SlideShare una empresa de Scribd logo
1 de 12
TYPES  OF  INFECTION
Types of Electronic Infection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Viruses ,[object Object],[object Object],[object Object],[object Object]
DEFENSE !! ,[object Object],[object Object],[object Object]
Worms ,[object Object],Defense:  the only good defense against worms is up to date Anti Virus software.
Trojan Horse ,[object Object],[object Object],Defense : Be very selective about the games and other nifty programs that you download.  Also be sure to be running a good Anti-Virus software.
DEFENSE: Anti Virus Software ,[object Object],[object Object],[object Object],[object Object],[object Object]
Adware or advertising-supported software ,[object Object]
Spyware ,[object Object],[object Object]
Defense against Adware and Spyware If you are noticing a lot of pop-ups, or if your computer is suddenly running very slow, you can  download a free program called Ad-Aware for at  http://www.lavasoftusa.com/ This program scans your system for hiding places where these advertising companies save their programs.  Like the anti-virus software, this program must also be updated before you scan with it each time. This will ensure that you are getting the most recently developed protection.
E-mail spam ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Defense

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Malware and security
Malware and securityMalware and security
Malware and security
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Internet security
Internet securityInternet security
Internet security
 
C 7
C 7C 7
C 7
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Sowmya
SowmyaSowmya
Sowmya
 

Destacado (8)

2010 03 More Text Tools
2010 03 More Text Tools2010 03 More Text Tools
2010 03 More Text Tools
 
Formatting Text
Formatting TextFormatting Text
Formatting Text
 
Tables
TablesTables
Tables
 
2010 06 Bullets And Borders
2010 06 Bullets And Borders2010 06 Bullets And Borders
2010 06 Bullets And Borders
 
Graphics
GraphicsGraphics
Graphics
 
10 WIndows Basics
10 WIndows Basics 10 WIndows Basics
10 WIndows Basics
 
Working With Text
Working With TextWorking With Text
Working With Text
 
Formatting Paragraphs
Formatting ParagraphsFormatting Paragraphs
Formatting Paragraphs
 

Similar a Viruses and Spyware

Similar a Viruses and Spyware (20)

Virus
VirusVirus
Virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
 
Virus
VirusVirus
Virus
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
Malware
MalwareMalware
Malware
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Computer virus
Computer virusComputer virus
Computer virus
 

Más de Buffalo Seminary

Más de Buffalo Seminary (20)

Buffalo Seminary History 2019 by Harry Schooley
Buffalo Seminary History 2019 by Harry SchooleyBuffalo Seminary History 2019 by Harry Schooley
Buffalo Seminary History 2019 by Harry Schooley
 
Buffalo Seminary History 2018 by Harry Schooley
Buffalo Seminary History 2018 by Harry SchooleyBuffalo Seminary History 2018 by Harry Schooley
Buffalo Seminary History 2018 by Harry Schooley
 
SEM History - version 2017
SEM History - version 2017SEM History - version 2017
SEM History - version 2017
 
Erie Canal
Erie Canal Erie Canal
Erie Canal
 
The History of Buffalo Seminary
The History of Buffalo SeminaryThe History of Buffalo Seminary
The History of Buffalo Seminary
 
Mid-Autumn Festival by Elf Dong
Mid-Autumn Festival by Elf DongMid-Autumn Festival by Elf Dong
Mid-Autumn Festival by Elf Dong
 
Spring service week 2015 power point
Spring service week 2015 power pointSpring service week 2015 power point
Spring service week 2015 power point
 
Teaching with technology in the foreign language classroom
Teaching with technology in the foreign language classroomTeaching with technology in the foreign language classroom
Teaching with technology in the foreign language classroom
 
Donate Life Poster Contest
Donate Life Poster ContestDonate Life Poster Contest
Donate Life Poster Contest
 
05 Excel Charts
05 Excel Charts05 Excel Charts
05 Excel Charts
 
03 Excel formulas and functions
03 Excel formulas and functions03 Excel formulas and functions
03 Excel formulas and functions
 
02 Excel entering data
02 Excel entering data02 Excel entering data
02 Excel entering data
 
01 Excel interface
01 Excel interface01 Excel interface
01 Excel interface
 
04 Excel Tips
04 Excel Tips04 Excel Tips
04 Excel Tips
 
08 graphics
08 graphics08 graphics
08 graphics
 
Tables
TablesTables
Tables
 
Program Presentation
Program PresentationProgram Presentation
Program Presentation
 
06 page formatting
06 page formatting06 page formatting
06 page formatting
 
05 formatting paragraphs
05   formatting paragraphs05   formatting paragraphs
05 formatting paragraphs
 
04 formatting text
04 formatting text04 formatting text
04 formatting text
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Viruses and Spyware

  • 1. TYPES OF INFECTION
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Defense against Adware and Spyware If you are noticing a lot of pop-ups, or if your computer is suddenly running very slow, you can download a free program called Ad-Aware for at http://www.lavasoftusa.com/ This program scans your system for hiding places where these advertising companies save their programs. Like the anti-virus software, this program must also be updated before you scan with it each time. This will ensure that you are getting the most recently developed protection.
  • 11.
  • 12.