SlideShare a Scribd company logo
The Computer Virus

A Boogeyman in Its Own Right



    Type your Text Here
Virus attacks grow by the year


                 What is a Computer Virus?
  It is exactly what it was always meant to be. A malicious coding that
can harm someone’s technology as well as their life in an electronically
                               hazardous way.
     The number of computer attacks due to cracked and damaged
        security measures has risen drastically with each passing year.
  Businesses and other forms of places that manage money are prime
  targets, and much identity theft as well as internet burglary happens
because of computer viruses. Have you ever had an Amazon account,
for example, and seen something on there you have never purchased?
How to Recognize Viruses
• Viruses come in so many varied forms, and it can be very difficult
  at the best of times to decipher where on is, and if it has already
  attacked you. Subtlety has become a great part of viruses, slipping
  in unawares and causing internal problems that most can miss if
  new to computers.
• We can recognize nasties by:
   –   Looking for performance lag(slower functioning, freezing, etc…)
   –   Running a scan on your computer (AVG, Norton, etc….)
   –   Noticing transactions that you do not recognize
   –   Noticing software installed that you did not install
   –   A yellow triangle pop up flashing on screen
   –   Pop Up Advertisements coming up (use Holy water)
Where do Viruses spawn?
Viruses have a number of places
they can pop up at. Some
varieties of websites are easier to
spot than others, thanks to
stereotypes. Porn, music
download, and surveys are nasty
nests on large scale.
The sites that have viruses will
usually have pop-ups, and
generally, many pornographic
sites tend to be littered with them.
If a program or website tries to
install something on your
computer, be wary.
What Programs can Fight Viruses?

There are a wide variety of programs out there to
help prevent and rid you of virsues, however, some
viruses actually DISGUISE themselves as anti-virus
programs.
A few reputable anti-viruses programs are:
– Norton
– Malware Malbytes
– AVG
– Avast!
– Comodo
Need to Know Basis
• Never, ever, ever, ever click on a pop up.

• If you receive mail from an unknown person, do not open
  it.

• Avoid surveys for free stuff

• Use Mozilla Firefox to know how dangerous a site is
  before getting on

• If possible, avoid toolbar downloads

• Porn sites are vast nests of nasties. Is the vagina or
  penis worth your computer getting attacked?
Need to Know Basis (cont…)
• NEVER give out credit card information
  unless you have checked the validity of a
  website
• Update your software. Some older versions
  may not be as protected as newer ones
• If you buy a used computer, do a destructive
  restore on it. You already have nothing on
  there to lose, except a possible virus.
Where can you discover more?
Unknown, . "What is a Computer Virus." Microsoft. Microsoft
Safety and Secuirty Center, n.d. Web. 28 Aug 2012.
<http://www.microsoft.com/security/pc-security/virus-
whatis.asp&xgt;.

Unknown, . "What are viruses, worms, and Trojan horses?."
Indiana University. The Trustees of Indiana University, August
15, 2012. Web. 28 Aug 2012.
<http://kb.iu.edu/data/aehm.html>.

Unknown, . Internet Attacks – A Threat to Your Business?. N.d.
Graphic. Sudden Sytems, Houston. Web. 28 Aug 2012.
<http://www.bing.com/images/search?q=statistics of virus
attacks&view=detail&id=2F3FF6BDD0129BA82CC7848A098CE
405F6F3C9E3&first=1>.

More Related Content

What's hot

HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
Benandro Palor
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
ritz482
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
JazzyNF
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
jovellconde1
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
rubal_9
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
olususi kayode oluyemi
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
fidel barrios
 
Computer safety
Computer safetyComputer safety
Computer safety
acarrizales531
 

What's hot (19)

HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
Protect
ProtectProtect
Protect
 
Internet security
Internet securityInternet security
Internet security
 
Virus
VirusVirus
Virus
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Quiz
QuizQuiz
Quiz
 
Computer safety
Computer safetyComputer safety
Computer safety
 

Viewers also liked

Konsep Dasar KTSP dalam Pendidikan Biologi
Konsep Dasar KTSP dalam Pendidikan BiologiKonsep Dasar KTSP dalam Pendidikan Biologi
Konsep Dasar KTSP dalam Pendidikan BiologiTrisucinaibaho
 
The jordanian national policy
The jordanian national policyThe jordanian national policy
The jordanian national policymalfofa
 
Hukum Newton II
Hukum Newton IIHukum Newton II
Hukum Newton II
Rafi Ramadhan
 
The influence of faith on islamic microfinance programmes
The influence of faith on islamic microfinance programmesThe influence of faith on islamic microfinance programmes
The influence of faith on islamic microfinance programmesmalfofa
 
Glucosamine pain relief
Glucosamine pain reliefGlucosamine pain relief
Glucosamine pain reliefmalfofa
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
GronHatchat
 
Sistem peredarah darah
Sistem peredarah darahSistem peredarah darah
Sistem peredarah darahTrisucinaibaho
 
Fotosintesis ^Reaksi Gelap^
Fotosintesis ^Reaksi Gelap^Fotosintesis ^Reaksi Gelap^
Fotosintesis ^Reaksi Gelap^
Trisucinaibaho
 

Viewers also liked (10)

UK MSA 1st meeting
UK MSA 1st meetingUK MSA 1st meeting
UK MSA 1st meeting
 
Investigating income
Investigating incomeInvestigating income
Investigating income
 
Konsep Dasar KTSP dalam Pendidikan Biologi
Konsep Dasar KTSP dalam Pendidikan BiologiKonsep Dasar KTSP dalam Pendidikan Biologi
Konsep Dasar KTSP dalam Pendidikan Biologi
 
The jordanian national policy
The jordanian national policyThe jordanian national policy
The jordanian national policy
 
Hukum Newton II
Hukum Newton IIHukum Newton II
Hukum Newton II
 
The influence of faith on islamic microfinance programmes
The influence of faith on islamic microfinance programmesThe influence of faith on islamic microfinance programmes
The influence of faith on islamic microfinance programmes
 
Glucosamine pain relief
Glucosamine pain reliefGlucosamine pain relief
Glucosamine pain relief
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
 
Sistem peredarah darah
Sistem peredarah darahSistem peredarah darah
Sistem peredarah darah
 
Fotosintesis ^Reaksi Gelap^
Fotosintesis ^Reaksi Gelap^Fotosintesis ^Reaksi Gelap^
Fotosintesis ^Reaksi Gelap^
 

Similar to The Nasty of Computers

Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
smeech
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
Sunjoonah Kambbs
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
information about virus
information about virusinformation about virus
information about virus
toshan badiye
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
Malwarebytes coupon code
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Virus
VirusVirus
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Computer Security
Computer SecurityComputer Security
Computer Security
secrettub
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
Shwana M
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
Chinatu Uzuegbu
 

Similar to The Nasty of Computers (20)

anti_virus
anti_virusanti_virus
anti_virus
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Computer virus
Computer virusComputer virus
Computer virus
 
information about virus
information about virusinformation about virus
information about virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Virus
VirusVirus
Virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
C 7
C 7C 7
C 7
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

The Nasty of Computers

  • 1. The Computer Virus A Boogeyman in Its Own Right Type your Text Here
  • 2. Virus attacks grow by the year What is a Computer Virus? It is exactly what it was always meant to be. A malicious coding that can harm someone’s technology as well as their life in an electronically hazardous way. The number of computer attacks due to cracked and damaged security measures has risen drastically with each passing year. Businesses and other forms of places that manage money are prime targets, and much identity theft as well as internet burglary happens because of computer viruses. Have you ever had an Amazon account, for example, and seen something on there you have never purchased?
  • 3. How to Recognize Viruses • Viruses come in so many varied forms, and it can be very difficult at the best of times to decipher where on is, and if it has already attacked you. Subtlety has become a great part of viruses, slipping in unawares and causing internal problems that most can miss if new to computers. • We can recognize nasties by: – Looking for performance lag(slower functioning, freezing, etc…) – Running a scan on your computer (AVG, Norton, etc….) – Noticing transactions that you do not recognize – Noticing software installed that you did not install – A yellow triangle pop up flashing on screen – Pop Up Advertisements coming up (use Holy water)
  • 4. Where do Viruses spawn? Viruses have a number of places they can pop up at. Some varieties of websites are easier to spot than others, thanks to stereotypes. Porn, music download, and surveys are nasty nests on large scale. The sites that have viruses will usually have pop-ups, and generally, many pornographic sites tend to be littered with them. If a program or website tries to install something on your computer, be wary.
  • 5. What Programs can Fight Viruses? There are a wide variety of programs out there to help prevent and rid you of virsues, however, some viruses actually DISGUISE themselves as anti-virus programs. A few reputable anti-viruses programs are: – Norton – Malware Malbytes – AVG – Avast! – Comodo
  • 6. Need to Know Basis • Never, ever, ever, ever click on a pop up. • If you receive mail from an unknown person, do not open it. • Avoid surveys for free stuff • Use Mozilla Firefox to know how dangerous a site is before getting on • If possible, avoid toolbar downloads • Porn sites are vast nests of nasties. Is the vagina or penis worth your computer getting attacked?
  • 7. Need to Know Basis (cont…) • NEVER give out credit card information unless you have checked the validity of a website • Update your software. Some older versions may not be as protected as newer ones • If you buy a used computer, do a destructive restore on it. You already have nothing on there to lose, except a possible virus.
  • 8. Where can you discover more? Unknown, . "What is a Computer Virus." Microsoft. Microsoft Safety and Secuirty Center, n.d. Web. 28 Aug 2012. <http://www.microsoft.com/security/pc-security/virus- whatis.asp&xgt;. Unknown, . "What are viruses, worms, and Trojan horses?." Indiana University. The Trustees of Indiana University, August 15, 2012. Web. 28 Aug 2012. <http://kb.iu.edu/data/aehm.html>. Unknown, . Internet Attacks – A Threat to Your Business?. N.d. Graphic. Sudden Sytems, Houston. Web. 28 Aug 2012. <http://www.bing.com/images/search?q=statistics of virus attacks&view=detail&id=2F3FF6BDD0129BA82CC7848A098CE 405F6F3C9E3&first=1>.