SlideShare a Scribd company logo
COMPUTER VIRUS
What is a Computer Virus ? 
A computer virus is a computer program that can copy itself and infect a computer 
without permission or knowledge of the user.
Who Creates or Writes Viruses? 
 People Who are looking for 
information's . Like they are trying 
to steal some really important 
information from somewhere . 
 Profit Earners who are looking to 
earn money selling their Antivirus . 
Ex: Virus / Antivirus Market 
 Some Psychos Like for fun , taking 
some revenge or etc.
“Some virus writers consider their creations to be works of art, and see virus writing as a 
creative hobby”
What will happen if your computer 
Infected by virus ? 
 Functions slower than normal 
 Responds slowly and freezes 
often 
 Restarts itself often 
 See uncommon error messages, 
distorted menus, and dialog 
boxes 
 Notice applications fail to work 
correctly 
 Fail to print correctly
Major 
Types of Viruses
Types of Infections 
Virus 
Redlof 
Logic 
bomb 
Trojan 
Horse 
Chernobal 
Boot sector
When it affects the files 
 Becomes active when the program file 
carrying the virus is opened. 
 usually with below extensions 
.BIN .COM .EXE .OVL .DRV
Sources of Virus 
 From Browsing Internet 
 Removable Data Storage
Norton McAfee Sophos 
Avast Kasperski 
Bit 
defender 
Types of Anti-viruses
How does an Anti-Virus work ? 
Scanner: Detects the virus by using a list of existing virus 
signature/definitions. 
Monitors: These are memory resident programs and alert when any 
changes find in executable program. 
INTEGRITY CHECKING PROGRAMS: To execute any virus must 
integrate with a executable program.so it checks for virus code 
integration
Advantages of Anti-Virus 
Protecting Personal Information 
Hackers and viruses go hand in hand. A good anti-virus 
program will protect you while you surf the Internet, 
preventing hackers from gaining access to personal 
things such as credit card information and bank account 
access. The firewall feature included with most anti-virus 
software will block any unauthorized incoming 
connections to your network or computer, preventing 
hackers from digging their hooks into your life and your 
computer.
Computer VIRUS
Computer VIRUS

More Related Content

What's hot

computer virus
computer viruscomputer virus
computer virus
Kunal Yadav
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
San Diego Continuing Education
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignmentainmz
 
Worm
WormWorm
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
Mahamudul Hassan Niaz
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Malware and security
Malware and securityMalware and security
Malware and security
Gurbakash Phonsa
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
missstevenson01
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
Noushin Ahson
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham_Indrawat
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
Stavia
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
Nitish Nagar
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
Abdullah-Al- Mahmud
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
nasya
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
missstevenson01
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Malware
MalwareMalware
Antivirus
AntivirusAntivirus
Antivirus
Meti Liona
 

What's hot (20)

computer virus
computer viruscomputer virus
computer virus
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Worm
WormWorm
Worm
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
MALWARE
MALWAREMALWARE
MALWARE
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Malware
MalwareMalware
Malware
 
Antivirus
AntivirusAntivirus
Antivirus
 

Similar to Computer VIRUS

Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
Bashdar Rahman
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
sasikumr sagabala
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Computer viruses
Computer virusesComputer viruses
Computer virusesImran Khan
 
Virus
VirusVirus
Virus
dddaou
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
antivirus.pptx
antivirus.pptxantivirus.pptx
antivirus.pptx
AnanyaPandey97
 

Similar to Computer VIRUS (20)

Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
antivirus.pptx
antivirus.pptxantivirus.pptx
antivirus.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

More from Sinbad Konick

Genetic Algorithm in Artificial Intelligence
Genetic Algorithm in Artificial IntelligenceGenetic Algorithm in Artificial Intelligence
Genetic Algorithm in Artificial Intelligence
Sinbad Konick
 
Adaptive Modulation & Coding Technique
Adaptive Modulation & Coding TechniqueAdaptive Modulation & Coding Technique
Adaptive Modulation & Coding Technique
Sinbad Konick
 
Brain Tumor Detection Using Image Processing
Brain Tumor Detection Using Image ProcessingBrain Tumor Detection Using Image Processing
Brain Tumor Detection Using Image Processing
Sinbad Konick
 
Top 5 Server Operating Systems
Top 5 Server Operating SystemsTop 5 Server Operating Systems
Top 5 Server Operating Systems
Sinbad Konick
 
Moral Framework for Ethics
Moral Framework for EthicsMoral Framework for Ethics
Moral Framework for Ethics
Sinbad Konick
 
Why C is Called Structured Programming Language
Why C is Called Structured Programming LanguageWhy C is Called Structured Programming Language
Why C is Called Structured Programming Language
Sinbad Konick
 

More from Sinbad Konick (6)

Genetic Algorithm in Artificial Intelligence
Genetic Algorithm in Artificial IntelligenceGenetic Algorithm in Artificial Intelligence
Genetic Algorithm in Artificial Intelligence
 
Adaptive Modulation & Coding Technique
Adaptive Modulation & Coding TechniqueAdaptive Modulation & Coding Technique
Adaptive Modulation & Coding Technique
 
Brain Tumor Detection Using Image Processing
Brain Tumor Detection Using Image ProcessingBrain Tumor Detection Using Image Processing
Brain Tumor Detection Using Image Processing
 
Top 5 Server Operating Systems
Top 5 Server Operating SystemsTop 5 Server Operating Systems
Top 5 Server Operating Systems
 
Moral Framework for Ethics
Moral Framework for EthicsMoral Framework for Ethics
Moral Framework for Ethics
 
Why C is Called Structured Programming Language
Why C is Called Structured Programming LanguageWhy C is Called Structured Programming Language
Why C is Called Structured Programming Language
 

Recently uploaded

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 

Recently uploaded (20)

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 

Computer VIRUS

  • 2.
  • 3. What is a Computer Virus ? A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.
  • 4. Who Creates or Writes Viruses?  People Who are looking for information's . Like they are trying to steal some really important information from somewhere .  Profit Earners who are looking to earn money selling their Antivirus . Ex: Virus / Antivirus Market  Some Psychos Like for fun , taking some revenge or etc.
  • 5. “Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby”
  • 6. What will happen if your computer Infected by virus ?  Functions slower than normal  Responds slowly and freezes often  Restarts itself often  See uncommon error messages, distorted menus, and dialog boxes  Notice applications fail to work correctly  Fail to print correctly
  • 7. Major Types of Viruses
  • 8. Types of Infections Virus Redlof Logic bomb Trojan Horse Chernobal Boot sector
  • 9. When it affects the files  Becomes active when the program file carrying the virus is opened.  usually with below extensions .BIN .COM .EXE .OVL .DRV
  • 10. Sources of Virus  From Browsing Internet  Removable Data Storage
  • 11.
  • 12. Norton McAfee Sophos Avast Kasperski Bit defender Types of Anti-viruses
  • 13. How does an Anti-Virus work ? Scanner: Detects the virus by using a list of existing virus signature/definitions. Monitors: These are memory resident programs and alert when any changes find in executable program. INTEGRITY CHECKING PROGRAMS: To execute any virus must integrate with a executable program.so it checks for virus code integration
  • 14.
  • 15. Advantages of Anti-Virus Protecting Personal Information Hackers and viruses go hand in hand. A good anti-virus program will protect you while you surf the Internet, preventing hackers from gaining access to personal things such as credit card information and bank account access. The firewall feature included with most anti-virus software will block any unauthorized incoming connections to your network or computer, preventing hackers from digging their hooks into your life and your computer.

Editor's Notes

  1. Framed pictures in a row in perspective (Intermediate) To reproduce the picture effects on this slide, do the following: On the Home tab, in the Slides group, click Layout and then click Blank. On the Insert tab, in the Illustrations group, click Picture. In the Insert Picture dialog box, select a picture and then click Insert. Under Picture Tools, on the Format tab, in the bottom right corner of the Size group, click the Size and Position dialog box launcher. In the Size and Position dialog box, on the Size tab, resize or crop the picture as needed so that under Size and rotate, the Height box is set to 2” and the Width box is set to 2.67”. Resize the picture under Size and rotate by entering values into the Height and Width boxes. Crop the picture under Crop from by entering values into the Left, Right, Top, and Bottom boxes. Under Picture Tools, on the Format tab, in the Picture Styles group, click Reflected Beveled, Black. Select the picture. On the Home tab, in the Clipboard group, click the arrow under Paste, and then click Duplicate. Right-click the duplicate picture, and then click Change Picture. In the Insert Picture dialog box, select a picture and click Insert. If the inserted picture is a different height and width, adjust the width and height. Under Picture Tools, on the Format tab, in the bottom right corner of the Size group, click the Size and Position dialog box launcher. In the Size and Position dialog box, on the Size tab, resize or crop the picture as needed so that under Size and rotate, the Height box is set to 2” and the Width box is set to 2.67”. Resize the picture under Size and rotate by entering values into the Height and Width boxes. Crop the picture under Crop from by entering values into the Left, Right, Top, and Bottom boxes. Repeat the process in steps 6-8 to create another duplicate picture, for a total of three pictures. Drag the pictures to form a row across the slide. Press and hold SHIFT and select all three pictures. On the Home tab, in the Drawing group, click Arrange, and then do the following: Point to Align, and then click Align to Slide. Point to Align, and then click Align Middle. Point to Align, and then click Distribute Horizontally. Click Group. On the Home tab, in the Drawing group, click Shape Effects, point to 3-D Rotation, and then under Perspective click Perspective Contrasting Left (second row, fourth option from the left). Drag the group to position it above the middle of the slide and also position it slightly to the left. To reproduce the background effects on this slide, do the following: Right-click the slide background area, and then click Format Background. In the Format Background dialog box, click Fill in the left pane, select Gradient fill in the Fill pane, and then do the following: In the Type list, select Linear. Click the button next to Direction, and then click Linear Down (first row, second option from the left). In the Angle text box, enter 90⁰. Under Gradient stops, click Add or Remove until two stops appear in the drop-down list. Also under Gradient stops, customize the gradient stops that you added as follows: Select Stop 1 from the list, and then do the following: In the Stop position box, enter 50%. Click the button next to Color, and then under Theme Colors click Black, Text 1, Lighter 5% (sixth row, second option from the left). Select Stop 2 from the list, and then do the following: In the Stop position box, enter 100%. Click the button next to Color, and then under Theme Colors click Dark Blue, Text 2, Lighter 40% (fourth row, fourth option from the left).
  2. Framed pictures in a row in perspective (Intermediate) To reproduce the picture effects on this slide, do the following: On the Home tab, in the Slides group, click Layout and then click Blank. On the Insert tab, in the Illustrations group, click Picture. In the Insert Picture dialog box, select a picture and then click Insert. Under Picture Tools, on the Format tab, in the bottom right corner of the Size group, click the Size and Position dialog box launcher. In the Size and Position dialog box, on the Size tab, resize or crop the picture as needed so that under Size and rotate, the Height box is set to 2” and the Width box is set to 2.67”. Resize the picture under Size and rotate by entering values into the Height and Width boxes. Crop the picture under Crop from by entering values into the Left, Right, Top, and Bottom boxes. Under Picture Tools, on the Format tab, in the Picture Styles group, click Reflected Beveled, Black. Select the picture. On the Home tab, in the Clipboard group, click the arrow under Paste, and then click Duplicate. Right-click the duplicate picture, and then click Change Picture. In the Insert Picture dialog box, select a picture and click Insert. If the inserted picture is a different height and width, adjust the width and height. Under Picture Tools, on the Format tab, in the bottom right corner of the Size group, click the Size and Position dialog box launcher. In the Size and Position dialog box, on the Size tab, resize or crop the picture as needed so that under Size and rotate, the Height box is set to 2” and the Width box is set to 2.67”. Resize the picture under Size and rotate by entering values into the Height and Width boxes. Crop the picture under Crop from by entering values into the Left, Right, Top, and Bottom boxes. Repeat the process in steps 6-8 to create another duplicate picture, for a total of three pictures. Drag the pictures to form a row across the slide. Press and hold SHIFT and select all three pictures. On the Home tab, in the Drawing group, click Arrange, and then do the following: Point to Align, and then click Align to Slide. Point to Align, and then click Align Middle. Point to Align, and then click Distribute Horizontally. Click Group. On the Home tab, in the Drawing group, click Shape Effects, point to 3-D Rotation, and then under Perspective click Perspective Contrasting Left (second row, fourth option from the left). Drag the group to position it above the middle of the slide and also position it slightly to the left. To reproduce the background effects on this slide, do the following: Right-click the slide background area, and then click Format Background. In the Format Background dialog box, click Fill in the left pane, select Gradient fill in the Fill pane, and then do the following: In the Type list, select Linear. Click the button next to Direction, and then click Linear Down (first row, second option from the left). In the Angle text box, enter 90⁰. Under Gradient stops, click Add or Remove until two stops appear in the drop-down list. Also under Gradient stops, customize the gradient stops that you added as follows: Select Stop 1 from the list, and then do the following: In the Stop position box, enter 50%. Click the button next to Color, and then under Theme Colors click Black, Text 1, Lighter 5% (sixth row, second option from the left). Select Stop 2 from the list, and then do the following: In the Stop position box, enter 100%. Click the button next to Color, and then under Theme Colors click Dark Blue, Text 2, Lighter 40% (fourth row, fourth option from the left).
  3. Framed pictures in a row in perspective (Intermediate) To reproduce the picture effects on this slide, do the following: On the Home tab, in the Slides group, click Layout and then click Blank. On the Insert tab, in the Illustrations group, click Picture. In the Insert Picture dialog box, select a picture and then click Insert. Under Picture Tools, on the Format tab, in the bottom right corner of the Size group, click the Size and Position dialog box launcher. In the Size and Position dialog box, on the Size tab, resize or crop the picture as needed so that under Size and rotate, the Height box is set to 2” and the Width box is set to 2.67”. Resize the picture under Size and rotate by entering values into the Height and Width boxes. Crop the picture under Crop from by entering values into the Left, Right, Top, and Bottom boxes. Under Picture Tools, on the Format tab, in the Picture Styles group, click Reflected Beveled, Black. Select the picture. On the Home tab, in the Clipboard group, click the arrow under Paste, and then click Duplicate. Right-click the duplicate picture, and then click Change Picture. In the Insert Picture dialog box, select a picture and click Insert. If the inserted picture is a different height and width, adjust the width and height. Under Picture Tools, on the Format tab, in the bottom right corner of the Size group, click the Size and Position dialog box launcher. In the Size and Position dialog box, on the Size tab, resize or crop the picture as needed so that under Size and rotate, the Height box is set to 2” and the Width box is set to 2.67”. Resize the picture under Size and rotate by entering values into the Height and Width boxes. Crop the picture under Crop from by entering values into the Left, Right, Top, and Bottom boxes. Repeat the process in steps 6-8 to create another duplicate picture, for a total of three pictures. Drag the pictures to form a row across the slide. Press and hold SHIFT and select all three pictures. On the Home tab, in the Drawing group, click Arrange, and then do the following: Point to Align, and then click Align to Slide. Point to Align, and then click Align Middle. Point to Align, and then click Distribute Horizontally. Click Group. On the Home tab, in the Drawing group, click Shape Effects, point to 3-D Rotation, and then under Perspective click Perspective Contrasting Left (second row, fourth option from the left). Drag the group to position it above the middle of the slide and also position it slightly to the left. To reproduce the background effects on this slide, do the following: Right-click the slide background area, and then click Format Background. In the Format Background dialog box, click Fill in the left pane, select Gradient fill in the Fill pane, and then do the following: In the Type list, select Linear. Click the button next to Direction, and then click Linear Down (first row, second option from the left). In the Angle text box, enter 90⁰. Under Gradient stops, click Add or Remove until two stops appear in the drop-down list. Also under Gradient stops, customize the gradient stops that you added as follows: Select Stop 1 from the list, and then do the following: In the Stop position box, enter 50%. Click the button next to Color, and then under Theme Colors click Black, Text 1, Lighter 5% (sixth row, second option from the left). Select Stop 2 from the list, and then do the following: In the Stop position box, enter 100%. Click the button next to Color, and then under Theme Colors click Dark Blue, Text 2, Lighter 40% (fourth row, fourth option from the left).