Title: Why is your computer sick?
1Why is your computer sick? And how you can cure
it
CLICK HERE TO FIND OUT
2MOST COMMON THINGS THAT WOULD MAKE YOUR COMPUTER
SICK
VIRUSES
TROJANS
SPYWARE
Click on any of the categories above to find out
3WHAT ARE COMPUTER VIRUSES?
- Human-made software programs
- Created specifically to wreak havoc on personal
computers and networks - The chance of contracting one of these computer
viruses very high
4ARE ALL VIRUSES BAD?
- Some viruses are relatively
- harmless to individuals
- They just e-mail themselves to all the contacts
listed in your address book (which makes them
harmless but annoying)
5HOW ABOUT THE BAD VIRUSES?
- Unfortunately many viruses are very destructive
- Some lie dormant until a certain date then they
spring to life to do their dirty deeds - The viruses start on one computer, then replicate
quickly, infecting computers around the world
6 WHAT ARE SOME OF THESE BAD VIRUSES?
- In 1988 a student at Cornell University sent
out a virus infecting more than 6,000 computers
in minutes, nearly bringing the Internet to its
knees. - More recently, the "I Love You" virus caused over
1 billion in lost productivity - Last year 10,000 new viruses, worms and Trojan
horses were unleashed
7 QUIZ1
Its a quiz time!!!!
Computer Virus is
- Man made software
- Violent convict from the movie Conair
- Cause for widespread stomach flu among networked
computers - Computer word processor
Go to the second quiz
8YOU GOT IT!!!
9OH NOOOOOOO!!!!
CLICK HERE SO YOU CAN REVIEW AGAIN
10WHAT ARE COMPUTER VIRUSES?
- Human-made software programs
- Created specifically to wreak havoc on personal
computers and networks - The chance of contracting one of these computer
viruses very high
11ARE ALL VIRUSES BAD?
- Some viruses are relatively
- harmless to individuals
- They just e-mail themselves to all the contacts
listed in your address book (which makes them
harmless but annoying)
12HOW ABOUT THE BAD VIRUSES?
- Unfortunately many viruses are very destructive
- Some lie dormant until a certain date then they
spring to life to do their dirty deeds - The viruses start on one computer, then replicate
quickly, infecting computers around the world
13 WHAT ARE SOME OF THESE BAD VIRUSES?
- In 1988 a student at Cornell University sent
out a virus infecting more than 6,000 computers
in minutes, nearly bringing the Internet to its
knees. - More recently, the "I Love You" virus caused over
1 billion in lost productivity - Last year 10,000 new viruses, worms and Trojan
horses were unleashed
14 QUIZ2
Are you ready? Here is another QUIZ
The I Love You Virus
- Occurs on Valentines Day
- Is in love with computers
- Caused 1 Billion in damages
- It was first featured in a romantic comedy
starring Hugh Grant
15YOU GOT IT!!!
16OH NOOOOOOO!!!!
CLICK HERE SO YOU CAN REVIEW AGAIN
17WHAT ARE COMPUTER VIRUSES?
- Human-made software programs
- Created specifically to wreak havoc on personal
computers and networks - The chance of contracting one of these computer
viruses very high
18ARE ALL VIRUSES BAD?
- Some viruses are relatively
- harmless to individuals
- They just e-mail themselves to all the contacts
listed in your address book (which makes them
harmless but annoying)
19HOW ABOUT THE BAD VIRUSES?
- Unfortunately many viruses are very destructive
- Some lie dormant until a certain date then they
spring to life to do their dirty deeds - The viruses start on one computer, then replicate
quickly, infecting computers around the world
20 WHAT ARE SOME OF THESE BAD VIRUSES?
- In 1988 a student at Cornell University sent
out a virus infecting more than 6,000 computers
in minutes, nearly bringing the Internet to its
knees. - More recently, the "I Love You" virus caused over
1 billion in lost productivity - Last year 10,000 new viruses, worms and Trojan
horses were unleashed
21 QUIZ3
Are you ready? Here is another QUIZ
The viruses hardly ever replicate themselves to
other computers
TRUE FALSE
22YOU GOT IT!!!
23OH NOOOOOOO!!!!
CLICK HERE SO YOU CAN REVIEW AGAIN
24ALWAYS RUN YOUR ANTI-VIRUS SOFTWARE AND KEEP IT
UPDATED!!!
BACK TO THE MAIN MENU
25WHAT IS TROJAN HORSE?
- Its a program that contains or installs a
malicious program - Trojan horses may appear to be useful or
interesting programs to an unsuspecting user - Trojans are very harmful when executed
26TYPES OF TROJAN HORSE
- There are two common types of Trojan horses
- Useful software that has been corrupted by a
hacker inserting malicious code - Standalone program that masquerades as something
else, like a game or image file
27MORE TYPES OF TROJANS
- There are two more types of Trojan horses
- Time bombs - activate on particular dates and/or
times. - Logic bombs - activate on certain conditions met
by the computer
28Its a quiz time!!!!
QUIZ1
What is Trojan Horse
- USC Football Mascot
- Its a program that contains or installs a
malicious program - Computer Virus
29YOU GOT IT!!!
30OH NOOOOOOO!!!!
CLICK HERE SO YOU CAN REVIEW AGAIN
31WHAT IS TROJAN HORSE?
- Its a program that contains or installs a
malicious program - Trojan horses may appear to be useful or
interesting programs to an unsuspecting user - Trojans are very harmful when executed
32TYPES OF TROJAN HORSE
- There are two common types of Trojan horses
- Useful software that has been corrupted by a
hacker inserting malicious code - Standalone program that masquerades as something
else, like a game or image file
33MORE TYPES OF TROJANS
- There are two more types of Trojan horses
- Time bombs - activate on particular dates and/or
times. - Logic bombs - activate on certain conditions met
by the computer
34ANOTHER QUIZ
QUIZ2
Which is NOT a type of Trojan
- Time Bomb
- Logic Bomb
- Water Bomb
35YOU GOT IT!!!
36OH NOOOOOOO!!!!
CLICK HERE SO YOU CAN REVIEW AGAIN
37WHAT CAN THE TROJANS DO?
- Erasing or overwriting data on a computer
- Encrypting files
- Corrupting files in a subtle way
- Upload and download files
- Allowing remote access to the victim's computer
- Opening and closing CD-ROM tray
- Harvest e-mail addresses and use them for spam
38HOW CAN YOU GET INFECTED?
- You can be infected by visiting a rogue website
- Using email
- Infection through open ports
39ANOTHER QUIZ
QUIZ3
- How can you get infected by a Trojan Horse?
- Visiting Troy
- Visiting rogue websites
- Visiting a horse farm
40YOU GOT IT!!!
41OH NOOOOOOO!!!!
CLICK HERE SO YOU CAN REVIEW AGAIN
42ALWAYS RUN YOUR ANTI-VIRUS SOFTWARE AND KEEP IT
UPDATED!!!
BACK TO THE MAIN MENU
43WHAT IS SPYWARE?
- Spyware is computer software that collects
personal information about users without their
informed consent - Its a process where personal information is
secretly recorded with a variety of techniques
such as - logging keystrokes
- recording Internet web browsing history
- scanning documents on the computer's hard disk
44HOW IS SPYWARE SPREAD?
- Spyware does not directly spread in the manner of
a computer virus or worm - The spyware stays in the infected computer where
it collects information - Spyware can be bundled with FREEWARE applications
as well - The users could be tricked by thinking they are
installing useful software
45Here comes the quiz
QUIZ1
- What is Spyware
- James Bonds latest toy
- Software that collects personal info
- Cold War relic
46YOU GOT IT!!!
47OH NOOOOOOO!!!!
CLICK HERE SO YOU CAN REVIEW AGAIN
48BEST SPYWARE PROGRAMS
- Anti-spyware programs can combat spyware in two
ways - They can provide real time protection against the
installation of spyware software - Anti-spyware software programs can be used solely
for detection and removal of spyware - Such programs inspect the contents of
- Windows registry
- Operating system file
- Installed programs
49BEST ANTI SPYWARE SOFTWARE
- SPYBOT
- Spy sweeper
- Spyware Doctor
- AVG Anti Spyware
50Here comes the quiz
QUIZ2
- Which software package doesnt belong to the
group of anti software - Windows Vista
- SPYBOT
- Spy Sweeper
51YOU GOT IT!!!
52OH NOOOOOOO!!!!
CLICK HERE SO YOU CAN REVIEW AGAIN
53ALWAYS RUN YOUR ANTI-SPYWARE SOFTWARE AND KEEP IT
UPDATED!!!
BACK TO THE MAIN MENU