SlideShare a Scribd company logo
Computer viruses and its prevention
We are using computer from a long time. After a while, now we are familiar with word virus. A virus is a
part of malware which is created to damage the computers or hacking the confidential passwords from
your pc. We can find hundreds of thousand threats every day and some of them are very new which
can’t be identified with us. We don’t notice them but they are affecting our day to day useful items such
as smart phones, computer or eve internet. To prevent our computer from such threats we install some
security software’s on our computer. Their work is to warn us about that type of suspicious page, if
there, or even the attachment from email which can be affecting your computer.
From next paragraph, we tell you about the heavy damages of computer because of this virus, and what
type of this threat are, but before that lets understand how much they are.
The experts recommend that there are 5 Top computer viruses for all time. Now let us understand
them.
1. The mydoom virus- the win32.Mydoom.A or Worm popularly known as Mydoom virus is very
high level computer damaging virus that can affect Microsoft windows based computers. It is
able to spread through mass emailing, disguised as badly sent email. This virus was created with
the intention of damage computer with the help of attachment in an email. It was created at
year 2004 and approximately 2,000,000 pcs got infected. It shows the damage of
$38,000,000,000 and can be spread with the speed of 2 hours.
2. The sobig.f- This worm is very badly known for damage of millions of Internet connected,
Microsoft windows computers. It is just not only the computer worm but also a trojanhorse
which is more than a malware. It comes with an electronic mail with the following subjects:
a. That can be seen as Re: Approved
b. Also Re: Details
c. Or Re: Re: My details
d. Re: Thank you!
e. Re: That movie
f. Re: Wicked screensaver
g. Re: Your application
h. Thank you!
i. Than it can ask Your details
It was created at year 2003 and damaged almost 2,000,000 pcs. With the damage of $
37,100,000,000 it can spread with the speed of 96 hours.
3. The ILOVEYOU virus- Love bug or love letter popularly known as ILOVEYOU virus is a
computer threat which is very badly named that it attacked 10 of millions windows personnel
computers. It was created at year 2000 and damaged 500,000 computers. Making a loss of
$15,000,000,000 it can spread with speed of 9 hours.
4. Code Red worm- It is a computer worm cause the damage of computers. It was created at
year 2001 with damage of 1,000,000 pcs. It made the loss of $2,600,000,000 and can be
spread with the speed of 14 hours.
5. SQL Slammer- This virus also known as computer worm that take blame for denial of
service on some Internet hosts and dramatically make slow the general Internet traffic. With
the damage of 200,000 computers it made the loss of $1,200,000,000 and can be spread at
the speed of 10 minutes and it was created at year 2003.
The modern users like us is aware of that type of viruse and always be ready to protect our pcs from
such viruses. If you want the same then you should follow some basic steps:
 You should keep your operating system and software up to date. Apply the updates and patches
as soon as they’re released by the maker of the OS or a software product from google or other.
 Stop to rush your emails, but always check if a message has come from somebody you know or
don’t, pay attention to its content, and think twice before you open or save an attachment. The
tricky part is that even if you know the sender, it may be a virus that has misused your friend’s
address book, and sent you an infected message as example.
 Complement your computer and online security awareness with a security software with a good
example of Norton Security or alike.
To learn more about how computer viruses
Call us toll free: 1-866-300-4877
Website link: https://techysupport.co/

More Related Content

What's hot

Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
fidel barrios
 
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9robsworld
 
Virus
VirusVirus
Virus
CHITRA S
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Computer virus
Computer virus Computer virus
Computer virus
WILLIAN PALOMINO
 
computer virus
computer viruscomputer virus
computer virus
Kunal Yadav
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
smeech
 
Adware
AdwareAdware
Adware
Avani Patel
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
Mahamudul Hassan Niaz
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
jangezkhan
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
Sheikh Amjad Zia
 
What types of viruses can affect your computer
What types of viruses can affect your computerWhat types of viruses can affect your computer
What types of viruses can affect your computer
AGR Technologies
 

What's hot (20)

Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Malware
MalwareMalware
Malware
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
 
Virus
VirusVirus
Virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer virus
Computer virus Computer virus
Computer virus
 
computer virus
computer viruscomputer virus
computer virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Adware
AdwareAdware
Adware
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Sowmya
SowmyaSowmya
Sowmya
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
What types of viruses can affect your computer
What types of viruses can affect your computerWhat types of viruses can affect your computer
What types of viruses can affect your computer
 

Similar to Computer viruses and its prevention

computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
PritamSahoo16
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
EdwinGervacio2
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
Ammar Hasayen
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingmentcheauyih
 
IT viruses
 IT viruses IT viruses
IT viruses
Hekmat Asefi
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 

Similar to Computer viruses and its prevention (20)

computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
virus
virusvirus
virus
 
M
MM
M
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Recently uploaded

假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 

Recently uploaded (20)

假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 

Computer viruses and its prevention

  • 1. Computer viruses and its prevention We are using computer from a long time. After a while, now we are familiar with word virus. A virus is a part of malware which is created to damage the computers or hacking the confidential passwords from your pc. We can find hundreds of thousand threats every day and some of them are very new which can’t be identified with us. We don’t notice them but they are affecting our day to day useful items such as smart phones, computer or eve internet. To prevent our computer from such threats we install some security software’s on our computer. Their work is to warn us about that type of suspicious page, if there, or even the attachment from email which can be affecting your computer. From next paragraph, we tell you about the heavy damages of computer because of this virus, and what type of this threat are, but before that lets understand how much they are. The experts recommend that there are 5 Top computer viruses for all time. Now let us understand them. 1. The mydoom virus- the win32.Mydoom.A or Worm popularly known as Mydoom virus is very high level computer damaging virus that can affect Microsoft windows based computers. It is able to spread through mass emailing, disguised as badly sent email. This virus was created with the intention of damage computer with the help of attachment in an email. It was created at year 2004 and approximately 2,000,000 pcs got infected. It shows the damage of $38,000,000,000 and can be spread with the speed of 2 hours. 2. The sobig.f- This worm is very badly known for damage of millions of Internet connected, Microsoft windows computers. It is just not only the computer worm but also a trojanhorse which is more than a malware. It comes with an electronic mail with the following subjects: a. That can be seen as Re: Approved b. Also Re: Details c. Or Re: Re: My details d. Re: Thank you! e. Re: That movie f. Re: Wicked screensaver g. Re: Your application h. Thank you! i. Than it can ask Your details It was created at year 2003 and damaged almost 2,000,000 pcs. With the damage of $ 37,100,000,000 it can spread with the speed of 96 hours. 3. The ILOVEYOU virus- Love bug or love letter popularly known as ILOVEYOU virus is a computer threat which is very badly named that it attacked 10 of millions windows personnel computers. It was created at year 2000 and damaged 500,000 computers. Making a loss of $15,000,000,000 it can spread with speed of 9 hours.
  • 2. 4. Code Red worm- It is a computer worm cause the damage of computers. It was created at year 2001 with damage of 1,000,000 pcs. It made the loss of $2,600,000,000 and can be spread with the speed of 14 hours. 5. SQL Slammer- This virus also known as computer worm that take blame for denial of service on some Internet hosts and dramatically make slow the general Internet traffic. With the damage of 200,000 computers it made the loss of $1,200,000,000 and can be spread at the speed of 10 minutes and it was created at year 2003. The modern users like us is aware of that type of viruse and always be ready to protect our pcs from such viruses. If you want the same then you should follow some basic steps:  You should keep your operating system and software up to date. Apply the updates and patches as soon as they’re released by the maker of the OS or a software product from google or other.  Stop to rush your emails, but always check if a message has come from somebody you know or don’t, pay attention to its content, and think twice before you open or save an attachment. The tricky part is that even if you know the sender, it may be a virus that has misused your friend’s address book, and sent you an infected message as example.  Complement your computer and online security awareness with a security software with a good example of Norton Security or alike. To learn more about how computer viruses Call us toll free: 1-866-300-4877 Website link: https://techysupport.co/