SlideShare a Scribd company logo
1 of 28
KAPASAKALIS SPIROS









Introduction.
Threats to watch out for.
Signs that you are corrupted.
How to bar them if you have been corrupted.
How not to get corrupted in your every day
access to the pc.
Conclusion.
How to keep your computer running smoothly.
INDEX





If you own a computer that has access to the
Internet and e-mail, then it is certain that you will
be a victim to malicious
spyware, malware, viruses, worms, or hackers.
Every day thousands of users report problems
with their computer and are wasting money
trying to fix the issue not knowing that they can
do it alone, safely and freely.
The information in this Guide will not only
educate you as to why you are experiencing these
problems, but also what you have to do in order
to avoid experiencing these problems.
INDEX





Spyware
Malware
Hackers
INDEX





Spyware is Internet jargon for hidden programs
advertisers install on your PC without your
permission to spy on you, gather information, and
report this information about you and your online
activities to some outside person.
Spyware is not harmless, it can be responsible for
delivering a boatload of spam, altering your web
browser, slowing down your PC, and serving up a
bounty of pop-up ads. In some of the more
extreme cases, spyware can also steal your
identity, passwords, e-mail address book, and
even use your PC for illegal activities.
INDEX





Malware is short for malicious software and represents all
programs, viruses, Trojans, and worms that have malicious
intent to damage or disrupt a system. Malware is harder to
remove and will fight back when you try to clean it from
your system. In some extreme cases, you will have to
completely wipe out all the information on the computers
hard disk and re-install the operating system.
Among other things, a malware infection can corrupt your
files, alter or delete data, distribute confidential information
such as bank accounts, credit cards, and other personal
data, disable hardware, prevent you from using your
computer, and cause a hard drive to crash.
Frequently, malware is also designed to send itself from
your e-mail account to all the friends and colleagues in your
address book without your knowledge or consent.
INDEX





Hackers are computer programmers turned evil.
They are the people who design the spyware and
malware programs that attack your computer.
Some of them have criminal intent and use these
programs to steal money from individuals and
companies. Some have a grudge against the big
software vendors (like Microsoft) and seek to harm
them by attacking their customers (you). Others do
it purely for fun. Whatever the reason, hackers are
getting more intelligent and sophisticated in their
ability to access computer systems and networks.
INDEX










You are starting to get swamped with pop-up ads
that come from nowhere and continiously
interrupt your use of the computer.
Your computer is unstable, sluggish, locks up,
crashes or deletes files on its own frequently.
Your web browser’s home page changes on its
own and you cannot modify the settings. Also you
might see some toolbars that you never installed.
Mysterious files suddenly appear.
A second or a third we browser is popping up
when u open your browser instantly and you can’t
prevent it.




Method:1 Scanning
Method:2 System Restore
Method:3 Clean Install

INDEX
INDEX







There are thousands of different programs out there in
the anti-spyware/malware/virus, many of which are
free. The most important thing to remember is that
these programs will not find and remove the same
viruses and not of them are 100% sure to delete all of
them.
Imagine yourself scanning your computer and finding
viruses, then you try and remove them with your antivirus program. But your computer is still suffering
from them and you are forced to scan with another
program, which enables you to find more of them.
However, you do not want to stack tons of virus
removal programs on top of each other. Doing so can
actually throw off effectiveness. One good antivirus
scanner should be enough.








System restores are a good way to get rid of light malware
and spyware programs. They require no downloading of
any software and can be performed directly by Windows.
System restores work best if you catch the intrusion right
away. But, you do not want to do a system restore if you
believe that you have had malware, spyware, or viruses on
your computer for any significant amount of time.
This could cause you to lose files, applications, or data. To
do a system restore in Windows, navigate to the control
panel using the path Start > Control Panel. Click
the Recovery icon located within the Control Panel and hit
the Open System Restore button on the next screen.
The rest of the process is very straightforward as the
Windows Wizard will guide your through it.
INDEX




A clean install is not the most fun thing to do.
However, a clean install is the one guaranteed way
to get rid of viruses, spyware, and malware. It’s
simple… when you do a clean install, you are
deleting everything on your hard drive. Thus, no
more viruses.
Most of the time, viruses will not infect items like
pictures, text documents, videos, or MP3 files. If
step 2 (scan), is not working for you, more than
likely the virus is in your computer’s registry. This
is good because you can backup all of your
pictures, documents, etc… before doing the clean
install. That way you will not lose anything
important.

INDEX






Step 1
Step 2
Step 3
Step 4
Step 5

INDEX
BACK





Keep an up-to-date anti-virus software running
at all times.
This is one of the most if not THE most
important thing to do, because you will need it
to scan for viruses and be able to remove them.
BACK




PREVIOUS

Don’t use internet explorer anymore.
Just recently, hackers have figured out a way to
access and download malicious programs to
your computer by using a security hole in
Internet Explorer. What is extraordinary about
this is that you don’t even have to click on
anything or download a program to get
infected. You are especially vulnerable if you
have an older version of Windows such as
Windows 98.
BACK



PREVIOUS

Don't allow your web browser to
automatically run programs, such as MS Word
or other programs through its e-mail program.
Configure it to launch other programs such as
NotePad or WordPad instead. This way the
macro virus won’t spread on your computer.
Therefore it is something you definitely want
to do.
BACK




PREVIOUS

Never open suspicious e-mails.
Most of the viruses are attached to an e-mail, so
if you see one delete it immediately.
BACK





PREVIOUS

Stop using peer to peer file sharing and don’t
ever download programs that look nice.
Think of it like cyber candy. Hackers use these
cute and funny programs as bait in order to get
you to download their destructive programs.
These are guaranteed ways of getting hit by
malicious viruses, spyware, and malware.
Also, peer to peer file sharing sites are mine
fields of malicious programs. Don’t ever think
of accessing those sites or download the
programs that runs them.
INDEX





All in all computer viruses are a very common
enemy on our every day life but we can
prevent them from reaching us or remove them
if we have already been corrupted.
There are many different things we can do
about it but the core procedure is in this
guide, but if what is written here doesn’t work
for you then the best thing you can do before
asking an expert is search in the
internet, because there you can find all the
answers you need.
INDEX







Step 1
Step 2
Step 3
Step 4
Step 5
BACK




Do a clean up every month.
This is very important, because there are many
files that fill your hard disk and if they become
superfluous then they will slow down your
computer.
BACK




PREVIOUS

Defragment the hard drive.
Defragmenting your hard drive makes it easier
for your computer to complete actions in a
faster way.
BACK




PREVIOUS

Uninstall the programs you don’t use.
It is just silly to keep programs you don’t use in
your computer because they fill your hard
drive and make your computer slower.
BACK




PREVIOUS

Delete cookies from the browsers.
Clear your cache after you sign off. These files
are just unnecessary, take up memory, and can
allow spyware to invade your computer.
BACK




PREVIOUS

Format.
If nothing else works you should really
consider formating your computer, but before
you do it make sure you have already backed
up your files.

More Related Content

What's hot

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureUltraUploader
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentationamy.covington215944
 
Signs your PC has a Virus
Signs your PC has a VirusSigns your PC has a Virus
Signs your PC has a Virustechexpert2345
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
How to remove malware from your windows computer
How to remove malware from your windows computerHow to remove malware from your windows computer
How to remove malware from your windows computerTechnetweb
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robertrobsworld
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Akhil Sharma
 

What's hot (19)

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Spyware
SpywareSpyware
Spyware
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
 
Spyware
SpywareSpyware
Spyware
 
spyware
spywarespyware
spyware
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
Signs your PC has a Virus
Signs your PC has a VirusSigns your PC has a Virus
Signs your PC has a Virus
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
How to remove malware from your windows computer
How to remove malware from your windows computerHow to remove malware from your windows computer
How to remove malware from your windows computer
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robert
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
Presentation
PresentationPresentation
Presentation
 
Spyware
SpywareSpyware
Spyware
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 

Viewers also liked

งานนำเสนอ1 วิชา IS
งานนำเสนอ1 วิชา ISงานนำเสนอ1 วิชา IS
งานนำเสนอ1 วิชา ISKanyapak Thongsuk
 
Computerized grading system chapter 4 5
Computerized grading system chapter 4 5Computerized grading system chapter 4 5
Computerized grading system chapter 4 5Chriselle24
 
Online Shopping Cart
Online Shopping CartOnline Shopping Cart
Online Shopping CartVishal Chavan
 
Presentacion
PresentacionPresentacion
Presentacionflory2014
 
Bible Verses About Grace
Bible Verses About GraceBible Verses About Grace
Bible Verses About GraceCal Staggers
 
Assistive technology
Assistive technologyAssistive technology
Assistive technologyApril Hodges
 
Cal Staggers Cool Boats
Cal Staggers Cool BoatsCal Staggers Cool Boats
Cal Staggers Cool BoatsCal Staggers
 
カタカナの練習
カタカナの練習カタカナの練習
カタカナの練習Shiro Sakuma
 
одуванчики Галушко
одуванчики Галушкоодуванчики Галушко
одуванчики Галушкоozimovska
 
U.S. Top Traffic Cities
U.S. Top Traffic Cities U.S. Top Traffic Cities
U.S. Top Traffic Cities INRIX
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetVishal Chavan
 
операційні системи
операційні системиопераційні системи
операційні системиanonim555
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1Kanyapak Thongsuk
 

Viewers also liked (19)

งานนำเสนอ1 วิชา IS
งานนำเสนอ1 วิชา ISงานนำเสนอ1 วิชา IS
งานนำเสนอ1 วิชา IS
 
Veg choice-menu-diamond a4
Veg choice-menu-diamond a4Veg choice-menu-diamond a4
Veg choice-menu-diamond a4
 
Computerized grading system chapter 4 5
Computerized grading system chapter 4 5Computerized grading system chapter 4 5
Computerized grading system chapter 4 5
 
Online Shopping Cart
Online Shopping CartOnline Shopping Cart
Online Shopping Cart
 
Presentacion
PresentacionPresentacion
Presentacion
 
Hk
HkHk
Hk
 
Bible Verses About Grace
Bible Verses About GraceBible Verses About Grace
Bible Verses About Grace
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
 
Cal Staggers Cool Boats
Cal Staggers Cool BoatsCal Staggers Cool Boats
Cal Staggers Cool Boats
 
カタカナの練習
カタカナの練習カタカナの練習
カタカナの練習
 
одуванчики Галушко
одуванчики Галушкоодуванчики Галушко
одуванчики Галушко
 
U.S. Top Traffic Cities
U.S. Top Traffic Cities U.S. Top Traffic Cities
U.S. Top Traffic Cities
 
Bab 1
Bab 1Bab 1
Bab 1
 
Spice Tour
Spice TourSpice Tour
Spice Tour
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
операційні системи
операційні системиопераційні системи
операційні системи
 
RLAS116 test
RLAS116 testRLAS116 test
RLAS116 test
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1
 
ILANTUS Password Express FAQs
ILANTUS Password Express FAQsILANTUS Password Express FAQs
ILANTUS Password Express FAQs
 

Similar to How to protect your computer from viruses.

Similar to How to protect your computer from viruses. (20)

Sowmya
SowmyaSowmya
Sowmya
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Virus
VirusVirus
Virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
 
Antivirus
AntivirusAntivirus
Antivirus
 
How to prevent a laptop crash
How to prevent a laptop crashHow to prevent a laptop crash
How to prevent a laptop crash
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

How to protect your computer from viruses.

  • 2.        Introduction. Threats to watch out for. Signs that you are corrupted. How to bar them if you have been corrupted. How not to get corrupted in your every day access to the pc. Conclusion. How to keep your computer running smoothly.
  • 3. INDEX   If you own a computer that has access to the Internet and e-mail, then it is certain that you will be a victim to malicious spyware, malware, viruses, worms, or hackers. Every day thousands of users report problems with their computer and are wasting money trying to fix the issue not knowing that they can do it alone, safely and freely. The information in this Guide will not only educate you as to why you are experiencing these problems, but also what you have to do in order to avoid experiencing these problems.
  • 5. INDEX   Spyware is Internet jargon for hidden programs advertisers install on your PC without your permission to spy on you, gather information, and report this information about you and your online activities to some outside person. Spyware is not harmless, it can be responsible for delivering a boatload of spam, altering your web browser, slowing down your PC, and serving up a bounty of pop-up ads. In some of the more extreme cases, spyware can also steal your identity, passwords, e-mail address book, and even use your PC for illegal activities.
  • 6. INDEX   Malware is short for malicious software and represents all programs, viruses, Trojans, and worms that have malicious intent to damage or disrupt a system. Malware is harder to remove and will fight back when you try to clean it from your system. In some extreme cases, you will have to completely wipe out all the information on the computers hard disk and re-install the operating system. Among other things, a malware infection can corrupt your files, alter or delete data, distribute confidential information such as bank accounts, credit cards, and other personal data, disable hardware, prevent you from using your computer, and cause a hard drive to crash. Frequently, malware is also designed to send itself from your e-mail account to all the friends and colleagues in your address book without your knowledge or consent.
  • 7. INDEX   Hackers are computer programmers turned evil. They are the people who design the spyware and malware programs that attack your computer. Some of them have criminal intent and use these programs to steal money from individuals and companies. Some have a grudge against the big software vendors (like Microsoft) and seek to harm them by attacking their customers (you). Others do it purely for fun. Whatever the reason, hackers are getting more intelligent and sophisticated in their ability to access computer systems and networks.
  • 8. INDEX      You are starting to get swamped with pop-up ads that come from nowhere and continiously interrupt your use of the computer. Your computer is unstable, sluggish, locks up, crashes or deletes files on its own frequently. Your web browser’s home page changes on its own and you cannot modify the settings. Also you might see some toolbars that you never installed. Mysterious files suddenly appear. A second or a third we browser is popping up when u open your browser instantly and you can’t prevent it.
  • 9.    Method:1 Scanning Method:2 System Restore Method:3 Clean Install INDEX
  • 10. INDEX    There are thousands of different programs out there in the anti-spyware/malware/virus, many of which are free. The most important thing to remember is that these programs will not find and remove the same viruses and not of them are 100% sure to delete all of them. Imagine yourself scanning your computer and finding viruses, then you try and remove them with your antivirus program. But your computer is still suffering from them and you are forced to scan with another program, which enables you to find more of them. However, you do not want to stack tons of virus removal programs on top of each other. Doing so can actually throw off effectiveness. One good antivirus scanner should be enough.
  • 11.
  • 12.     System restores are a good way to get rid of light malware and spyware programs. They require no downloading of any software and can be performed directly by Windows. System restores work best if you catch the intrusion right away. But, you do not want to do a system restore if you believe that you have had malware, spyware, or viruses on your computer for any significant amount of time. This could cause you to lose files, applications, or data. To do a system restore in Windows, navigate to the control panel using the path Start > Control Panel. Click the Recovery icon located within the Control Panel and hit the Open System Restore button on the next screen. The rest of the process is very straightforward as the Windows Wizard will guide your through it. INDEX
  • 13.
  • 14.   A clean install is not the most fun thing to do. However, a clean install is the one guaranteed way to get rid of viruses, spyware, and malware. It’s simple… when you do a clean install, you are deleting everything on your hard drive. Thus, no more viruses. Most of the time, viruses will not infect items like pictures, text documents, videos, or MP3 files. If step 2 (scan), is not working for you, more than likely the virus is in your computer’s registry. This is good because you can backup all of your pictures, documents, etc… before doing the clean install. That way you will not lose anything important. INDEX
  • 15.
  • 16.      Step 1 Step 2 Step 3 Step 4 Step 5 INDEX
  • 17. BACK   Keep an up-to-date anti-virus software running at all times. This is one of the most if not THE most important thing to do, because you will need it to scan for viruses and be able to remove them.
  • 18. BACK   PREVIOUS Don’t use internet explorer anymore. Just recently, hackers have figured out a way to access and download malicious programs to your computer by using a security hole in Internet Explorer. What is extraordinary about this is that you don’t even have to click on anything or download a program to get infected. You are especially vulnerable if you have an older version of Windows such as Windows 98.
  • 19. BACK  PREVIOUS Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. Configure it to launch other programs such as NotePad or WordPad instead. This way the macro virus won’t spread on your computer. Therefore it is something you definitely want to do.
  • 20. BACK   PREVIOUS Never open suspicious e-mails. Most of the viruses are attached to an e-mail, so if you see one delete it immediately.
  • 21. BACK   PREVIOUS Stop using peer to peer file sharing and don’t ever download programs that look nice. Think of it like cyber candy. Hackers use these cute and funny programs as bait in order to get you to download their destructive programs. These are guaranteed ways of getting hit by malicious viruses, spyware, and malware. Also, peer to peer file sharing sites are mine fields of malicious programs. Don’t ever think of accessing those sites or download the programs that runs them.
  • 22. INDEX   All in all computer viruses are a very common enemy on our every day life but we can prevent them from reaching us or remove them if we have already been corrupted. There are many different things we can do about it but the core procedure is in this guide, but if what is written here doesn’t work for you then the best thing you can do before asking an expert is search in the internet, because there you can find all the answers you need.
  • 24. BACK   Do a clean up every month. This is very important, because there are many files that fill your hard disk and if they become superfluous then they will slow down your computer.
  • 25. BACK   PREVIOUS Defragment the hard drive. Defragmenting your hard drive makes it easier for your computer to complete actions in a faster way.
  • 26. BACK   PREVIOUS Uninstall the programs you don’t use. It is just silly to keep programs you don’t use in your computer because they fill your hard drive and make your computer slower.
  • 27. BACK   PREVIOUS Delete cookies from the browsers. Clear your cache after you sign off. These files are just unnecessary, take up memory, and can allow spyware to invade your computer.
  • 28. BACK   PREVIOUS Format. If nothing else works you should really consider formating your computer, but before you do it make sure you have already backed up your files.