SlideShare una empresa de Scribd logo
1 de 35
What happened to my Computer? Scott Meech SMeech.net
Ever felt like this guy?
Computers Hate Me ,[object Object],[object Object]
What is a Computer Virus?
What is a Computer Virus? ,[object Object]
How scary are they?
How many viruses are out there?
Viruses, Worms, Trojan Horses ,[object Object],[object Object],[object Object]
Current Virus Status North America
What happens to your Computer?
Viruses are Serious… but… ,[object Object]
10 Most Dangerous Things Users Do Online
10 Most Dangerous Things Users Do Online ,[object Object],[object Object],[object Object],[object Object]
10 Most Dangerous Things Users Do Online ,[object Object],[object Object],[object Object],[object Object]
10 Most Dangerous Things Users Do Online ,[object Object],[object Object]
Malware ,[object Object],[object Object],[object Object]
Adware ,[object Object]
Example Adware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hoaxes ,[object Object],[object Object]
Spoofing ,[object Object],[object Object],[object Object]
Phishing – Top 5 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ebay Example
Looks Safe to Me ,[object Object]
Secure Purchasing ,[object Object],[object Object]
Downloadable Toolbars Who are they targeting with these?
Screensavers and Games for Free ,[object Object],[object Object],[object Object]
What can you Do?
Perform Basic Computer Safety Maintenance ,[object Object],[object Object],[object Object],[object Object]
Use an Internet Firewall ,[object Object],[object Object]
Use an Internet Firewall ,[object Object],[object Object]
Others? ,[object Object],[object Object],[object Object]
Get Professional Help …  Pay for it sometimes
Google It ,[object Object]
Use Anti-Virus Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prevent Adware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
amy.covington215944
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
ikmal91
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
 

La actualidad más candente (18)

Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
spyware
spywarespyware
spyware
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Adware
AdwareAdware
Adware
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
IT viruses
 IT viruses IT viruses
IT viruses
 

Similar a Safety Plano Library June 4 Main

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Connecting Up
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 

Similar a Safety Plano Library June 4 Main (20)

Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
Computer Based Crime
Computer Based CrimeComputer Based Crime
Computer Based Crime
 
Spyware
SpywareSpyware
Spyware
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Computer security
Computer securityComputer security
Computer security
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
virus
virusvirus
virus
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 

Más de smeech

Keynote - SBI
Keynote - SBIKeynote - SBI
Keynote - SBI
smeech
 
Peter Senge
Peter SengePeter Senge
Peter Senge
smeech
 

Más de smeech (11)

Keynote - SBI
Keynote - SBIKeynote - SBI
Keynote - SBI
 
IEAR.org - ISLMA2010
IEAR.org - ISLMA2010IEAR.org - ISLMA2010
IEAR.org - ISLMA2010
 
Classroom live 2.0 Session
Classroom live 2.0 SessionClassroom live 2.0 Session
Classroom live 2.0 Session
 
Peter Senge
Peter SengePeter Senge
Peter Senge
 
Techniques for "Safe" Life Long Learning and Higher Level Thinking via Techno...
Techniques for "Safe" Life Long Learning and Higher Level Thinking via Techno...Techniques for "Safe" Life Long Learning and Higher Level Thinking via Techno...
Techniques for "Safe" Life Long Learning and Higher Level Thinking via Techno...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Comic Life Creativity
Comic  Life  CreativityComic  Life  Creativity
Comic Life Creativity
 
Allisonaustincatherine
AllisonaustincatherineAllisonaustincatherine
Allisonaustincatherine
 
Cyberbullying Renee
Cyberbullying   ReneeCyberbullying   Renee
Cyberbullying Renee
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
IL DEN Council Members
IL DEN Council MembersIL DEN Council Members
IL DEN Council Members
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

Safety Plano Library June 4 Main