Embed presentation
Downloaded 35 times






The document discusses how malware infiltrates computers through piggybacking, tricking users into installation, and pop-up ads. It lists signs of infection as unwanted behavior, disk usage, and network traffic and effects as freezing, boot failure, and crashes. The document identifies top malware like Huntbar, Cool Web Search, and Internet Optimizer and recommends tools to counter attacks such as Ad-Aware SE, Spybot-Search & Destroy, Anti-Spyware, and Windows Defender.





