SlideShare una empresa de Scribd logo
1 de 70
Viruses, Spyware and Spam … Oh, My! A Presentation By Joel May
What We’ll Talk About ,[object Object],[object Object],[object Object]
Just What Are These Things?
Just What Are These Things? ,[object Object],Viruses
Just What Are These Things? ,[object Object],[object Object],Worms and Trojan Horses
Just What Are These Things? ,[object Object],[object Object],[object Object],Spyware
Just What Are These Things? ,[object Object],[object Object],Spam
Where Do They Come From?
Where Do They Come From? ,[object Object],[object Object],[object Object],Viruses, Worms and Trojan Horses
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],Spyware
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],[object Object],Spyware vs. Cookies
Where Do They Come From? Spam ,[object Object],[object Object],[object Object]
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spam
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],Spam
 
 
 
What Can They Do To You?
What Can They Do To You? ,[object Object],[object Object],[object Object],[object Object],Viruses
What Can They Do To You? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spyware
What Can They Do To You? ,[object Object],[object Object],[object Object],Spam
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Can You Do About Them?
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],You Need Six Things to Defeat Them
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls
What Can You Do About Them? ,[object Object],[object Object],Firewalls
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Firewalls – The Common Sense Dimension
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Viruses
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Viruses – Use Windows Update
What Can You Do About Them? ,[object Object],[object Object],Viruses – Use Windows Update
What Can You Do About Them? ,[object Object],[object Object],[object Object],Viruses – Watch Startup Processes
What Can You Do About Them? ,[object Object],[object Object],[object Object],Viruses – Watch File Extensions
What Can You Do About Them? Viruses – Watch File Extensions You need to watch out for  .exe .com .bat .bas .chm .cm .cpl .pif .reg .scr .hlp .sct .shs .inf .mdb .vb .vbe .vbs .wsf .wsh And some other, less common ones as well
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Viruses – Watch File Extensions
What Can You Do About Them? Viruses – Watch File Extensions Step 1: Step 2:
What Can You Do About Them? Viruses – Watch File Extensions Step 3: Step 4:
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Viruses – Always Use Anti-Virus Software But  ONLY ONE ,[object Object],[object Object],[object Object]
What Can You Do About Them? ,[object Object],[object Object],Viruses – Always Use Anti-Virus Software
What Can You Do About Them? ,[object Object],[object Object],[object Object],Viruses – Always Use Anti-Virus Software
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Viruses – Up to Date Virus Definitions
What Can You Do About Them? ,[object Object],[object Object],Viruses – Never Open Questionable E-mail Attachments
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],Viruses – Don’t Automatically Preview E-mail
What Can You Do About Them? ,[object Object],Viruses – The Common Sense Dimension ,[object Object],[object Object],[object Object],. Thus you should be extremely careful and continually aware of the traffic between your  computer and the outside world (e-mail and web  browsing)
What Can You Do About Them? ,[object Object],[object Object],Viruses – The Common Sense Dimension
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],[object Object],Spyware – The Common Sense Dimension
What Can You Do About Them? ,[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],Spam ,[object Object],[object Object]
What Can You Do About Them? ,[object Object],Spam ,[object Object]
What Can You Do About Them? ,[object Object],Spam ,[object Object]
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],Spam – The Common Sense Dimension
What Do I Do About Them?
What Do I Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Do I Do About Them? ,[object Object],[object Object],[object Object]
What Do I Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Do I Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Summary
Google and AARP to the Rescue ,[object Object],[object Object],[object Object]
While the people retain their virtue and vigilance, no agent, by any extreme of wickedness or folly, can very seriously injure. - Abraham Lincoln
The End

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Spyware
SpywareSpyware
Spyware
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Spyware
SpywareSpyware
Spyware
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
Spyware
SpywareSpyware
Spyware
 
spyware
spyware spyware
spyware
 
spyware
spywarespyware
spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Spyware
SpywareSpyware
Spyware
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Malware
MalwareMalware
Malware
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 

Similar a Viruses Spyware and Spam, Oh My!

Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptDiveshK4
 

Similar a Viruses Spyware and Spam, Oh My! (20)

Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Virus
VirusVirus
Virus
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 

Más de Joel May

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photosJoel May
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photosJoel May
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash driveJoel May
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creationJoel May
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use GmailJoel May
 
Free software
Free softwareFree software
Free softwareJoel May
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystifiedJoel May
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?Joel May
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable StorageJoel May
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the WebJoel May
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your ComputerJoel May
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of GoogleJoel May
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to WordJoel May
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricksJoel May
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to ExcelJoel May
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktopJoel May
 
Audio on the web
Audio on the webAudio on the web
Audio on the webJoel May
 
Your family legacy
Your family legacyYour family legacy
Your family legacyJoel May
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard driveJoel May
 

Más de Joel May (20)

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash drive
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creation
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
 
Free software
Free softwareFree software
Free software
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystified
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable Storage
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the Web
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your Computer
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of Google
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to Word
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricks
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to Excel
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktop
 
Audio on the web
Audio on the webAudio on the web
Audio on the web
 
Your family legacy
Your family legacyYour family legacy
Your family legacy
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard drive
 

Último

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Último (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Viruses Spyware and Spam, Oh My!

  • 1. Viruses, Spyware and Spam … Oh, My! A Presentation By Joel May
  • 2.
  • 3. Just What Are These Things?
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Where Do They Come From?
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.  
  • 16.  
  • 17.  
  • 18. What Can They Do To You?
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. What Can You Do About Them?
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. What Can You Do About Them? Viruses – Watch File Extensions You need to watch out for .exe .com .bat .bas .chm .cm .cpl .pif .reg .scr .hlp .sct .shs .inf .mdb .vb .vbe .vbs .wsf .wsh And some other, less common ones as well
  • 35.
  • 36. What Can You Do About Them? Viruses – Watch File Extensions Step 1: Step 2:
  • 37. What Can You Do About Them? Viruses – Watch File Extensions Step 3: Step 4:
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. What Do I Do About Them?
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69. While the people retain their virtue and vigilance, no agent, by any extreme of wickedness or folly, can very seriously injure. - Abraham Lincoln