SlideShare ist ein Scribd-Unternehmen logo
1 von 3
TOPIC: COMPUTER VIRUSES



Have you ever been working in your computer and then you open an unknown file you find
in the web and suddenly appear a message that tells you that your PC is in danger? Do you
know what computer viruses are and how they spread?


WHAT ARE COMPUTER VIRUSES?

                          A virus is a malware (a malicious software or badware) that has
                          the objective of damaging the PC without the permission of the
                          computer user.


                          Viruses usually replace the files that can be carried out for the
                                                       ones that are infected. They take the
                            function of other files that           are already saved in the
                            computer, but there are also other viruses that are characterized
                            because they just annoy.


Some of the characteristics of the viruses are:
*They produce the loss of productivity of the PC, it becomes slow
*They produce cuts in the information systems
*Damage of data and files
*They are able to spread by replicas


                               HOW VIRUSES SPREAD?
                               There are two ways in which your PC can get viruses; they
                               are:
                               1-The user accepts or carries out the installation of the virus
                               without a warning message.
                               2-The virus acts by replicas through the net.
It can be mentioned that there are some ways in which the PC can be infected by the viruses
when the user is interacting or working on the computer; some of those are:
   •   Through messages that are carried out in programs
   •   Social messages like the ones that tell you “CLICK ON THIS; CARRY OUT THIS
       PROGRAM AND YOU’LL WIN A PRIZE”
   •   When you use diskettes, CD’s or the USB and the files that those hardwares contain
       is infected.
   •   When you install software and you ignore if it has a virus.




                                         TYPES OF VIRUSES


                                         There are a lot of types of viruses; they vary
                                         according to the way they spread, their function,
                                         and the way in which they carry out in the
                                         computer or in the way they alter the activity of it.




Some of the most common viruses are:
   •   The Trojan or the horse Trojan: They steal information and also alter the
       performance of your PC. There are extreme cases in which other users can control
       the system of your PC because of this type of virus.


   •   Worms: They are able to duplicate themselves by using the automatic parts of the
       operation system of the PC that are not visible for the users.


   •   Logic bombs: They are programs that are activated with certain files.
HOW CAN WE AVOID OR ELIMINATE THESE VIRUSES?
There are methods to be used aimed to the risk of getting viruses; they are called ACTIVE
AND PASSIVE METHODS.


Active method:
Antivirus: they are programs that can detect,
eliminate and even stop the spread of viruses.
The antivirus control de system of the PC and
they notified the user when a file or program is
possibly infected.




Passive method:


   •   Avoiding using hardwares like diskettes, CD’s or USB’s that you consider can be
       infected.
   •   Do not install pirated softwares.
   •   Do not open messages or emails that are from an unknown address.
   •   Do not open files without knowing the type of file.

Weitere ähnliche Inhalte

Was ist angesagt?

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 

Was ist angesagt? (20)

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Virus part2
Virus part2Virus part2
Virus part2
 

Andere mochten auch

Pangunahing problema sa aking barangay
Pangunahing problema sa aking barangayPangunahing problema sa aking barangay
Pangunahing problema sa aking barangayClarissa Sulit
 
Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2jmori1
 
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...futureagricultures
 
Что делать с деструкторами?
Что делать с деструкторами?Что делать с деструкторами?
Что делать с деструкторами?Dinar Ibragimov
 
ボブスレー・リュージュパークのあり方の検討について
ボブスレー・リュージュパークのあり方の検討についてボブスレー・リュージュパークのあり方の検討について
ボブスレー・リュージュパークのあり方の検討について長野市議会議員小泉一真
 
Wellbeing 2011 Fact Sheet English
Wellbeing 2011  Fact  Sheet  EnglishWellbeing 2011  Fact  Sheet  English
Wellbeing 2011 Fact Sheet EnglishCheryl Deguara
 
Brand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romanyBrand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romanyMrsPrentice
 
Understanding vocabulary from context
Understanding vocabulary from contextUnderstanding vocabulary from context
Understanding vocabulary from contextLes Davy
 
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)giopersico
 

Andere mochten auch (20)

Pangunahing problema sa aking barangay
Pangunahing problema sa aking barangayPangunahing problema sa aking barangay
Pangunahing problema sa aking barangay
 
Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2
 
อติมา อุ่นจิตร
อติมา  อุ่นจิตรอติมา  อุ่นจิตร
อติมา อุ่นจิตร
 
Manal p.
Manal p.Manal p.
Manal p.
 
บทที่ 11
บทที่ 11บทที่ 11
บทที่ 11
 
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
 
Что делать с деструкторами?
Что делать с деструкторами?Что делать с деструкторами?
Что делать с деструкторами?
 
ボブスレー・リュージュパークのあり方の検討について
ボブスレー・リュージュパークのあり方の検討についてボブスレー・リュージュパークのあり方の検討について
ボブスレー・リュージュパークのあり方の検討について
 
Wellbeing 2011 Fact Sheet English
Wellbeing 2011  Fact  Sheet  EnglishWellbeing 2011  Fact  Sheet  English
Wellbeing 2011 Fact Sheet English
 
Brand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romanyBrand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romany
 
Rde c words from visitors trip advisor comments
Rde c words from visitors   trip advisor commentsRde c words from visitors   trip advisor comments
Rde c words from visitors trip advisor comments
 
Cлайды
CлайдыCлайды
Cлайды
 
S t o r y b o a r d
S t o r y b o a r dS t o r y b o a r d
S t o r y b o a r d
 
Corespring
CorespringCorespring
Corespring
 
Understanding vocabulary from context
Understanding vocabulary from contextUnderstanding vocabulary from context
Understanding vocabulary from context
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
 
Acrocanthasaurus
AcrocanthasaurusAcrocanthasaurus
Acrocanthasaurus
 
Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)
 
use WACS;
use WACS;use WACS;
use WACS;
 

Ähnlich wie Proyecto7

Ähnlich wie Proyecto7 (20)

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Proyecto7

  • 1. TOPIC: COMPUTER VIRUSES Have you ever been working in your computer and then you open an unknown file you find in the web and suddenly appear a message that tells you that your PC is in danger? Do you know what computer viruses are and how they spread? WHAT ARE COMPUTER VIRUSES? A virus is a malware (a malicious software or badware) that has the objective of damaging the PC without the permission of the computer user. Viruses usually replace the files that can be carried out for the ones that are infected. They take the function of other files that are already saved in the computer, but there are also other viruses that are characterized because they just annoy. Some of the characteristics of the viruses are: *They produce the loss of productivity of the PC, it becomes slow *They produce cuts in the information systems *Damage of data and files *They are able to spread by replicas HOW VIRUSES SPREAD? There are two ways in which your PC can get viruses; they are: 1-The user accepts or carries out the installation of the virus without a warning message. 2-The virus acts by replicas through the net.
  • 2. It can be mentioned that there are some ways in which the PC can be infected by the viruses when the user is interacting or working on the computer; some of those are: • Through messages that are carried out in programs • Social messages like the ones that tell you “CLICK ON THIS; CARRY OUT THIS PROGRAM AND YOU’LL WIN A PRIZE” • When you use diskettes, CD’s or the USB and the files that those hardwares contain is infected. • When you install software and you ignore if it has a virus. TYPES OF VIRUSES There are a lot of types of viruses; they vary according to the way they spread, their function, and the way in which they carry out in the computer or in the way they alter the activity of it. Some of the most common viruses are: • The Trojan or the horse Trojan: They steal information and also alter the performance of your PC. There are extreme cases in which other users can control the system of your PC because of this type of virus. • Worms: They are able to duplicate themselves by using the automatic parts of the operation system of the PC that are not visible for the users. • Logic bombs: They are programs that are activated with certain files.
  • 3. HOW CAN WE AVOID OR ELIMINATE THESE VIRUSES? There are methods to be used aimed to the risk of getting viruses; they are called ACTIVE AND PASSIVE METHODS. Active method: Antivirus: they are programs that can detect, eliminate and even stop the spread of viruses. The antivirus control de system of the PC and they notified the user when a file or program is possibly infected. Passive method: • Avoiding using hardwares like diskettes, CD’s or USB’s that you consider can be infected. • Do not install pirated softwares. • Do not open messages or emails that are from an unknown address. • Do not open files without knowing the type of file.