SlideShare a Scribd company logo
Avoiding Viruses, Spyware, Adware & Other Malware The Malware Menace…
What’s a computer virus? A virus is a small piece of software that piggybacks on real programs and does something you didn’t intend it to do. Spread easily and quickly via Email Flash drive Documents/files on network Browser/Internet Most common ones are “worms”
What is spyware? Like a virus but it monitors your actions and uses them against you later Personal info Passwords Account info Identity theft
Adware & Trojans Programs that tell you they do one thing and do another Koobface virus Popup ads Fake antivirus scans
What protection do we have? Common sense!
Avoiding Malware on Your Nobi Avoid “mindless surfing” on the Internet Don’t click on anything unless you KNOW what it is. Don’t use filesharing applications or websites. Don’t share flash drives. Don’t install software. Don’t open emails, especially attachments, from strangers. Run Panda & Windows defender scans (quick – weekly, full – monthly).
Avoiding Malware on Your Nobi Keep pop-up blocker turned on in any browser Always click the red “x” in the upper right corner.  The “cancel” or “close” button in the pop-up might have unintended effects. Force quit (alt F4 or ctrl alt del  Task manager  application) if something suspicious pops up. If you get a message from your computer warning you that it is infected and you need to download software to remove the virus, don’t do it.  Don’t mess w/security settings on ANY application. If you use sites like Facebook: Don’t install applications on pages. Don’t click on links, images, or videos

More Related Content

What's hot

Virus
VirusVirus
Virus
CHITRA S
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Gisha Mathyari
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Adware
AdwareAdware
Adware
Avani Patel
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Aakash Baloch
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIROTakagi Kun
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
CAS
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Malwares
MalwaresMalwares
Malwares
Claire Medolla
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
Sourav Verma
 
The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security Landscape
Peter Wood
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
Fersie Ann Malacas
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
cnbweg45
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
Rahman_Hussain
 

What's hot (20)

Virus
VirusVirus
Virus
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
MALWARE
MALWAREMALWARE
MALWARE
 
Adware
AdwareAdware
Adware
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIRO
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Malwares
MalwaresMalwares
Malwares
 
Spyware
SpywareSpyware
Spyware
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security Landscape
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 

Similar to The Malware Menace

Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
jgswift
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
Sheikh Amjad Zia
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
Anthony Alinsod
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Ahad Rahaman
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
Malwarebytes coupon code
 
Virus
VirusVirus
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spywareRozell Sneede
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapperaschnapper
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Malware
MalwareMalware
Malware
HHSome
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
Shwana M
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
rubal_9
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of Computers
GronHatchat
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
GronHatchat
 

Similar to The Malware Menace (20)

Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
Virus
VirusVirus
Virus
 
Sowmya
SowmyaSowmya
Sowmya
 
Computer virus
Computer virusComputer virus
Computer virus
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Malware
MalwareMalware
Malware
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of Computers
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
 

More from Tami Brass

You can do that with a netbook
You can do that with a netbook You can do that with a netbook
You can do that with a netbook
Tami Brass
 
Classroom management 1-1
Classroom management 1-1Classroom management 1-1
Classroom management 1-1
Tami Brass
 
Are You My Mother
Are You My MotherAre You My Mother
Are You My Mother
Tami Brass
 
You can do that with a netbook slideshare
You can do that with a netbook   slideshareYou can do that with a netbook   slideshare
You can do that with a netbook slideshare
Tami Brass
 
Wellnology 6
Wellnology 6Wellnology 6
Wellnology 6
Tami Brass
 
One story of 1 -1
One story of 1 -1One story of 1 -1
One story of 1 -1
Tami Brass
 
How to Make Cotton Candy
How to Make Cotton CandyHow to Make Cotton Candy
How to Make Cotton Candy
Tami Brass
 
One Story of 1:1 for TIES 2010
One Story of 1:1 for TIES 2010One Story of 1:1 for TIES 2010
One Story of 1:1 for TIES 2010
Tami Brass
 
SPA Middle SchoolFall 2010 tech update
SPA Middle SchoolFall 2010 tech updateSPA Middle SchoolFall 2010 tech update
SPA Middle SchoolFall 2010 tech updateTami Brass
 
Why’s my computer slow
Why’s my computer slowWhy’s my computer slow
Why’s my computer slow
Tami Brass
 
Netbooks In The Classroom
Netbooks In The ClassroomNetbooks In The Classroom
Netbooks In The Classroom
Tami Brass
 
1:1 Netbooks in the Classroom
1:1 Netbooks in the Classroom1:1 Netbooks in the Classroom
1:1 Netbooks in the Classroom
Tami Brass
 
1:1 Computing: Beyond the Halo Effect
1:1 Computing: Beyond the Halo Effect1:1 Computing: Beyond the Halo Effect
1:1 Computing: Beyond the Halo Effect
Tami Brass
 
Playing in the digital sandbox
Playing in the digital sandboxPlaying in the digital sandbox
Playing in the digital sandboxTami Brass
 
How Connected Are They
How Connected Are TheyHow Connected Are They
How Connected Are They
Tami Brass
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
Tami Brass
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
Tami Brass
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
Tami Brass
 
Understanding Digital Kids
Understanding Digital KidsUnderstanding Digital Kids
Understanding Digital KidsTami Brass
 

More from Tami Brass (19)

You can do that with a netbook
You can do that with a netbook You can do that with a netbook
You can do that with a netbook
 
Classroom management 1-1
Classroom management 1-1Classroom management 1-1
Classroom management 1-1
 
Are You My Mother
Are You My MotherAre You My Mother
Are You My Mother
 
You can do that with a netbook slideshare
You can do that with a netbook   slideshareYou can do that with a netbook   slideshare
You can do that with a netbook slideshare
 
Wellnology 6
Wellnology 6Wellnology 6
Wellnology 6
 
One story of 1 -1
One story of 1 -1One story of 1 -1
One story of 1 -1
 
How to Make Cotton Candy
How to Make Cotton CandyHow to Make Cotton Candy
How to Make Cotton Candy
 
One Story of 1:1 for TIES 2010
One Story of 1:1 for TIES 2010One Story of 1:1 for TIES 2010
One Story of 1:1 for TIES 2010
 
SPA Middle SchoolFall 2010 tech update
SPA Middle SchoolFall 2010 tech updateSPA Middle SchoolFall 2010 tech update
SPA Middle SchoolFall 2010 tech update
 
Why’s my computer slow
Why’s my computer slowWhy’s my computer slow
Why’s my computer slow
 
Netbooks In The Classroom
Netbooks In The ClassroomNetbooks In The Classroom
Netbooks In The Classroom
 
1:1 Netbooks in the Classroom
1:1 Netbooks in the Classroom1:1 Netbooks in the Classroom
1:1 Netbooks in the Classroom
 
1:1 Computing: Beyond the Halo Effect
1:1 Computing: Beyond the Halo Effect1:1 Computing: Beyond the Halo Effect
1:1 Computing: Beyond the Halo Effect
 
Playing in the digital sandbox
Playing in the digital sandboxPlaying in the digital sandbox
Playing in the digital sandbox
 
How Connected Are They
How Connected Are TheyHow Connected Are They
How Connected Are They
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
 
Understanding Digital Kids
Understanding Digital KidsUnderstanding Digital Kids
Understanding Digital Kids
 

Recently uploaded

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 

The Malware Menace

  • 1. Avoiding Viruses, Spyware, Adware & Other Malware The Malware Menace…
  • 2.
  • 3. What’s a computer virus? A virus is a small piece of software that piggybacks on real programs and does something you didn’t intend it to do. Spread easily and quickly via Email Flash drive Documents/files on network Browser/Internet Most common ones are “worms”
  • 4. What is spyware? Like a virus but it monitors your actions and uses them against you later Personal info Passwords Account info Identity theft
  • 5. Adware & Trojans Programs that tell you they do one thing and do another Koobface virus Popup ads Fake antivirus scans
  • 6. What protection do we have? Common sense!
  • 7. Avoiding Malware on Your Nobi Avoid “mindless surfing” on the Internet Don’t click on anything unless you KNOW what it is. Don’t use filesharing applications or websites. Don’t share flash drives. Don’t install software. Don’t open emails, especially attachments, from strangers. Run Panda & Windows defender scans (quick – weekly, full – monthly).
  • 8. Avoiding Malware on Your Nobi Keep pop-up blocker turned on in any browser Always click the red “x” in the upper right corner. The “cancel” or “close” button in the pop-up might have unintended effects. Force quit (alt F4 or ctrl alt del  Task manager  application) if something suspicious pops up. If you get a message from your computer warning you that it is infected and you need to download software to remove the virus, don’t do it. Don’t mess w/security settings on ANY application. If you use sites like Facebook: Don’t install applications on pages. Don’t click on links, images, or videos