Preview

Internet & Email Threats

Good Essays
Open Document
Open Document
1178 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet & Email Threats
Internet & Email Threats

Definition of a Computer Virus –
A program that infects a computer by attaching itself to another program, and propagating itself when that program is executed. A computer can become infected by files downloaded over a network, or by the installation of new software or floppy disks that are infected with viruses as well as email attachments. Some viruses are only pranks, and perform harmless actions like displaying a screen with a joke message on it. Others can destroy files or wipe out a hard drive.

Why Do People Write Computer Viruses?
Some general reasons are to experiment how to write viruses or to test their programming talent. Some get a kick out of seeing how the virus spreads, and some do it for cyber fame. One reason I can think of is the same psychology that drives vandals and arsonists. Why would someone want to break the window on someone else's car?, spray paint on buildings? Set fire to things? For some people that seems to be a thrill.

How Can I Prevent My Computer From Being Infected By A Computer Virus?
Buy a well known Anti-Virus Software such as McAfee or Norton and KEEP THE VIRUS DEFINITIONS UP TO DATE! Set it to scan email attachments and periodically scan your hard drives for infections.

Be careful of what you download from the Internet! Only download files and programs that are from trusted sources. Once downloaded, use your Anti-Virus software to scan them for viruses. Downloading music or videos from file sharing communities such as iMesh or WinMX, Etc. is a popular way of distributing viruses.

If you are using Microsoft Outlook, close the email preview pane (On the toolbar click "View" and uncheck "Preview Pane"). The reason for this is that some emails (with or without attachments) are infected with program scripts that will run when the email is opened. If the email message is viewable in the preview pane the email is technically opened and the script can execute.

Lastly, USE YOUR HEAD! If

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Messages often contain attachments that exploit weaknesses in client-side applications, or links to websites that exploit vulnerabilities in Web browsers or browser plug-ins.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. Digitally sign and Encrypt your Email. By doing this you will prevent others from the ability to open and read your email. This will ensure that it is only opened by the person you sent it to. (Ehamouda, 2009)…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    • Never download or forward suspicious attachments. Trust only mail from contact list but always be aware messages can become infected.…

    • 2175 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Don’t run executable (.exe) files from unknown sources, including thoseattached to e-mail or downloaded from Web sites.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 4 Questions IS3110

    • 398 Words
    • 1 Page

    User downloads and clicks on an unknown e-mail attachment: Effective email attachment filtering and restrictions reduce the likelihood of malicious content entering the network.…

    • 398 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Generally, the majority of the viruses are bundled up with outsider software to make the downloading and installation of pernicious program less demanding. It is likewise appropriated through phishing sites, undesirable taps on suspicious links and ads and pop-ups, opening spam emails messages or its related attachments, visiting dubious sites and porn sites. You can likewise infect your Windows System when you share your documents over peer to peer network. Hackers utilize some strategy to earn profit on the web. Installing plug-in, toolbar, add-on and expansions without thinking about it additionally lead to installation of TrafLab…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    5. Relatively small programs that infect other application software by attaching to it and disturbing application functioning…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyp 3.3, Task 7

    • 1343 Words
    • 6 Pages

    A child or young person may unknowingly download viruses and malware; a programme that can attach itself to another programme, if this is opened through a spam email it can then damage or create files and generate unwanted behaviour to your computer.…

    • 1343 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Attractiveness: we tend to develop relationships with people who are approximately as attractive as we are (tendency is called the matching hypothesis)…

    • 2285 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    A major university opened a new computer lab for their Business School students. Due to the large number of students enrolled in the business school the computer lab had an overwhelming demand. The business school computer was unable to meet the overwhelming demand s the students needed to the computer lab. Therefore, Rod Stevenson, the director of the Student Computer Center decided to hold focus groups. The objective of the focus group was to determine overall student satisfaction with the lab, identify current problem areas and collect student recommendations for improvements.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cybercriminals

    • 1700 Words
    • 7 Pages

    anti virus, anti spyware, firewalls, and spam filters are also effective ways of decreasing the risk of phishing scams associated with email.…

    • 1700 Words
    • 7 Pages
    Good Essays