際際滷

際際滷Share a Scribd company logo
Presented By- DISHA PATEL
CLASS  VII-D
ROLL NO.- 13
SUBMITTED TO-
MRS. khusHboO sahai
A
PRESENTATION ON
COMPUTER VIRUS
Introduction
How Does It Spread
Symptoms
Prevention
Types Of Computer Virus
Boot Sector Virus
Program File Virus
Multipartite Virus
Macro Virus
Malware
Worm
Spyware
Trojen Horse
Conclusion
Computer viruses are a type of software program
that, like a biological virus, reproduces and spreads
itself.
Full Form: Vital Information Resource Under Seizes.
Some virus may display only a message on the
screen, others may slow down the Pc.
They can also erase files or even format your floppy
or hard disk and crash the system.
Creeper Virus: The first detected on APRANET in the
early 1970's.
Popular Viruses: Jerusalem or Israeli Virus, Brain or
Pakistani Virus, April First, Ping Pong or Bouncing
Ball, Stoned, Dark Avengers, Love bug, Ransomware.
 Computer viruses spread by attaching themselves to other computer
program file.
 When you exchange a file or pen drive with a virus, the virus
spreads from one computer to the another.
 Viruses also spreads when a Computer Engineer comes to repair your
system and puts his/her diagnostics disks in your PC.
Letters looks like they are falling to the bottom of the screen.
The computer system becomes slow.
The size of available free memory reduces.
The hard disk runs out of space.
The computer does not boot.
Fail to print correctly.
Restarts itself often.
Upload and use antivirus software.
 Be aware of the e- mails and attachments you open.
 Check for updates on antivirus software regularly.
 Make sure antivirus software is installed correctly.
On the computer, turn on the firewall.
Keep the computer operating system up to date.
Boot Sector Virus
Program File Virus
Multipartite Virus
Macro Virus
Infects the boot or Master Boot record (MBR), contains info about
the drive and the bootstrap loader of diskettes and hard drives
through the sharing of infected disks and pirated software
applications.
Once your hard drive is infected all diskettes that you use in your
computer will be infected.
Becomes active when the program file (usually with
extensions BIN, COM, EXE, OVL, DRV) carrying the virus is
opened.
It then makes copies of itself and will infect other programs
on the computer.
Hybrid of a Boot Sector and Program viruses.
It infects program files and when the infected
program is active it will affect the boot record.
Programmed as a macro embedded in a document, usually
found in Microsoft Word and Excel.
Once it gets in to your computer, every document you
produce will become infected.
Relatively new type of virus and may slip by your antivirus
software if you don't have the most recent version
installed.
Malware, short for malicious software, refers to any intrusive
software developed by cybercriminals (often called hackers) to steal
data and damage or destroy computers and computer systems.
Examples of common malware include viruses, worms, Trojan
viruses, spyware, adware, and ransomware.
A computer worm is a type of malware whose primary function is
to self-replicate and infect other computers while remaining active
on infected systems. A computer worm duplicates itself to spread
to uninfected computers.
Spyware is a type of malicious software -- or malware -- that is
installed on a computing device without the end user's knowledge.
It invades the device, steals sensitive information and internet
usage data, and relays it to advertisers, data firms or external
users.
Trojan horse is a program downloaded and installed on a computer
that appears harmless, but is, in fact, malicious. Unexpected
changes to computer settings and unusual activity, even when the
computer should be idle, are strong indications that a Trojan is
residing on a computer.
Computer viruses and worms can so easily
be placed into your work station so you
must be careful when going on the
internet, opening emails from unknown
users, make sure you have some kind of
anti-virus software and always get updates
so that you aren't helping to spread viruses
and worms Other people as well as
harming yourself and your pocket.
DISHA PATEL COMPUTER VIRUS PPT.pptx

More Related Content

Similar to DISHA PATEL COMPUTER VIRUS PPT.pptx (20)

Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
Dara Corporates
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
Bashdar Rahman
Computer virus
Computer virusComputer virus
Computer virus
Sammer Khizer
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
Computer virus
Computer virusComputer virus
Computer virus
Utchi
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
jenniel143
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
Computer viruses
Computer virusesComputer viruses
Computer viruses
Prabesh Shrestha
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptx
GovandJamal
COMPUTER VIRUSES AND SECURITY notes .pptx
COMPUTER VIRUSES AND SECURITY notes .pptxCOMPUTER VIRUSES AND SECURITY notes .pptx
COMPUTER VIRUSES AND SECURITY notes .pptx
zekariaswondafrash
Computer virus
 Computer virus Computer virus
Computer virus
Kawsar Ahmed
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
Sanguine_Eva
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
ainizbahari97
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
bhagatsigh
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
Rahman_Hussain
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
Computer virus
Computer virusComputer virus
Computer virus
Utchi
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
jenniel143
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptx
GovandJamal
COMPUTER VIRUSES AND SECURITY notes .pptx
COMPUTER VIRUSES AND SECURITY notes .pptxCOMPUTER VIRUSES AND SECURITY notes .pptx
COMPUTER VIRUSES AND SECURITY notes .pptx
zekariaswondafrash
Computer virus
 Computer virus Computer virus
Computer virus
Kawsar Ahmed
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
Sanguine_Eva
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
ainizbahari97
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
bhagatsigh
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
Rahman_Hussain
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto

More from CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY (12)

CP SEMINAR.pptx
CP SEMINAR.pptxCP SEMINAR.pptx
CP SEMINAR.pptx
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
tushar is - 13488.pptx
tushar is - 13488.pptxtushar is - 13488.pptx
tushar is - 13488.pptx
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
Himanshu IS 13487.pptx
Himanshu IS 13487.pptxHimanshu IS 13487.pptx
Himanshu IS 13487.pptx
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
CP SINGH IS-15410 new.pdf
CP SINGH IS-15410 new.pdfCP SINGH IS-15410 new.pdf
CP SINGH IS-15410 new.pdf
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
AMAN PPT 4985 Assignment-1.pptx
AMAN PPT 4985 Assignment-1.pptxAMAN PPT 4985 Assignment-1.pptx
AMAN PPT 4985 Assignment-1.pptx
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
ADITYA IS-4984.pptx
ADITYA IS-4984.pptxADITYA IS-4984.pptx
ADITYA IS-4984.pptx
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
Wave motion bsc
Wave motion bsc Wave motion bsc
Wave motion bsc
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
Moment of inertia (1)
Moment of inertia (1)Moment of inertia (1)
Moment of inertia (1)
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
Chemistry presentation
Chemistry presentationChemistry presentation
Chemistry presentation
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
Simple hormonic motion
Simple hormonic motionSimple hormonic motion
Simple hormonic motion
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
Chemistry presentation on xenon compounds
Chemistry presentation on xenon compoundsChemistry presentation on xenon compounds
Chemistry presentation on xenon compounds
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY
Moment of inertia (1)
Moment of inertia (1)Moment of inertia (1)
Moment of inertia (1)
CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY

Recently uploaded (20)

Philosophical Basis of Curriculum Designing
Philosophical Basis of Curriculum DesigningPhilosophical Basis of Curriculum Designing
Philosophical Basis of Curriculum Designing
Ankit Choudhary
How to Configure Credit Card in Odoo 18 Accounting
How to Configure Credit Card in Odoo 18 AccountingHow to Configure Credit Card in Odoo 18 Accounting
How to Configure Credit Card in Odoo 18 Accounting
Celine George
Policies, procedures, subject selection and QTAC.pptx
Policies, procedures, subject selection and QTAC.pptxPolicies, procedures, subject selection and QTAC.pptx
Policies, procedures, subject selection and QTAC.pptx
mansk2
Unit 2 DNS Spoofing in a BadUSB Attack.pdf
Unit 2 DNS Spoofing in a BadUSB Attack.pdfUnit 2 DNS Spoofing in a BadUSB Attack.pdf
Unit 2 DNS Spoofing in a BadUSB Attack.pdf
ChatanBawankar
Optical and non optical devices used in low vision
Optical and non optical devices used in low visionOptical and non optical devices used in low vision
Optical and non optical devices used in low vision
Aligarh Muslim University, Aligarh, Uttar Pradesh, India
TechSoup - Microsoft Discontinuation of Selected Cloud Donated Offers 2025.05...
TechSoup - Microsoft Discontinuation of Selected Cloud Donated Offers 2025.05...TechSoup - Microsoft Discontinuation of Selected Cloud Donated Offers 2025.05...
TechSoup - Microsoft Discontinuation of Selected Cloud Donated Offers 2025.05...
TechSoup
QUIZ-O-FORCE PRELIMINARY ANSWER SLIDE.pptx
QUIZ-O-FORCE PRELIMINARY ANSWER SLIDE.pptxQUIZ-O-FORCE PRELIMINARY ANSWER SLIDE.pptx
QUIZ-O-FORCE PRELIMINARY ANSWER SLIDE.pptx
Sourav Kr Podder
Primary Bash in Richmond 2025 - Literacy.pdf
Primary Bash in Richmond 2025 - Literacy.pdfPrimary Bash in Richmond 2025 - Literacy.pdf
Primary Bash in Richmond 2025 - Literacy.pdf
Faye Brownlie
Protest - Student Revision Booklet For VCE English
Protest - Student Revision Booklet For VCE EnglishProtest - Student Revision Booklet For VCE English
Protest - Student Revision Booklet For VCE English
jpinnuck
How to Automate Activities Using Odoo 18 CRM
How to Automate Activities Using Odoo 18 CRMHow to Automate Activities Using Odoo 18 CRM
How to Automate Activities Using Odoo 18 CRM
Celine George
Low Vison introduction from Aligarh Muslim University
Low Vison introduction from Aligarh Muslim UniversityLow Vison introduction from Aligarh Muslim University
Low Vison introduction from Aligarh Muslim University
Aligarh Muslim University, Aligarh, Uttar Pradesh, India
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
siemaillard
Flower Identification Class-10 by Kushal Lamichhane.pdf
Flower Identification Class-10 by Kushal Lamichhane.pdfFlower Identification Class-10 by Kushal Lamichhane.pdf
Flower Identification Class-10 by Kushal Lamichhane.pdf
kushallamichhame
Basic principles involved in the traditional systems of medicine, Chapter 7,...
Basic principles involved in the traditional systems of medicine,  Chapter 7,...Basic principles involved in the traditional systems of medicine,  Chapter 7,...
Basic principles involved in the traditional systems of medicine, Chapter 7,...
ARUN KUMAR
SAMARTH QUIZ 2024-25_ PRELIMINARY ROUNDS
SAMARTH QUIZ 2024-25_ PRELIMINARY ROUNDSSAMARTH QUIZ 2024-25_ PRELIMINARY ROUNDS
SAMARTH QUIZ 2024-25_ PRELIMINARY ROUNDS
Anand Kumar
Mixed Bag Session On 'SWOPNOSONDHANI'....
Mixed Bag Session On 'SWOPNOSONDHANI'....Mixed Bag Session On 'SWOPNOSONDHANI'....
Mixed Bag Session On 'SWOPNOSONDHANI'....
Snehanjan Das
Unit 1 Kali NetHunter is the official Kali Linux penetration testing platform...
Unit 1 Kali NetHunter is the official Kali Linux penetration testing platform...Unit 1 Kali NetHunter is the official Kali Linux penetration testing platform...
Unit 1 Kali NetHunter is the official Kali Linux penetration testing platform...
ChatanBawankar
EVALUATION AND MANAGEMENT OF OPEN FRACTURE
EVALUATION AND MANAGEMENT OF OPEN FRACTUREEVALUATION AND MANAGEMENT OF OPEN FRACTURE
EVALUATION AND MANAGEMENT OF OPEN FRACTURE
BipulBorthakur
Odoo 18 Point of Sale PWA - Odoo 際際滷s
Odoo 18 Point of Sale PWA  - Odoo  際際滷sOdoo 18 Point of Sale PWA  - Odoo  際際滷s
Odoo 18 Point of Sale PWA - Odoo 際際滷s
Celine George
Writing Research Papers: Guidance for Research Community
Writing Research Papers: Guidance for Research CommunityWriting Research Papers: Guidance for Research Community
Writing Research Papers: Guidance for Research Community
Rishi Bankim Chandra Evening College, Naihati, North 24 Parganas, West Bengal, India
Philosophical Basis of Curriculum Designing
Philosophical Basis of Curriculum DesigningPhilosophical Basis of Curriculum Designing
Philosophical Basis of Curriculum Designing
Ankit Choudhary
How to Configure Credit Card in Odoo 18 Accounting
How to Configure Credit Card in Odoo 18 AccountingHow to Configure Credit Card in Odoo 18 Accounting
How to Configure Credit Card in Odoo 18 Accounting
Celine George
Policies, procedures, subject selection and QTAC.pptx
Policies, procedures, subject selection and QTAC.pptxPolicies, procedures, subject selection and QTAC.pptx
Policies, procedures, subject selection and QTAC.pptx
mansk2
Unit 2 DNS Spoofing in a BadUSB Attack.pdf
Unit 2 DNS Spoofing in a BadUSB Attack.pdfUnit 2 DNS Spoofing in a BadUSB Attack.pdf
Unit 2 DNS Spoofing in a BadUSB Attack.pdf
ChatanBawankar
TechSoup - Microsoft Discontinuation of Selected Cloud Donated Offers 2025.05...
TechSoup - Microsoft Discontinuation of Selected Cloud Donated Offers 2025.05...TechSoup - Microsoft Discontinuation of Selected Cloud Donated Offers 2025.05...
TechSoup - Microsoft Discontinuation of Selected Cloud Donated Offers 2025.05...
TechSoup
QUIZ-O-FORCE PRELIMINARY ANSWER SLIDE.pptx
QUIZ-O-FORCE PRELIMINARY ANSWER SLIDE.pptxQUIZ-O-FORCE PRELIMINARY ANSWER SLIDE.pptx
QUIZ-O-FORCE PRELIMINARY ANSWER SLIDE.pptx
Sourav Kr Podder
Primary Bash in Richmond 2025 - Literacy.pdf
Primary Bash in Richmond 2025 - Literacy.pdfPrimary Bash in Richmond 2025 - Literacy.pdf
Primary Bash in Richmond 2025 - Literacy.pdf
Faye Brownlie
Protest - Student Revision Booklet For VCE English
Protest - Student Revision Booklet For VCE EnglishProtest - Student Revision Booklet For VCE English
Protest - Student Revision Booklet For VCE English
jpinnuck
How to Automate Activities Using Odoo 18 CRM
How to Automate Activities Using Odoo 18 CRMHow to Automate Activities Using Odoo 18 CRM
How to Automate Activities Using Odoo 18 CRM
Celine George
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
siemaillard
Flower Identification Class-10 by Kushal Lamichhane.pdf
Flower Identification Class-10 by Kushal Lamichhane.pdfFlower Identification Class-10 by Kushal Lamichhane.pdf
Flower Identification Class-10 by Kushal Lamichhane.pdf
kushallamichhame
Basic principles involved in the traditional systems of medicine, Chapter 7,...
Basic principles involved in the traditional systems of medicine,  Chapter 7,...Basic principles involved in the traditional systems of medicine,  Chapter 7,...
Basic principles involved in the traditional systems of medicine, Chapter 7,...
ARUN KUMAR
SAMARTH QUIZ 2024-25_ PRELIMINARY ROUNDS
SAMARTH QUIZ 2024-25_ PRELIMINARY ROUNDSSAMARTH QUIZ 2024-25_ PRELIMINARY ROUNDS
SAMARTH QUIZ 2024-25_ PRELIMINARY ROUNDS
Anand Kumar
Mixed Bag Session On 'SWOPNOSONDHANI'....
Mixed Bag Session On 'SWOPNOSONDHANI'....Mixed Bag Session On 'SWOPNOSONDHANI'....
Mixed Bag Session On 'SWOPNOSONDHANI'....
Snehanjan Das
Unit 1 Kali NetHunter is the official Kali Linux penetration testing platform...
Unit 1 Kali NetHunter is the official Kali Linux penetration testing platform...Unit 1 Kali NetHunter is the official Kali Linux penetration testing platform...
Unit 1 Kali NetHunter is the official Kali Linux penetration testing platform...
ChatanBawankar
EVALUATION AND MANAGEMENT OF OPEN FRACTURE
EVALUATION AND MANAGEMENT OF OPEN FRACTUREEVALUATION AND MANAGEMENT OF OPEN FRACTURE
EVALUATION AND MANAGEMENT OF OPEN FRACTURE
BipulBorthakur
Odoo 18 Point of Sale PWA - Odoo 際際滷s
Odoo 18 Point of Sale PWA  - Odoo  際際滷sOdoo 18 Point of Sale PWA  - Odoo  際際滷s
Odoo 18 Point of Sale PWA - Odoo 際際滷s
Celine George

DISHA PATEL COMPUTER VIRUS PPT.pptx

  • 1. Presented By- DISHA PATEL CLASS VII-D ROLL NO.- 13 SUBMITTED TO- MRS. khusHboO sahai A PRESENTATION ON COMPUTER VIRUS
  • 2. Introduction How Does It Spread Symptoms Prevention Types Of Computer Virus Boot Sector Virus Program File Virus Multipartite Virus Macro Virus Malware Worm Spyware Trojen Horse Conclusion
  • 3. Computer viruses are a type of software program that, like a biological virus, reproduces and spreads itself. Full Form: Vital Information Resource Under Seizes. Some virus may display only a message on the screen, others may slow down the Pc. They can also erase files or even format your floppy or hard disk and crash the system. Creeper Virus: The first detected on APRANET in the early 1970's. Popular Viruses: Jerusalem or Israeli Virus, Brain or Pakistani Virus, April First, Ping Pong or Bouncing Ball, Stoned, Dark Avengers, Love bug, Ransomware.
  • 4. Computer viruses spread by attaching themselves to other computer program file. When you exchange a file or pen drive with a virus, the virus spreads from one computer to the another. Viruses also spreads when a Computer Engineer comes to repair your system and puts his/her diagnostics disks in your PC.
  • 5. Letters looks like they are falling to the bottom of the screen. The computer system becomes slow. The size of available free memory reduces. The hard disk runs out of space. The computer does not boot. Fail to print correctly. Restarts itself often.
  • 6. Upload and use antivirus software. Be aware of the e- mails and attachments you open. Check for updates on antivirus software regularly. Make sure antivirus software is installed correctly. On the computer, turn on the firewall. Keep the computer operating system up to date.
  • 7. Boot Sector Virus Program File Virus Multipartite Virus Macro Virus
  • 8. Infects the boot or Master Boot record (MBR), contains info about the drive and the bootstrap loader of diskettes and hard drives through the sharing of infected disks and pirated software applications. Once your hard drive is infected all diskettes that you use in your computer will be infected.
  • 9. Becomes active when the program file (usually with extensions BIN, COM, EXE, OVL, DRV) carrying the virus is opened. It then makes copies of itself and will infect other programs on the computer.
  • 10. Hybrid of a Boot Sector and Program viruses. It infects program files and when the infected program is active it will affect the boot record.
  • 11. Programmed as a macro embedded in a document, usually found in Microsoft Word and Excel. Once it gets in to your computer, every document you produce will become infected. Relatively new type of virus and may slip by your antivirus software if you don't have the most recent version installed.
  • 12. Malware, short for malicious software, refers to any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware.
  • 13. A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems. A computer worm duplicates itself to spread to uninfected computers.
  • 14. Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
  • 15. Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.
  • 16. Computer viruses and worms can so easily be placed into your work station so you must be careful when going on the internet, opening emails from unknown users, make sure you have some kind of anti-virus software and always get updates so that you aren't helping to spread viruses and worms Other people as well as harming yourself and your pocket.