SlideShare a Scribd company logo
1 of 11
By: Alisha Schnapper Computer Viruses
Definition of a virus ,[object Object]
Signs of a computer virus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4 most common computer viruses Distribution:   Shared Email Pirated software Shared USB stick Boot Sector-   overwrites the boot sector on your hard drive or floppy disk Macro Virus-   comes from a spread sheet or document through an email Adware-  appears when advertisement pop up on the screen Trojan Horse-   appear to be legitimate files. They don’t reproduce by infecting other files Worms- are detected   and eliminated by   anti-virus
Rich Skrenta ,[object Object],[object Object]
Facts about Viruses ,[object Object],[object Object],[object Object]
Computer Viruses come from... Opening attached email Installing programs from the internet Not   reading the licensing agreement   Down loading Anti-spyware tools
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spyware and Anti-spyware
Protecting your computer ,[object Object],[object Object],[object Object],[object Object]
Step for removing a virus ,[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
guest7b2ba1
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
PEC
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
Dom Mike
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 

What's hot (20)

computer virus
computer viruscomputer virus
computer virus
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its prevention
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
spyware
spywarespyware
spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Malware
MalwareMalware
Malware
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Ppt123
Ppt123Ppt123
Ppt123
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 

Viewers also liked (6)

Computer Apps 1 Slide Show
Computer Apps 1 Slide ShowComputer Apps 1 Slide Show
Computer Apps 1 Slide Show
 
Types Of Computer Systems
Types Of Computer SystemsTypes Of Computer Systems
Types Of Computer Systems
 
Outside Of The Computer
Outside Of The ComputerOutside Of The Computer
Outside Of The Computer
 
Comslide 3
Comslide 3Comslide 3
Comslide 3
 
Copyright
CopyrightCopyright
Copyright
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 

Similar to Slideshow Alisha Schnapper

Information of Virus
Information of VirusInformation of Virus
Information of Virus
jazz_306
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
adni_shadah
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 

Similar to Slideshow Alisha Schnapper (20)

Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computervirus
Computervirus Computervirus
Computervirus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
viruses
virusesviruses
viruses
 
Virus project
Virus projectVirus project
Virus project
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Slideshow Alisha Schnapper

  • 1. By: Alisha Schnapper Computer Viruses
  • 2.
  • 3.
  • 4. 4 most common computer viruses Distribution: Shared Email Pirated software Shared USB stick Boot Sector- overwrites the boot sector on your hard drive or floppy disk Macro Virus- comes from a spread sheet or document through an email Adware- appears when advertisement pop up on the screen Trojan Horse- appear to be legitimate files. They don’t reproduce by infecting other files Worms- are detected and eliminated by anti-virus
  • 5.
  • 6.
  • 7. Computer Viruses come from... Opening attached email Installing programs from the internet Not reading the licensing agreement Down loading Anti-spyware tools
  • 8.
  • 9.
  • 10.
  • 11.