SlideShare una empresa de Scribd logo
1 de 8
Avoiding Viruses, Spyware, Adware & Other Malware The Malware Menace…
What’s a computer virus? A virus is a small piece of software that piggybacks on real programs and does something you didn’t intend it to do. Spread easily and quickly via Email Flash drive Documents/files on network Browser/Internet Most common ones are “worms”
What is spyware? Like a virus but it monitors your actions and uses them against you later Personal info Passwords Account info Identity theft
Adware & Trojans Programs that tell you they do one thing and do another Koobface virus Popup ads Fake antivirus scans
What protection do we have? Common sense!
Avoiding Malware on Your Nobi Avoid “mindless surfing” on the Internet Don’t click on anything unless you KNOW what it is. Don’t use filesharing applications or websites. Don’t share flash drives. Don’t install software. Don’t open emails, especially attachments, from strangers. Run Panda & Windows defender scans (quick – weekly, full – monthly).
Avoiding Malware on Your Nobi Keep pop-up blocker turned on in any browser Always click the red “x” in the upper right corner.  The “cancel” or “close” button in the pop-up might have unintended effects. Force quit (alt F4 or ctrl alt del  Task manager  application) if something suspicious pops up. If you get a message from your computer warning you that it is infected and you need to download software to remove the virus, don’t do it.  Don’t mess w/security settings on ANY application. If you use sites like Facebook: Don’t install applications on pages. Don’t click on links, images, or videos

Más contenido relacionado

La actualidad más candente

Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIRO
Takagi Kun
 

La actualidad más candente (20)

Virus
VirusVirus
Virus
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
MALWARE
MALWAREMALWARE
MALWARE
 
Adware
AdwareAdware
Adware
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIRO
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Malwares
MalwaresMalwares
Malwares
 
Spyware
SpywareSpyware
Spyware
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security Landscape
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 

Similar a The Malware Menace

Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
Rozell Sneede
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
aschnapper
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
ar-rifke.com
 

Similar a The Malware Menace (20)

Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
Virus
VirusVirus
Virus
 
Sowmya
SowmyaSowmya
Sowmya
 
Computer virus
Computer virusComputer virus
Computer virus
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Malware
MalwareMalware
Malware
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
 
The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of Computers
 

Más de Tami Brass

SPA Middle SchoolFall 2010 tech update
SPA Middle SchoolFall 2010 tech updateSPA Middle SchoolFall 2010 tech update
SPA Middle SchoolFall 2010 tech update
Tami Brass
 
Playing in the digital sandbox
Playing in the digital sandboxPlaying in the digital sandbox
Playing in the digital sandbox
Tami Brass
 
Understanding Digital Kids
Understanding Digital KidsUnderstanding Digital Kids
Understanding Digital Kids
Tami Brass
 

Más de Tami Brass (19)

You can do that with a netbook
You can do that with a netbook You can do that with a netbook
You can do that with a netbook
 
Classroom management 1-1
Classroom management 1-1Classroom management 1-1
Classroom management 1-1
 
Are You My Mother
Are You My MotherAre You My Mother
Are You My Mother
 
You can do that with a netbook slideshare
You can do that with a netbook   slideshareYou can do that with a netbook   slideshare
You can do that with a netbook slideshare
 
Wellnology 6
Wellnology 6Wellnology 6
Wellnology 6
 
One story of 1 -1
One story of 1 -1One story of 1 -1
One story of 1 -1
 
How to Make Cotton Candy
How to Make Cotton CandyHow to Make Cotton Candy
How to Make Cotton Candy
 
One Story of 1:1 for TIES 2010
One Story of 1:1 for TIES 2010One Story of 1:1 for TIES 2010
One Story of 1:1 for TIES 2010
 
SPA Middle SchoolFall 2010 tech update
SPA Middle SchoolFall 2010 tech updateSPA Middle SchoolFall 2010 tech update
SPA Middle SchoolFall 2010 tech update
 
Why’s my computer slow
Why’s my computer slowWhy’s my computer slow
Why’s my computer slow
 
Netbooks In The Classroom
Netbooks In The ClassroomNetbooks In The Classroom
Netbooks In The Classroom
 
1:1 Netbooks in the Classroom
1:1 Netbooks in the Classroom1:1 Netbooks in the Classroom
1:1 Netbooks in the Classroom
 
1:1 Computing: Beyond the Halo Effect
1:1 Computing: Beyond the Halo Effect1:1 Computing: Beyond the Halo Effect
1:1 Computing: Beyond the Halo Effect
 
Playing in the digital sandbox
Playing in the digital sandboxPlaying in the digital sandbox
Playing in the digital sandbox
 
How Connected Are They
How Connected Are TheyHow Connected Are They
How Connected Are They
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
 
Understanding Digital Kids
Understanding Digital KidsUnderstanding Digital Kids
Understanding Digital Kids
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 

Último (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

The Malware Menace

  • 1. Avoiding Viruses, Spyware, Adware & Other Malware The Malware Menace…
  • 2.
  • 3. What’s a computer virus? A virus is a small piece of software that piggybacks on real programs and does something you didn’t intend it to do. Spread easily and quickly via Email Flash drive Documents/files on network Browser/Internet Most common ones are “worms”
  • 4. What is spyware? Like a virus but it monitors your actions and uses them against you later Personal info Passwords Account info Identity theft
  • 5. Adware & Trojans Programs that tell you they do one thing and do another Koobface virus Popup ads Fake antivirus scans
  • 6. What protection do we have? Common sense!
  • 7. Avoiding Malware on Your Nobi Avoid “mindless surfing” on the Internet Don’t click on anything unless you KNOW what it is. Don’t use filesharing applications or websites. Don’t share flash drives. Don’t install software. Don’t open emails, especially attachments, from strangers. Run Panda & Windows defender scans (quick – weekly, full – monthly).
  • 8. Avoiding Malware on Your Nobi Keep pop-up blocker turned on in any browser Always click the red “x” in the upper right corner. The “cancel” or “close” button in the pop-up might have unintended effects. Force quit (alt F4 or ctrl alt del  Task manager  application) if something suspicious pops up. If you get a message from your computer warning you that it is infected and you need to download software to remove the virus, don’t do it. Don’t mess w/security settings on ANY application. If you use sites like Facebook: Don’t install applications on pages. Don’t click on links, images, or videos