computers.
  • 26.
  • 27. A "boot sector virus" is like a sneaky bug that infects the starting part of your computer's operating system. When you turn on your computer, this virus activates and can harm your system by corrupting important files or making your computer not start up properly. It's like a bad apple hidden in the first bite of your computer's startup process.
  • 28.
  • 29. A "macro virus" is like a tiny troublemaker that hides inside documents, such as Word or Excel files. When you open one of these infected documents, the virus can run and cause problems on your computer, like deleting files or spreading itself to other documents. It's like a small but annoying gremlin that gets into your paperwork and causes chaos.
  • 30.
  • 31. A "script virus" is like a sneaky piece of code that can run on your computer without your permission. It can cause various issues like stealing your personal information, slowing down your computer, or spreading to other parts of your system. It's like a digital troublemaker that can mess with your computer's workings.
  • 32.
  • 33. A "Trojan horse virus" is like a deceptive package. It appears to be something useful or harmless, but when you open it or run it, it secretly carries hidden malware into your computer. This malware can then do harmful things, like stealing your personal information, damaging your files, or giving control of your computer to cybercriminals. It's like a fake gift that turns out to be a dangerous surprise.