The document discusses computer viruses, including what they are, how to recognize them, where they originate from, and how to prevent and remove them. It notes that virus attacks have risen drastically each year, targeting businesses and allowing identity theft. It provides tips on recognizing viruses based on computer performance and suspicious activity. Common virus sources are listed as porn, music downloading, and survey sites. The document recommends using antivirus software from reputable companies and exercising caution when online to avoid infection.