The document discusses several types of computer threats from the past including the Code Red worm from 2001 that attacked Microsoft IIS web servers, the Love Bug virus from 2000 that spread through email attachments, and phishing schemes that attempt to steal personal information. It also defines positive biometric security systems that use unique physical attributes to control access and describes how antivirus software works by comparing files to known virus definitions.