SlideShare a Scribd company logo
Malware, Spam and Spyware
 A computer virus is a malicious software
program designed to do damage to your
computer system by deleting files or even
taking over your computer to launch attacks
on other systems.
 Many computer attacks today are executed
using computers compromised by a computer
virus.
 You might see strange messages or graphics
displayed on your computer screen or find
that normally operated programs are acting
erratically.
 You might notice that files have gone missing
 Your computer is sluggish or slow
 Computer might fail to start up
 There are many ways you can share data and
transmit a virus online
1. Opening an infected file attached to an
email message
2. Launching an infected program file
downloaded from the internet
3. Sharing a USB memory drive or data CD
that contains an infected file
 Whenever you open a file attached to an
email or instant message, you stand a good
chance of infecting your computer
Protecting Your PC or Laptop
Protecting Your PC or Laptop
Protecting Your PC or Laptop
Protecting Your PC or Laptop

More Related Content

What's hot

Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyanko
Sergiy Sydoriv
 
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer viruses
UltraUploader
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
BikashPayeng
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Computer virus
Computer virusComputer virus
Virus
VirusVirus
Virus
CHITRA S
 
P7 unit 3
P7 unit 3 P7 unit 3
P7 unit 3
lukecisco1
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
Sheikh Amjad Zia
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
Anthony Alinsod
 
Computer Security
Computer SecurityComputer Security
Computer Security
secrettub
 
Computer
ComputerComputer
Computer
faisalbhatti
 
Virus in computer via Internet by Sundas ilyas Kiani
Virus in computer via Internet  by Sundas ilyas KianiVirus in computer via Internet  by Sundas ilyas Kiani
Virus in computer via Internet by Sundas ilyas Kiani
Sundas Kayani
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
Zoaib Mirza
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
Rozell Sneede
 
Network Security
Network SecurityNetwork Security
Network Security
English TVTC
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
jenniel143
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
guest7b2ba1
 
Computer virus
Computer virus Computer virus
Computer virus
WILLIAN PALOMINO
 

What's hot (20)

Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyanko
 
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer viruses
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
 
Internet security
Internet securityInternet security
Internet security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
P7 unit 3
P7 unit 3 P7 unit 3
P7 unit 3
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer
ComputerComputer
Computer
 
Virus in computer via Internet by Sundas ilyas Kiani
Virus in computer via Internet  by Sundas ilyas KianiVirus in computer via Internet  by Sundas ilyas Kiani
Virus in computer via Internet by Sundas ilyas Kiani
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Network Security
Network SecurityNetwork Security
Network Security
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Computer virus
Computer virus Computer virus
Computer virus
 

Viewers also liked

All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
Kriti kohli
 
Malwares
MalwaresMalwares
Malwares
Papun Papun
 
Microsoft Security Intelligence Report Volume 11
Microsoft Security Intelligence Report Volume 11Microsoft Security Intelligence Report Volume 11
Microsoft Security Intelligence Report Volume 11
MSFTSIR
 
Malicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usageMalicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usage
Love Steven
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
gofortution
 
Compiling Malware Features
Compiling Malware FeaturesCompiling Malware Features
Compiling Malware Features
Muhammad Najmi Ahmad Zabidi
 
Network Security
Network SecurityNetwork Security
Network Security
SOBXTECH
 
Malware
MalwareMalware
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
himeag
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
Hamza Muhammad
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
rajakhurram
 
Integrating SEO & PPC Search Marketing
Integrating SEO & PPC Search MarketingIntegrating SEO & PPC Search Marketing
Integrating SEO & PPC Search Marketing
Daniel Riveong
 
Malicious software
Malicious softwareMalicious software
Malicious software
rajakhurram
 
Malicious software
Malicious softwareMalicious software
Malicious software
msdeepika
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
rajakhurram
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
52 Types of Marketing Strategies
52 Types of Marketing Strategies52 Types of Marketing Strategies
52 Types of Marketing Strategies
The Cult Branding Company
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into Marketing
Ed Fry
 

Viewers also liked (19)

All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Malwares
MalwaresMalwares
Malwares
 
Microsoft Security Intelligence Report Volume 11
Microsoft Security Intelligence Report Volume 11Microsoft Security Intelligence Report Volume 11
Microsoft Security Intelligence Report Volume 11
 
Malicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usageMalicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usage
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Compiling Malware Features
Compiling Malware FeaturesCompiling Malware Features
Compiling Malware Features
 
Network Security
Network SecurityNetwork Security
Network Security
 
Malware
MalwareMalware
Malware
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Integrating SEO & PPC Search Marketing
Integrating SEO & PPC Search MarketingIntegrating SEO & PPC Search Marketing
Integrating SEO & PPC Search Marketing
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
52 Types of Marketing Strategies
52 Types of Marketing Strategies52 Types of Marketing Strategies
52 Types of Marketing Strategies
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into Marketing
 

Similar to Protecting Your PC or Laptop

Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
Dom Mike
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
Shwana M
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Computer virus
Computer virusComputer virus
Computer virus
kiran_a_c
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
fidel barrios
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
Sarhad Baez
 
Viruses
VirusesViruses
Viruses
Shahidaffridi
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Amirah Husna
 
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptx
GovandJamal
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 
M
MM
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
cheauyih
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed
 

Similar to Protecting Your PC or Laptop (20)

Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Viruses
VirusesViruses
Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
M
MM
M
 
Virus project
Virus projectVirus project
Virus project
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 

Protecting Your PC or Laptop

  • 2.  A computer virus is a malicious software program designed to do damage to your computer system by deleting files or even taking over your computer to launch attacks on other systems.
  • 3.  Many computer attacks today are executed using computers compromised by a computer virus.
  • 4.  You might see strange messages or graphics displayed on your computer screen or find that normally operated programs are acting erratically.  You might notice that files have gone missing  Your computer is sluggish or slow  Computer might fail to start up
  • 5.  There are many ways you can share data and transmit a virus online 1. Opening an infected file attached to an email message 2. Launching an infected program file downloaded from the internet 3. Sharing a USB memory drive or data CD that contains an infected file
  • 6.  Whenever you open a file attached to an email or instant message, you stand a good chance of infecting your computer