The document discusses various computer viruses, biometric security methods, phishing schemes, and encryption. It describes the Code Red and Love Bug viruses, how biometric security uses fingerprints, retina, and voice recognition instead of passwords, and an example phishing scheme asking for information to win a free vacation. The text also covers the advantages of biometric security for access and the disadvantages of cost and safety issues, as well as how anti-virus software works to stop malware and what personal information should be encrypted like social security numbers and credit cards.