SlideShare ist ein Scribd-Unternehmen logo
1 von 12
TYPES  OF  INFECTION
Types of Electronic Infection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Viruses ,[object Object],[object Object],[object Object],[object Object]
DEFENSE !! ,[object Object],[object Object],[object Object]
Worms ,[object Object],Defense:  the only good defense against worms is up to date Anti Virus software.
Trojan Horse ,[object Object],[object Object],Defense : Be very selective about the games and other nifty programs that you download.  Also be sure to be running a good Anti-Virus software.
DEFENSE: Anti Virus Software ,[object Object],[object Object],[object Object],[object Object],[object Object]
Adware or advertising-supported software ,[object Object]
Spyware ,[object Object],[object Object]
Defense against Adware and Spyware If you are noticing a lot of pop-ups, or if your computer is suddenly running very slow, you can  download a free program called Ad-Aware for at  http://www.lavasoftusa.com/ This program scans your system for hiding places where these advertising companies save their programs.  Like the anti-virus software, this program must also be updated before you scan with it each time. This will ensure that you are getting the most recently developed protection.
E-mail spam ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Defense

Weitere ähnliche Inhalte

Was ist angesagt?

introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
RobC76
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 

Was ist angesagt? (20)

Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Malware and security
Malware and securityMalware and security
Malware and security
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Internet security
Internet securityInternet security
Internet security
 
C 7
C 7C 7
C 7
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Sowmya
SowmyaSowmya
Sowmya
 

Andere mochten auch (8)

2010 03 More Text Tools
2010 03 More Text Tools2010 03 More Text Tools
2010 03 More Text Tools
 
Formatting Text
Formatting TextFormatting Text
Formatting Text
 
Tables
TablesTables
Tables
 
2010 06 Bullets And Borders
2010 06 Bullets And Borders2010 06 Bullets And Borders
2010 06 Bullets And Borders
 
Graphics
GraphicsGraphics
Graphics
 
10 WIndows Basics
10 WIndows Basics 10 WIndows Basics
10 WIndows Basics
 
Working With Text
Working With TextWorking With Text
Working With Text
 
Formatting Paragraphs
Formatting ParagraphsFormatting Paragraphs
Formatting Paragraphs
 

Ähnlich wie Viruses and Spyware

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
aschnapper
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
ainmz
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
ar-rifke.com
 

Ähnlich wie Viruses and Spyware (20)

Virus
VirusVirus
Virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
 
Virus
VirusVirus
Virus
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
Malware
MalwareMalware
Malware
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Computer virus
Computer virusComputer virus
Computer virus
 

Mehr von Buffalo Seminary

Teaching with technology in the foreign language classroom
Teaching with technology in the foreign language classroomTeaching with technology in the foreign language classroom
Teaching with technology in the foreign language classroom
Buffalo Seminary
 
03 Excel formulas and functions
03 Excel formulas and functions03 Excel formulas and functions
03 Excel formulas and functions
Buffalo Seminary
 

Mehr von Buffalo Seminary (20)

Buffalo Seminary History 2019 by Harry Schooley
Buffalo Seminary History 2019 by Harry SchooleyBuffalo Seminary History 2019 by Harry Schooley
Buffalo Seminary History 2019 by Harry Schooley
 
Buffalo Seminary History 2018 by Harry Schooley
Buffalo Seminary History 2018 by Harry SchooleyBuffalo Seminary History 2018 by Harry Schooley
Buffalo Seminary History 2018 by Harry Schooley
 
SEM History - version 2017
SEM History - version 2017SEM History - version 2017
SEM History - version 2017
 
Erie Canal
Erie Canal Erie Canal
Erie Canal
 
The History of Buffalo Seminary
The History of Buffalo SeminaryThe History of Buffalo Seminary
The History of Buffalo Seminary
 
Mid-Autumn Festival by Elf Dong
Mid-Autumn Festival by Elf DongMid-Autumn Festival by Elf Dong
Mid-Autumn Festival by Elf Dong
 
Spring service week 2015 power point
Spring service week 2015 power pointSpring service week 2015 power point
Spring service week 2015 power point
 
Teaching with technology in the foreign language classroom
Teaching with technology in the foreign language classroomTeaching with technology in the foreign language classroom
Teaching with technology in the foreign language classroom
 
Donate Life Poster Contest
Donate Life Poster ContestDonate Life Poster Contest
Donate Life Poster Contest
 
05 Excel Charts
05 Excel Charts05 Excel Charts
05 Excel Charts
 
03 Excel formulas and functions
03 Excel formulas and functions03 Excel formulas and functions
03 Excel formulas and functions
 
02 Excel entering data
02 Excel entering data02 Excel entering data
02 Excel entering data
 
01 Excel interface
01 Excel interface01 Excel interface
01 Excel interface
 
04 Excel Tips
04 Excel Tips04 Excel Tips
04 Excel Tips
 
08 graphics
08 graphics08 graphics
08 graphics
 
Tables
TablesTables
Tables
 
Program Presentation
Program PresentationProgram Presentation
Program Presentation
 
06 page formatting
06 page formatting06 page formatting
06 page formatting
 
05 formatting paragraphs
05   formatting paragraphs05   formatting paragraphs
05 formatting paragraphs
 
04 formatting text
04 formatting text04 formatting text
04 formatting text
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Viruses and Spyware

  • 1. TYPES OF INFECTION
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Defense against Adware and Spyware If you are noticing a lot of pop-ups, or if your computer is suddenly running very slow, you can download a free program called Ad-Aware for at http://www.lavasoftusa.com/ This program scans your system for hiding places where these advertising companies save their programs. Like the anti-virus software, this program must also be updated before you scan with it each time. This will ensure that you are getting the most recently developed protection.
  • 11.
  • 12.