SlideShare a Scribd company logo
Dangers of the Internet Essay
Dangers of the Internet
There are many pitfalls and perils on the Internet. Some of them are easy to avoid while other are not so obvious. Some of the Pitfalls and perils
are annoying, while others are deadly to your computer. Still others are humorous and entertaining. There are many dangers on the Internet. This
paper will try to cover some of them.
The biggest dangers of the Internet are virus. Viruses are small programs that "infect" computers. Most viruses are made to "steal" and or
"destroy" data stored on the infected computer. Viruses, that destroy data, write their code into afile and when that file is accessed it rewrites itself
in to more files until the virus corrupters or "infects" a file that the computer needs to run...show more content...
E–mailed Viruses are harder to avoid. Opening an attached file can trigger them or by touching the message that contains the attached file and
then the file menu bar of the E–mail program. (Email Hole Exposes Computers) The seconded way to start a virus is because of a hole in
Netscape's mail program and also MS's Outlook. A new way for Viruses to be spread by E
–mail is to put the whole code for the virus in the
subject line that way when the computer read the subject line it unwittingly activated the virus. The newest way for people to get viruses is
through the web pages. This is done by putting the virus code into a script on the web page, now when the page is accessed the viruses executes
the viruses code. (Virus Thrives on HTML) This can make a virus very prolific if a lot of people visit the web page.
Crackers use viruses for their destructive ways. Crackers are people who go out of their way to cause damage to other peoples systems
through the use of viruses and direct hacking. Crackers are not hackers. Calling a Cracker a hacker is like comparing a red delicious apple to a
golden delicious apple. Hackers are computer enthuses that hack, break in to, systems in order to learn about the system. Hackers as a rule do
not do any damage to the system. Crackers are the ones to give hackers bad repartitions. Crackers use virus
Get more content on HelpWriting.net

More Related Content

Similar to Dangers Of The Internet Essay

Internet security issues
Internet security issuesInternet security issues
Internet security issues
irfan shaikh
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100701982
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesadni_shadah
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
actanimation
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESHARSORA_SEJAL
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
AariyaRathi
 
Information security
Information securityInformation security
Information security
JAMEEL AHMED KHOSO
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 

Similar to Dangers Of The Internet Essay (20)

Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
Information security
Information securityInformation security
Information security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 

More from Dltk Custom Writing Paper Montreat

Social Acceptance Today
Social Acceptance TodaySocial Acceptance Today
Social Acceptance Today
Dltk Custom Writing Paper Montreat
 
Psychoanalytic Theory Research Paper
Psychoanalytic Theory Research PaperPsychoanalytic Theory Research Paper
Psychoanalytic Theory Research Paper
Dltk Custom Writing Paper Montreat
 
In The Skin Of A Lion Anaylsis Essay
In The Skin Of A Lion Anaylsis EssayIn The Skin Of A Lion Anaylsis Essay
In The Skin Of A Lion Anaylsis Essay
Dltk Custom Writing Paper Montreat
 
Persuasive Essay Outline For Euthanasia
Persuasive Essay Outline For EuthanasiaPersuasive Essay Outline For Euthanasia
Persuasive Essay Outline For Euthanasia
Dltk Custom Writing Paper Montreat
 
Brazil Essay
Brazil EssayBrazil Essay
American History X Thesis
American History X ThesisAmerican History X Thesis
American History X Thesis
Dltk Custom Writing Paper Montreat
 
Encountering Conflict
Encountering ConflictEncountering Conflict
Encountering Conflict
Dltk Custom Writing Paper Montreat
 
Peloponnesian War Research Paper
Peloponnesian War Research PaperPeloponnesian War Research Paper
Peloponnesian War Research Paper
Dltk Custom Writing Paper Montreat
 
Essay About Gender Identity
Essay About Gender IdentityEssay About Gender Identity
Essay About Gender Identity
Dltk Custom Writing Paper Montreat
 
How To Write A Year Round School Essay
How To Write A Year Round School EssayHow To Write A Year Round School Essay
How To Write A Year Round School Essay
Dltk Custom Writing Paper Montreat
 
Thesis About Homelessness
Thesis About HomelessnessThesis About Homelessness
Thesis About Homelessness
Dltk Custom Writing Paper Montreat
 
Learning Theory Behaviorism Essay Example
Learning Theory Behaviorism Essay ExampleLearning Theory Behaviorism Essay Example
Learning Theory Behaviorism Essay Example
Dltk Custom Writing Paper Montreat
 
Coke Vs. Pepsi
Coke Vs. PepsiCoke Vs. Pepsi
Electronic Media
Electronic MediaElectronic Media
Justice Is The End Of Government Essay
Justice Is The End Of Government EssayJustice Is The End Of Government Essay
Justice Is The End Of Government Essay
Dltk Custom Writing Paper Montreat
 

More from Dltk Custom Writing Paper Montreat (15)

Social Acceptance Today
Social Acceptance TodaySocial Acceptance Today
Social Acceptance Today
 
Psychoanalytic Theory Research Paper
Psychoanalytic Theory Research PaperPsychoanalytic Theory Research Paper
Psychoanalytic Theory Research Paper
 
In The Skin Of A Lion Anaylsis Essay
In The Skin Of A Lion Anaylsis EssayIn The Skin Of A Lion Anaylsis Essay
In The Skin Of A Lion Anaylsis Essay
 
Persuasive Essay Outline For Euthanasia
Persuasive Essay Outline For EuthanasiaPersuasive Essay Outline For Euthanasia
Persuasive Essay Outline For Euthanasia
 
Brazil Essay
Brazil EssayBrazil Essay
Brazil Essay
 
American History X Thesis
American History X ThesisAmerican History X Thesis
American History X Thesis
 
Encountering Conflict
Encountering ConflictEncountering Conflict
Encountering Conflict
 
Peloponnesian War Research Paper
Peloponnesian War Research PaperPeloponnesian War Research Paper
Peloponnesian War Research Paper
 
Essay About Gender Identity
Essay About Gender IdentityEssay About Gender Identity
Essay About Gender Identity
 
How To Write A Year Round School Essay
How To Write A Year Round School EssayHow To Write A Year Round School Essay
How To Write A Year Round School Essay
 
Thesis About Homelessness
Thesis About HomelessnessThesis About Homelessness
Thesis About Homelessness
 
Learning Theory Behaviorism Essay Example
Learning Theory Behaviorism Essay ExampleLearning Theory Behaviorism Essay Example
Learning Theory Behaviorism Essay Example
 
Coke Vs. Pepsi
Coke Vs. PepsiCoke Vs. Pepsi
Coke Vs. Pepsi
 
Electronic Media
Electronic MediaElectronic Media
Electronic Media
 
Justice Is The End Of Government Essay
Justice Is The End Of Government EssayJustice Is The End Of Government Essay
Justice Is The End Of Government Essay
 

Recently uploaded

STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

Dangers Of The Internet Essay

  • 1. Dangers of the Internet Essay Dangers of the Internet There are many pitfalls and perils on the Internet. Some of them are easy to avoid while other are not so obvious. Some of the Pitfalls and perils are annoying, while others are deadly to your computer. Still others are humorous and entertaining. There are many dangers on the Internet. This paper will try to cover some of them. The biggest dangers of the Internet are virus. Viruses are small programs that "infect" computers. Most viruses are made to "steal" and or "destroy" data stored on the infected computer. Viruses, that destroy data, write their code into afile and when that file is accessed it rewrites itself in to more files until the virus corrupters or "infects" a file that the computer needs to run...show more content... E–mailed Viruses are harder to avoid. Opening an attached file can trigger them or by touching the message that contains the attached file and then the file menu bar of the E–mail program. (Email Hole Exposes Computers) The seconded way to start a virus is because of a hole in Netscape's mail program and also MS's Outlook. A new way for Viruses to be spread by E –mail is to put the whole code for the virus in the subject line that way when the computer read the subject line it unwittingly activated the virus. The newest way for people to get viruses is through the web pages. This is done by putting the virus code into a script on the web page, now when the page is accessed the viruses executes the viruses code. (Virus Thrives on HTML) This can make a virus very prolific if a lot of people visit the web page. Crackers use viruses for their destructive ways. Crackers are people who go out of their way to cause damage to other peoples systems through the use of viruses and direct hacking. Crackers are not hackers. Calling a Cracker a hacker is like comparing a red delicious apple to a golden delicious apple. Hackers are computer enthuses that hack, break in to, systems in order to learn about the system. Hackers as a rule do not do any damage to the system. Crackers are the ones to give hackers bad repartitions. Crackers use virus Get more content on HelpWriting.net