Presentation is loading. Please wait.

Presentation is loading. Please wait.

Viruses Hackers! Backups!.  Computer viruses are programs written by "mean" people. These virus programs are placed into a commonly used program so.

Similar presentations


Presentation on theme: "Viruses Hackers! Backups!.  Computer viruses are programs written by "mean" people. These virus programs are placed into a commonly used program so."— Presentation transcript:

1 Viruses Hackers! Backups!

2

3  Computer viruses are programs written by "mean" people. These virus programs are placed into a commonly used program so that program will run the attached virus program as it boots, therefore, it is said that the virus "infects" the file or program. Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive. Many viruses do nothing more than display a message or make sounds / verbal comments at a certain time or a programming event after replicating themselves to be picked up by other users one way or another. Other viruses make your computer's system behave erratically or crash frequently. Sadly many people who have problems or frequent crashes using their computers do not realise that they have a virus and live with the inconveniences. w The damage a computer virus can inflict on your system depends on many things, including how sophisticated the virus is. Here is a short listing of the types of damage viruses can do to your computer - they can really hit you where it hurts: - Some viruses can delete or change files. Some viruses will delete all of your documents, or even reformat your hard drive, making your computer unusable. - Some viruses can release confidential information like credit card information, account numbers, and passwords by emailing it to random email addresses or the address of the virus writer. - Some viruses can slow down your system dramatically. - Some viruses plant monitoring software or change security settings that allow hackers to enter your computer without you knowing about it and steal information or control it. Other viruses, like Internet worms they can also have effects on computer networks and the Internet.

4 w In case your computer got infected, try the following:  Get an Antivirus program (if you don't have one already)  Update your Antivirus  Scan all your computer and delete, repair or quarantine the infected files.  Run Malwarebytes Anti-Malware Run the anti spyware removal programs spybot and Superanti-spyware Run a complete scan with free curing utility Dr.Web Cure it! Install threat fire which will enhance your anti virus protection and protect you against unknown Trojans and spyware Then do an Online virus scan.

5

6 Are there drawbacks to using anti-virus software?  Viruses. Viruses. Viruses. Although good prevention is necessary, it is impossible to completely stop systems from becoming infected with a virus. With all the viruses around, everyone needs good anti-virus software. But what is anti-virus software, and what does it do?  Anti-virus software helps stop getting dangerous viruses and effecting your computer.  Good anti virus software costs a lot of money, plus the yearly (and sometimes monthly) fee, and some anti virus software updates every day, which can slow down your internet connection when you start up your internet every day.  There is a wide variety of anti-virus software which use many different techniques. Each has advantages and disadvantages. In truth, a good anti-virus program utilizes multiple techniques and formats. Not using any anti-virus software would be the worst thing to do. There is not one perfect program that suits everyone's needs.

7 Thank you for reading my slide show and I hope you have learnt all the good information needed to help you understand the consequences and all about viruses. Don’t forget to ask your parents for you any questions if need be.

8

9 w Hacking is unauthorised use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications). w Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called Hacking. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession. Some hackers claim this term is offensive and fails to give appropriate recognition to their skills.  Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

10 –Username: system Password: manager Welcome to ABL Computer Research Lab. You have five new messages.  That is how easy it was to hack into a computer network. The most prominent definition of hacking is the act of gaining access without legal authorisation to a computer or computer network. A hacker first attacks an easy target, and then uses it to hide his or her traces for launching attacks at more secure sites. The goal of an attack is to gain complete control of the system (so you can edit, delete, install, or execute any file in any user’s directory), often by gaining access to a "super-user" account. This will allow both maximum access and the ability to hide your presence.

11 w This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Some backdoor programs even allow a hacker to listen in on your conversations using your computer's microphone if one is attached!

12  You've heard the term hacker, you know they can cause damage and create havoc, but do you know what a hacker is? A hacker is a programmer able to get into a system or gain unauthorised access by skilful strategy. Hackers can be useful for maintaining a system and is constantly searching for security deficiencies. They can be the guardians of the security system. They also can turn that around and do more harm then good. A hacker is a skilled programmer who can write software expertly and swiftly. They can crack nearly any code and get into any computer system. Some of the more famous computer systems that have been hacked are corporations such as McDonalds, and to federal websites that have extremely sensitive information. Highly skilled hackers have hacked into Griffith Air Force Base, NASA, the US Department of Justice, and the US Air Force. Hackers have their own underground network where they exchange triumphs and share techniques to hack into new programs or skirt any protective software. You should not tell them your password as they may be able to tell other people and hack your account!

13

14 w Backup is the activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe. Backup is usually a routine part of the operation of large businesses with mainframes as well as the administrators of smaller business computers. For personal computer users, backup is also necessary but often neglected. The retrieval of files you backed up is called restoring them. w Personal computer users can consider both local backup and Internet backup.

15 w Backing up your work provides insurance that you will be able to restore your work from a backup copy if the original is lost due to theft, accident, hardware failure, software bugs, or a computer virus. Your only hope of protection is a good backup! w At a minimum, you should backup your most important work and other files that would be difficult to replace (e.g., thesis, final papers, research data, address books, etc). You may also want to backup serial numbers and license codes for personal software, as well as preference files for specific software. If these files are backed up, reinstallation of your operating system and software will be much easier. w Mac and Windows computers store data for each user account in a specific folder. This includes files saved to the desktop, your documents folder, as well as some software preferences. Backing up this folder will preserve much of your user data.

16  So basically where should you put your memory sticks, discs, floppy discs etc. Well do not put it in reach of children or dogs or anything that can harm the user or harm anything else. Do not put it next to your computer as that is the first place people will look! You will put as far away as your computer as possible.

17 w An unorganised computer makes it more difficult to find information, and a computer that is cluttered with unnecessary files and email messages can be sluggish. So if you haven’t organised your computer recently and it’s running slower than you’d like (or you’re having trouble finding things), the tips in this article can help you delete or move old files and email and can even help you do a thorough cleanup.

18 w It is very highly uncertain and unpredictable when the computer fails or the files go wrong. When such a thing happens, all the files stored and all information in them are irretrievably lost for ever. Hence the importance of keeping the computer back up files separately in order to recoup them in case of loss.Security for data back up information does not mean safety from theft or intrusion. It means protection from damage that has affected your main file system. Starting back up files on the same computer hard drive as the original files will result in their loss if the hard drive is affected.

19 By Emily James Thank you for reading my presentation for the club of Brownies!


Download ppt "Viruses Hackers! Backups!.  Computer viruses are programs written by "mean" people. These virus programs are placed into a commonly used program so."

Similar presentations


Ads by Google