Preview

Protecting Your Computer from Viruses and Internet Attacks:

Good Essays
Open Document
Open Document
556 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Protecting Your Computer from Viruses and Internet Attacks:
The Threats of computer viruses?

Computer viruses are very risky and can damage all the data files that you have on your pc and the pc itself. There are many types of them. It injects copies of itself into other programs on your computer system. They do damage the executable programs and the system files! Or display annoying messages and popups on your screen and send infected junk emails to people from your email address.

You can notice easily if your Computer is infected throughout sending anonymous emails to friends, some programs crash suddenly and the PC will tilt, also if the computer fails to start or even more if there's weird popups appear every time on your screen.

Whenever you share documents with another computers throughout chatting rooms or from people that you don't know, swapping files from an infected disks or surfing the internet into unsecured websites and downloading files from these anonymous websites or FTP sites and opening attachments from unknown emails, YOU ARE IN A BIG RISK! And these files are in .EXE or .VBS or .COM or .BAT or .PIF formats you should be aware.

There are different types of viruses:
-Worm: make copy of itself, take control of the pc and your email and email themselves.
-Macro virus: Infects data files, word and excel rely on pseudo programming code.
-Trojan Horse: the virus in disguise usually they use the hackers
(Like the "subseven" & "NetBus" hacking program to take control of the hole PC.)
Script virus: are written in one of the script languages Java, ActiveX, or VBScript used form web pages and to create emails are activated when the script runs.

To protect yourself from viruses you shouldn't open files from people that you don't know in chat rooms, newsgroups or unreliable websites. USE ANTIVIRUS PROGRAMS it's essential or else your pc will be in danger. Use the MCAFEE antivirus it's one of the bests and many others like norton antivirus or PC cillin and always update the virus definitions!!!

You May Also Find These Documents Helpful

  • Powerful Essays

    • Never download or forward suspicious attachments. Trust only mail from contact list but always be aware messages can become infected.…

    • 2175 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It is a common sense that systems and networks should be protected from the damage caused by Trojans, viruses, and Worms. Practices that can help to prevent infection include these:…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Generally, the majority of the viruses are bundled up with outsider software to make the downloading and installation of pernicious program less demanding. It is likewise appropriated through phishing sites, undesirable taps on suspicious links and ads and pop-ups, opening spam emails messages or its related attachments, visiting dubious sites and porn sites. You can likewise infect your Windows System when you share your documents over peer to peer network. Hackers utilize some strategy to earn profit on the web. Installing plug-in, toolbar, add-on and expansions without thinking about it additionally lead to installation of TrafLab…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * This is a program which appears to be useful, what you cannot see is that the program opens your computer to users on the internet to be used maliciously. Most of the time Trojan viruses are used to turn your computer into a bot to maliciously attack more computers on the internet or in your network by spreading the same file.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Malware Lifecycle

    • 463 Words
    • 2 Pages

    Next we will discuss malware what it is and how it affects us. Malware is any kind of unwanted software that is installed without your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware. Cybercriminals sometimes try to trick you into downloading rogue (fake) security software that claims to protect you against malware. This rogue security software might ask you to pay for a fake product, install malware on your computer, or steal your personal information. To protect yourself from Malware it is important to do some of the following: make sure automatic updating is turned on to get all the latest security updates. Keep your firewall turned on. Don't open spam email messages or click links on suspicious…

    • 463 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cyp 3.3, Task 7

    • 1343 Words
    • 6 Pages

    A child or young person may unknowingly download viruses and malware; a programme that can attach itself to another programme, if this is opened through a spam email it can then damage or create files and generate unwanted behaviour to your computer.…

    • 1343 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Love Bug Research Paper

    • 1326 Words
    • 6 Pages

    They don’t know the half of it. The worm is where crap really hits the fan if you will. Going back to our best friend the love bug, that was actually a worm and not a virus. The biggest difference between the two,“A worm is a standalone program that doesn’t require user intervention to spread. Worms don’t infect existing files – they spread copies of themselves instead.” (Hoffman, 2012.) Meaning it does not need a host to leach onto spread. Also worms can be remotely accessed and used, viruses cannot. Worms typically use holes in the operating systems and back doors. Viruses need human interaction to be spread across computers whether it be sending a file by way of email or putting a file on a thumb drive. Though it does need to be physically transferred. In terms of how bad they are to a system and or network though it does differ. “Worms that spread over the network can generate a large amount of traffic, slowing down the network.” (Hoffman, 2012) A worm will make things run very slow may even make your computer restart multiple times. A virus can do similar things but a virus will corrupt files on your hard drive even possibly erase the entire thing. From what I’ve read granted the worm effects a lot more computers which for networked computers it would be a nightmare. I will have to say the virus sounds more dangerous. If your computer isn’t backed up or the important files are saved…

    • 1326 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    A major university opened a new computer lab for their Business School students. Due to the large number of students enrolled in the business school the computer lab had an overwhelming demand. The business school computer was unable to meet the overwhelming demand s the students needed to the computer lab. Therefore, Rod Stevenson, the director of the Student Computer Center decided to hold focus groups. The objective of the focus group was to determine overall student satisfaction with the lab, identify current problem areas and collect student recommendations for improvements.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Support

    • 5642 Words
    • 16 Pages

    You need to use anti-virus software to protect your own computer, and to prevent your computer from being used to pass on infections to other…

    • 5642 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    ur mama

    • 659 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Viruses can damage and/or decrease the performance of the machine they “infect”.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It255 Iloveyou Virus

    • 387 Words
    • 2 Pages

    Virus stared in Manila, Philippines on May 5th 2000, it moved to Hong Kong then Europe and then finally the US. As employees began their workday that Friday morning virus have already caused US $5.5 to 8.7 Billion in damages worldwide and estimated to cost US $15 billion to remove the worm within ten days. Over fifty million infection had been reported, it was reported that 10% of internet-connected computers in the world. Damaged cited was mostly the time and effort spent getting rid of the infection and recovering files form back up. To protect them, The Pentagon, CIA, The British Parliament and most large corporation decided to completely shut down their mail system.…

    • 387 Words
    • 2 Pages
    Good Essays