SlideShare uma empresa Scribd logo
1 de 70
Viruses, Spyware and Spam … Oh, My! A Presentation By Joel May
What We’ll Talk About ,[object Object],[object Object],[object Object]
Just What Are These Things?
Just What Are These Things? ,[object Object],Viruses
Just What Are These Things? ,[object Object],[object Object],Worms and Trojan Horses
Just What Are These Things? ,[object Object],[object Object],[object Object],Spyware
Just What Are These Things? ,[object Object],[object Object],Spam
Where Do They Come From?
Where Do They Come From? ,[object Object],[object Object],[object Object],Viruses, Worms and Trojan Horses
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],Spyware
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],[object Object],Spyware vs. Cookies
Where Do They Come From? Spam ,[object Object],[object Object],[object Object]
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spam
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],Spam
 
 
 
What Can They Do To You?
What Can They Do To You? ,[object Object],[object Object],[object Object],[object Object],Viruses
What Can They Do To You? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spyware
What Can They Do To You? ,[object Object],[object Object],[object Object],Spam
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Can You Do About Them?
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],You Need Six Things to Defeat Them
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls
What Can You Do About Them? ,[object Object],[object Object],Firewalls
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Firewalls – The Common Sense Dimension
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Viruses
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Viruses – Use Windows Update
What Can You Do About Them? ,[object Object],[object Object],Viruses – Use Windows Update
What Can You Do About Them? ,[object Object],[object Object],[object Object],Viruses – Watch Startup Processes
What Can You Do About Them? ,[object Object],[object Object],[object Object],Viruses – Watch File Extensions
What Can You Do About Them? Viruses – Watch File Extensions You need to watch out for  .exe .com .bat .bas .chm .cm .cpl .pif .reg .scr .hlp .sct .shs .inf .mdb .vb .vbe .vbs .wsf .wsh And some other, less common ones as well
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Viruses – Watch File Extensions
What Can You Do About Them? Viruses – Watch File Extensions Step 1: Step 2:
What Can You Do About Them? Viruses – Watch File Extensions Step 3: Step 4:
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Viruses – Always Use Anti-Virus Software But  ONLY ONE ,[object Object],[object Object],[object Object]
What Can You Do About Them? ,[object Object],[object Object],Viruses – Always Use Anti-Virus Software
What Can You Do About Them? ,[object Object],[object Object],[object Object],Viruses – Always Use Anti-Virus Software
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Viruses – Up to Date Virus Definitions
What Can You Do About Them? ,[object Object],[object Object],Viruses – Never Open Questionable E-mail Attachments
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],Viruses – Don’t Automatically Preview E-mail
What Can You Do About Them? ,[object Object],Viruses – The Common Sense Dimension ,[object Object],[object Object],[object Object],. Thus you should be extremely careful and continually aware of the traffic between your  computer and the outside world (e-mail and web  browsing)
What Can You Do About Them? ,[object Object],[object Object],Viruses – The Common Sense Dimension
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],[object Object],Spyware – The Common Sense Dimension
What Can You Do About Them? ,[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],Spam ,[object Object],[object Object]
What Can You Do About Them? ,[object Object],Spam ,[object Object]
What Can You Do About Them? ,[object Object],Spam ,[object Object]
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],Spam – The Common Sense Dimension
What Do I Do About Them?
What Do I Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Do I Do About Them? ,[object Object],[object Object],[object Object]
What Do I Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Do I Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Summary
Google and AARP to the Rescue ,[object Object],[object Object],[object Object]
While the people retain their virtue and vigilance, no agent, by any extreme of wickedness or folly, can very seriously injure. - Abraham Lincoln
The End

Mais conteúdo relacionado

Mais procurados

Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Akhil Sharma
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
amy.covington215944
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 

Mais procurados (20)

Spyware
SpywareSpyware
Spyware
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Spyware
SpywareSpyware
Spyware
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
Spyware
SpywareSpyware
Spyware
 
spyware
spyware spyware
spyware
 
spyware
spywarespyware
spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Spyware
SpywareSpyware
Spyware
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Malware
MalwareMalware
Malware
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 

Semelhante a Viruses Spyware and Spam, Oh My!

4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
richarddxd
 

Semelhante a Viruses Spyware and Spam, Oh My! (20)

Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Virus
VirusVirus
Virus
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 

Mais de Joel May

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
Joel May
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
Joel May
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
Joel May
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash drive
Joel May
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creation
Joel May
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
Joel May
 
Free software
Free softwareFree software
Free software
Joel May
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystified
Joel May
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?
Joel May
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable Storage
Joel May
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the Web
Joel May
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your Computer
Joel May
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of Google
Joel May
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to Word
Joel May
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricks
Joel May
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to Excel
Joel May
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktop
Joel May
 
Audio on the web
Audio on the webAudio on the web
Audio on the web
Joel May
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard drive
Joel May
 

Mais de Joel May (20)

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash drive
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creation
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
 
Free software
Free softwareFree software
Free software
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystified
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable Storage
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the Web
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your Computer
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of Google
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to Word
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricks
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to Excel
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktop
 
Audio on the web
Audio on the webAudio on the web
Audio on the web
 
Your family legacy
Your family legacyYour family legacy
Your family legacy
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard drive
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Viruses Spyware and Spam, Oh My!

  • 1. Viruses, Spyware and Spam … Oh, My! A Presentation By Joel May
  • 2.
  • 3. Just What Are These Things?
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Where Do They Come From?
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.  
  • 16.  
  • 17.  
  • 18. What Can They Do To You?
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. What Can You Do About Them?
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. What Can You Do About Them? Viruses – Watch File Extensions You need to watch out for .exe .com .bat .bas .chm .cm .cpl .pif .reg .scr .hlp .sct .shs .inf .mdb .vb .vbe .vbs .wsf .wsh And some other, less common ones as well
  • 35.
  • 36. What Can You Do About Them? Viruses – Watch File Extensions Step 1: Step 2:
  • 37. What Can You Do About Them? Viruses – Watch File Extensions Step 3: Step 4:
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. What Do I Do About Them?
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69. While the people retain their virtue and vigilance, no agent, by any extreme of wickedness or folly, can very seriously injure. - Abraham Lincoln