SlideShare a Scribd company logo
1 of 30
Internet Security
Spyware and Phishing : Two
Popular Security Breaches
Different Types of Spyware
 Spyware
 Adware
 Embedded Programs
 Trojan Horse
 Browser Hijackers
 Dialers
 Malware
Why do people make Spyware?
 Profit
 A challenge
 Malice
 Boredom
 Business
How do I know if I’ve got Spyware?
 Computer is running slower than normal
 Popups (on or off the internet)
 New toolbars
 Home page changes
 Search results look different
 Error messages when accessing the web
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
How do I get rid of Spyware?
Use a legitimate spyware removal program
We suggest Spybot Search and Destroy in
combination with Microsoft Antispyware
(now called Defender)
Ad-aware is a good program and is free for
home use but is no longer free for
educational use.
Steps in Spyware Removal
1. Add and Remove Programs Menu
2. Reboot
3. Run a Spybot Scan
4. Reboot
5. Run a Microsoft Antispyware Scan
6. Reboot
7. If still having problems manually remove
registry and startup entries (Do NOT do
this yourself)
How do I prevent Spyware?
 Be conscious of what you are clicking
on/downloading
 Some pop-ups have what appears to be a
close button, but will actually try to install
spyware when you click on it. Always look
for the topmost right red X.
 Remember that things on the internet are
rarely free. “Free” Screensavers etc.
generally contain ads or worse that pay
the programmer for their time.
The Least Wanted List
Weatherbug (GAIN or Claria)
Hotbar
180 Search Assistant
MyWebSearch
Popular Screensavers
Comet Cursors
A Better Internet (Aurora)
Kazaa / Morpheus
GameSpy Arcade
WhenUSave
New.Net
Starware Toolbar
MySearch
Begin2Search
180Solutions
Zango
CoolWebSearch
DyFuCA
BonzaiBuddy
BargainBuddy
Dashbar
Gator
WeatherScope
Best Offers Network
Precision Time
FunWeb
Phishing
 Most commonly an Email stating your
account Information needs updating
 Watch for URL’s that are numeric or
different from the link you clicked on
 Best thing to do is to type in the URL and
check your account directly without
following any links in the Email
 Many legitimate emails no longer contain a
link (Paypal)
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
How secure do you need to be?
 Be Prudent not Paranoid
 Did you initiate the action?
 Why is this free?
 Is the source trustworthy?
 When in doubt Google it
Safer Alternatives
 Download.com – All programs are
adware/spyware free
 Freesaver.com – Screensavers from this
site are safe DO NOT click on ads
 KFOR or News9
 Cleansoftware.org
The Bottom Line
 It is safe to install these programs:
Microsoft AntiSpyware (Defender)
Spybot Search & Destroy
SpywareBlaster
SpywareGuard
 If you are running a different Spyware
program contact your Technology
Specialist to make sure it is not a rogue
Query Session
You may have so many in
your mind but can be solved
only if coming out ….

More Related Content

What's hot

HOW TO TRACK AFFILIATE LINKS IN CLICKBANK
HOW TO TRACK AFFILIATE LINKS IN CLICKBANKHOW TO TRACK AFFILIATE LINKS IN CLICKBANK
HOW TO TRACK AFFILIATE LINKS IN CLICKBANKsuzi smith
 
MacMAD MacOS Security
MacMAD MacOS SecurityMacMAD MacOS Security
MacMAD MacOS Securitybos45
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Shubham Gupta
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafetyteachesict
 
FULL MEANING OF HACKING
FULL MEANING OF HACKING FULL MEANING OF HACKING
FULL MEANING OF HACKING HARSH SHAH
 
Btc autopilot method
Btc autopilot methodBtc autopilot method
Btc autopilot methodMax Fom
 
How to remove password if you forgot windows 7 password apps for windows
How to remove password if you forgot windows 7 password   apps for windowsHow to remove password if you forgot windows 7 password   apps for windows
How to remove password if you forgot windows 7 password apps for windowsRaj Kamal Choudhary
 
Best ways to get rid of snjsearch.com
Best ways to get rid of snjsearch.comBest ways to get rid of snjsearch.com
Best ways to get rid of snjsearch.comharoNaroum
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 Thycotic
 
How to Remove Search-offersbar.com For Free
How to Remove Search-offersbar.com For FreeHow to Remove Search-offersbar.com For Free
How to Remove Search-offersbar.com For Freekatehd123
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.commariagoel7
 
How to remove Sweet page.com
How to remove Sweet page.comHow to remove Sweet page.com
How to remove Sweet page.compaula_bolivar
 
5 Ways To Identify Blog Spam (As A Business Owner)
5 Ways To Identify Blog Spam (As A Business Owner)5 Ways To Identify Blog Spam (As A Business Owner)
5 Ways To Identify Blog Spam (As A Business Owner)Christopher Dill
 

What's hot (20)

Bug Bounty Secrets
Bug Bounty Secrets Bug Bounty Secrets
Bug Bounty Secrets
 
HOW TO TRACK AFFILIATE LINKS IN CLICKBANK
HOW TO TRACK AFFILIATE LINKS IN CLICKBANKHOW TO TRACK AFFILIATE LINKS IN CLICKBANK
HOW TO TRACK AFFILIATE LINKS IN CLICKBANK
 
Link Audit and Removal
Link Audit and RemovalLink Audit and Removal
Link Audit and Removal
 
MacMAD MacOS Security
MacMAD MacOS SecurityMacMAD MacOS Security
MacMAD MacOS Security
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
FULL MEANING OF HACKING
FULL MEANING OF HACKING FULL MEANING OF HACKING
FULL MEANING OF HACKING
 
Btc autopilot method
Btc autopilot methodBtc autopilot method
Btc autopilot method
 
How to remove password if you forgot windows 7 password apps for windows
How to remove password if you forgot windows 7 password   apps for windowsHow to remove password if you forgot windows 7 password   apps for windows
How to remove password if you forgot windows 7 password apps for windows
 
Best ways to get rid of snjsearch.com
Best ways to get rid of snjsearch.comBest ways to get rid of snjsearch.com
Best ways to get rid of snjsearch.com
 
Bitcoin 100$ a day
Bitcoin 100$ a day Bitcoin 100$ a day
Bitcoin 100$ a day
 
Earn 100$ a day
Earn 100$ a dayEarn 100$ a day
Earn 100$ a day
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
Internet Dangers 2004
Internet Dangers 2004Internet Dangers 2004
Internet Dangers 2004
 
How to Remove Search-offersbar.com For Free
How to Remove Search-offersbar.com For FreeHow to Remove Search-offersbar.com For Free
How to Remove Search-offersbar.com For Free
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 
Free 1 bit coin in 1 day
Free 1 bit coin in 1 dayFree 1 bit coin in 1 day
Free 1 bit coin in 1 day
 
How to remove Sweet page.com
How to remove Sweet page.comHow to remove Sweet page.com
How to remove Sweet page.com
 
5 Ways To Identify Blog Spam (As A Business Owner)
5 Ways To Identify Blog Spam (As A Business Owner)5 Ways To Identify Blog Spam (As A Business Owner)
5 Ways To Identify Blog Spam (As A Business Owner)
 

Similar to Internet security

Topic 12 internet security
Topic 12 internet securityTopic 12 internet security
Topic 12 internet securityNFifa
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new yearMichael Wells
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infectionscottgelbard123
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 
How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me森泉 小
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
How to remove trending upnow pop up
How to remove trending upnow pop upHow to remove trending upnow pop up
How to remove trending upnow pop upharoNaroum
 

Similar to Internet security (20)

Topic 12 internet security
Topic 12 internet securityTopic 12 internet security
Topic 12 internet security
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infection
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Mischievous Malware
Mischievous MalwareMischievous Malware
Mischievous Malware
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware.
Spyware.Spyware.
Spyware.
 
How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Spyware
SpywareSpyware
Spyware
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
How to remove trending upnow pop up
How to remove trending upnow pop upHow to remove trending upnow pop up
How to remove trending upnow pop up
 
26-Security.ppt
26-Security.ppt26-Security.ppt
26-Security.ppt
 

More from Nishant Pahad

International business 1
International business 1International business 1
International business 1Nishant Pahad
 
International business 4 WORLD TRADE
International business 4 WORLD TRADEInternational business 4 WORLD TRADE
International business 4 WORLD TRADENishant Pahad
 
International business 2 ECONOMIC SYSTEM
International business 2 ECONOMIC SYSTEMInternational business 2 ECONOMIC SYSTEM
International business 2 ECONOMIC SYSTEMNishant Pahad
 
10 online transactions
10 online transactions10 online transactions
10 online transactionsNishant Pahad
 
Micro finance in India: legal and regulatory framework
Micro finance in India: legal and regulatory frameworkMicro finance in India: legal and regulatory framework
Micro finance in India: legal and regulatory frameworkNishant Pahad
 
Credit facilities and support services
Credit facilities and support services Credit facilities and support services
Credit facilities and support services Nishant Pahad
 
e-business technologies and trends
e-business technologies and trendse-business technologies and trends
e-business technologies and trendsNishant Pahad
 
E marketing planning
E marketing planningE marketing planning
E marketing planningNishant Pahad
 
E marketing planning
E marketing planningE marketing planning
E marketing planningNishant Pahad
 
Unit 5 E-BUSINESS OPERATIONS AND PROCESSES
Unit 5 E-BUSINESS OPERATIONS AND PROCESSESUnit 5 E-BUSINESS OPERATIONS AND PROCESSES
Unit 5 E-BUSINESS OPERATIONS AND PROCESSESNishant Pahad
 
Online commodity trading
Online commodity tradingOnline commodity trading
Online commodity tradingNishant Pahad
 
commodity trading and derivatives
commodity trading and derivativescommodity trading and derivatives
commodity trading and derivativesNishant Pahad
 
Commodity derivatives
Commodity derivativesCommodity derivatives
Commodity derivativesNishant Pahad
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-businessNishant Pahad
 

More from Nishant Pahad (20)

International business 1
International business 1International business 1
International business 1
 
International business 4 WORLD TRADE
International business 4 WORLD TRADEInternational business 4 WORLD TRADE
International business 4 WORLD TRADE
 
International business 2 ECONOMIC SYSTEM
International business 2 ECONOMIC SYSTEMInternational business 2 ECONOMIC SYSTEM
International business 2 ECONOMIC SYSTEM
 
10 online transactions
10 online transactions10 online transactions
10 online transactions
 
Micro finance in India: legal and regulatory framework
Micro finance in India: legal and regulatory frameworkMicro finance in India: legal and regulatory framework
Micro finance in India: legal and regulatory framework
 
Credit facilities and support services
Credit facilities and support services Credit facilities and support services
Credit facilities and support services
 
e-business technologies and trends
e-business technologies and trendse-business technologies and trends
e-business technologies and trends
 
E ticketing
E ticketing E ticketing
E ticketing
 
E marketing planning
E marketing planningE marketing planning
E marketing planning
 
E marketing planning
E marketing planningE marketing planning
E marketing planning
 
E - governance
E - governanceE - governance
E - governance
 
E governance
E governance E governance
E governance
 
E banking
E bankingE banking
E banking
 
Unit 5 E-BUSINESS OPERATIONS AND PROCESSES
Unit 5 E-BUSINESS OPERATIONS AND PROCESSESUnit 5 E-BUSINESS OPERATIONS AND PROCESSES
Unit 5 E-BUSINESS OPERATIONS AND PROCESSES
 
Online commodity trading
Online commodity tradingOnline commodity trading
Online commodity trading
 
commodity trading and derivatives
commodity trading and derivativescommodity trading and derivatives
commodity trading and derivatives
 
Commodity derivatives
Commodity derivativesCommodity derivatives
Commodity derivatives
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-business
 
EDI
EDIEDI
EDI
 
E business models
E business modelsE business models
E business models
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Internet security

  • 1. Internet Security Spyware and Phishing : Two Popular Security Breaches
  • 2. Different Types of Spyware  Spyware  Adware  Embedded Programs  Trojan Horse  Browser Hijackers  Dialers  Malware
  • 3. Why do people make Spyware?  Profit  A challenge  Malice  Boredom  Business
  • 4. How do I know if I’ve got Spyware?  Computer is running slower than normal  Popups (on or off the internet)  New toolbars  Home page changes  Search results look different  Error messages when accessing the web
  • 5. What does Spyware look like?
  • 6. What does Spyware look like?
  • 7. What does Spyware look like?
  • 8. What does Spyware look like?
  • 9. What does Spyware look like?
  • 10. What does Spyware look like?
  • 11. What does Spyware look like?
  • 12. What does Spyware look like?
  • 13. What does Spyware look like?
  • 14. What does Spyware look like?
  • 15. What does Spyware look like?
  • 16. How do I get rid of Spyware? Use a legitimate spyware removal program We suggest Spybot Search and Destroy in combination with Microsoft Antispyware (now called Defender) Ad-aware is a good program and is free for home use but is no longer free for educational use.
  • 17. Steps in Spyware Removal 1. Add and Remove Programs Menu 2. Reboot 3. Run a Spybot Scan 4. Reboot 5. Run a Microsoft Antispyware Scan 6. Reboot 7. If still having problems manually remove registry and startup entries (Do NOT do this yourself)
  • 18. How do I prevent Spyware?  Be conscious of what you are clicking on/downloading  Some pop-ups have what appears to be a close button, but will actually try to install spyware when you click on it. Always look for the topmost right red X.  Remember that things on the internet are rarely free. “Free” Screensavers etc. generally contain ads or worse that pay the programmer for their time.
  • 19. The Least Wanted List Weatherbug (GAIN or Claria) Hotbar 180 Search Assistant MyWebSearch Popular Screensavers Comet Cursors A Better Internet (Aurora) Kazaa / Morpheus GameSpy Arcade WhenUSave New.Net Starware Toolbar MySearch Begin2Search 180Solutions Zango CoolWebSearch DyFuCA BonzaiBuddy BargainBuddy Dashbar Gator WeatherScope Best Offers Network Precision Time FunWeb
  • 20. Phishing  Most commonly an Email stating your account Information needs updating  Watch for URL’s that are numeric or different from the link you clicked on  Best thing to do is to type in the URL and check your account directly without following any links in the Email  Many legitimate emails no longer contain a link (Paypal)
  • 27. How secure do you need to be?  Be Prudent not Paranoid  Did you initiate the action?  Why is this free?  Is the source trustworthy?  When in doubt Google it
  • 28. Safer Alternatives  Download.com – All programs are adware/spyware free  Freesaver.com – Screensavers from this site are safe DO NOT click on ads  KFOR or News9  Cleansoftware.org
  • 29. The Bottom Line  It is safe to install these programs: Microsoft AntiSpyware (Defender) Spybot Search & Destroy SpywareBlaster SpywareGuard  If you are running a different Spyware program contact your Technology Specialist to make sure it is not a rogue
  • 30. Query Session You may have so many in your mind but can be solved only if coming out ….