Professional Documents
Culture Documents
Set of instructions
Bob Thomas
1971
ARPANET
Reaper
THE MOS FAMOUS VIRUSES
ILOVEYOU Mellisa
One of the mos virulent Macro virus (mass mailing)
computer viruses David L. Smith
Two Filipino programers $80 million worth of
Damages of $10 billion damages
10% of the worlds 1999 Smith pleaded guilty
Internet-connected and was sentenced to 10
computers years, serving 20 months,
It sends itself to everyone in and was fined US $5,000
the users mailing list
CONCLUSION
A program code designed to copy itself into
other codes or computer files
It can come in many forms
When it is executed it replicates by
reproducing itself
Usually, it is created by a vandal hacker or
prankster
Can be very dangerous
LITERATURE
https://us.norton.com/internetsecurity-malware-what-is-a-
computer-virus.html
https://www.microsoft.com/en-us/safety/pc-security/virus-
whatis.aspx
http://www.hongkiat.com/blog/famous-malicious-
computer-viruses/
http://www.computerhope.com/issues/ch000104.htm
https://en.wikipedia.org/wiki/Computer_virus
PROTECTION FROM COMPUTER
VIRUSES
Ante Radelji
ABOUT IT
Introduction
Antivirus software
(Best antivirus softwares)
Firewall
Conclusion
Literature
INTRODUCTION
Many ways to prevent
computer viruses
Program or set of
programs
Scan files
1 year registration
AVG ANTIVIRUS
Quickly analyze threat
Real-time analysis
BITDEFENDER ANTIVIRUS PLUS
KASPERSKY ANTIVIRUS 2017
FIREWALL
The first type of security
Helps us to keep out
viruses
Comodo Firewall
Antispyware
applications
COMODO FIREWALL
Comodo Firewall is a software firewall which blocks outgoing information
such as Spyware.
CONCLUSION
There are many dangers on the Internet
Hackers can attack our computers on many
ways
There are also many and very good programs
which can protect our computer
Use strong passwords when logging into your
accounts on the Internet
LITERATURE
http://www.toptenreviews.com/software/sec
urity/best-computer-protection-software/
https://www.nbg.gr/en/transaction-
security/computer-protection
http://www.webopedia.com/TERM/V/virus_pr
otection.html
THE END