SlideShare a Scribd company logo
1 of 11
SOME BASICS OF COMPUTER
SECURITY
How to Invulnerable Yourself from
Viruses, Hackers, and Cyber Thieves.
Virus infections can be a very serious impairment on computers and may
also cause damage to your business. A virus can destroy our system
registry or your whole computer. Due to the virus on the computer, the
speed of your computer's work slows down or the screen of our
computer gets stuck in the same program for a while. And after all, that,
if you press any key of your keyboard, your keyboard also stops working.
Your computer will not even be able to boot at all.
Methods to Protect computer from
viruses
Method 1:
- Always turn on the Firewall.
Method 2: -
Always run all the Necessary Service Packs (all windows, including all your programs
and software - keep them updated).
Method 3: -
Run your Anti-Virus daily. And do not always use Anti-Virus of Free. Cookie Free Anti-
Virus does not work much more in computers.
Method 4: -
Update your computer, Anti Spyware / Adware once a week. So that the speed of your
computer's work is right.
Method5: -
On pop up Blocker of your computer. It will stop that advertisements or fake messages
on your computer
Method 6: -
Whenever Any open mail that is suspicious to you or you do not know if they are in
your Bulk Mail. Then you can send this message back to your provider.
After clicking on these messages, you will be redirected to a different fake webpage
where you have to fill the information and hackers can take advantage of your
information.
Method 7: -
While using Messenger service, beware of files sent by Messenger. The virus is
checked in most Email Service. which detects that the file has a virus or not. So mostly
hackers use messenger instead.
Method 8: -
Be very careful while downloading a program from the Internet, while downloading it,
pay attention to the instructions. Downloading can sometimes cause a malfunction in
the system registry or the whole computer system.
What is a Bot and Botnet attack
and how it works?
Nowadays everyone knows the use of internet. Most people use the internet and
downloading from the internet, switching files, etc. If you do not take care when doing
all this work. So the computer comes in a virus infection. So that the computer's files
work oddly, it can crash the computer. A virus causes strange messages or popups to
your computer. Or it can also damage your computer's operating system.

More Related Content

What's hot

How to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PCHow to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PCAshok Albert
 
What makes a compter slow
What makes a compter slowWhat makes a compter slow
What makes a compter slowcrissy
 
How to remove malware from your windows computer
How to remove malware from your windows computerHow to remove malware from your windows computer
How to remove malware from your windows computerTechnetweb
 
How to update software on Mac
How to update software on MacHow to update software on Mac
How to update software on MacAsya Karapetyan
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Ted Whittemore
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 
Network security primer
Network security primerNetwork security primer
Network security primeraeroman7
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license keyHayWhitfield72
 
15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber AttacksThe eCore Group
 
Security protection
Security protectionSecurity protection
Security protectionARVINDR37
 
Renogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virusRenogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virusJames Smith
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Week 1 lesson 3 for Intro to Tech class
Week 1 lesson 3 for Intro to Tech classWeek 1 lesson 3 for Intro to Tech class
Week 1 lesson 3 for Intro to Tech classrdubroy
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog comIrisPhilme
 
Taking care of your computers
Taking care of your computersTaking care of your computers
Taking care of your computersJean Ulpindo
 
mitechmate review
mitechmate reviewmitechmate review
mitechmate reviewIna_Bass
 
Bit defender antivirus UML diagrams in software engineering
Bit defender antivirus UML diagrams in software engineeringBit defender antivirus UML diagrams in software engineering
Bit defender antivirus UML diagrams in software engineeringuow
 

What's hot (20)

How to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PCHow to Uninstall Display-error-alert.com from PC
How to Uninstall Display-error-alert.com from PC
 
Error 0x800ccc0f
Error 0x800ccc0fError 0x800ccc0f
Error 0x800ccc0f
 
What makes a compter slow
What makes a compter slowWhat makes a compter slow
What makes a compter slow
 
How to remove malware from your windows computer
How to remove malware from your windows computerHow to remove malware from your windows computer
How to remove malware from your windows computer
 
How to update software on Mac
How to update software on MacHow to update software on Mac
How to update software on Mac
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Network security primer
Network security primerNetwork security primer
Network security primer
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
 
15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks
 
Security protection
Security protectionSecurity protection
Security protection
 
Renogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virusRenogeek Signs your computer is infected with a virus
Renogeek Signs your computer is infected with a virus
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Read this
Read thisRead this
Read this
 
Week 1 lesson 3 for Intro to Tech class
Week 1 lesson 3 for Intro to Tech classWeek 1 lesson 3 for Intro to Tech class
Week 1 lesson 3 for Intro to Tech class
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog com
 
Taking care of your computers
Taking care of your computersTaking care of your computers
Taking care of your computers
 
mitechmate review
mitechmate reviewmitechmate review
mitechmate review
 
Bit defender antivirus UML diagrams in software engineering
Bit defender antivirus UML diagrams in software engineeringBit defender antivirus UML diagrams in software engineering
Bit defender antivirus UML diagrams in software engineering
 

Similar to Some basics of computer security

Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its preventiondavidmmc
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityTechvera
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 

Similar to Some basics of computer security (20)

Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer virus
Computer virus Computer virus
Computer virus
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its prevention
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
Sowmya
SowmyaSowmya
Sowmya
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Some basics of computer security

  • 1. SOME BASICS OF COMPUTER SECURITY How to Invulnerable Yourself from Viruses, Hackers, and Cyber Thieves.
  • 2. Virus infections can be a very serious impairment on computers and may also cause damage to your business. A virus can destroy our system registry or your whole computer. Due to the virus on the computer, the speed of your computer's work slows down or the screen of our computer gets stuck in the same program for a while. And after all, that, if you press any key of your keyboard, your keyboard also stops working. Your computer will not even be able to boot at all.
  • 3. Methods to Protect computer from viruses
  • 4. Method 1: - Always turn on the Firewall.
  • 5. Method 2: - Always run all the Necessary Service Packs (all windows, including all your programs and software - keep them updated).
  • 6. Method 3: - Run your Anti-Virus daily. And do not always use Anti-Virus of Free. Cookie Free Anti- Virus does not work much more in computers.
  • 7. Method 4: - Update your computer, Anti Spyware / Adware once a week. So that the speed of your computer's work is right. Method5: - On pop up Blocker of your computer. It will stop that advertisements or fake messages on your computer
  • 8. Method 6: - Whenever Any open mail that is suspicious to you or you do not know if they are in your Bulk Mail. Then you can send this message back to your provider. After clicking on these messages, you will be redirected to a different fake webpage where you have to fill the information and hackers can take advantage of your information.
  • 9. Method 7: - While using Messenger service, beware of files sent by Messenger. The virus is checked in most Email Service. which detects that the file has a virus or not. So mostly hackers use messenger instead.
  • 10. Method 8: - Be very careful while downloading a program from the Internet, while downloading it, pay attention to the instructions. Downloading can sometimes cause a malfunction in the system registry or the whole computer system.
  • 11. What is a Bot and Botnet attack and how it works? Nowadays everyone knows the use of internet. Most people use the internet and downloading from the internet, switching files, etc. If you do not take care when doing all this work. So the computer comes in a virus infection. So that the computer's files work oddly, it can crash the computer. A virus causes strange messages or popups to your computer. Or it can also damage your computer's operating system.