Preview

first aid

Good Essays
Open Document
Open Document
622 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
first aid
Allen, Trey
MR.herbert
Web design
September.16, 2013

The effects of malware on computers in present day united states Malware-software that is intended to damage or disable computers and computer systems. Sometimes I think what does this mean until I joined web design. Some people don’t care what they open on their computer but when it crashes they get mad and go out and spend hundreds of dollars to fix it. Little do they know it is free to get rid of all they have to do is wipe their computer clean. I don’t mean with a clean rag and Windex for those who want to be a smarty pants about it.
Poison Ivy/ is one of the nastiest malware for a computer it allows the attacker to secretly control the infected user’s computer. Meaning by this it does these things without you knowing it is. Controls of the targeted computer to record or manipulate its content or even use the computer’s speaker and webcam to record audio and video. This malware is commonly known as “remote access Trojan, ” this malware was traced back to china in (2005)

Zeus/ became the go-to tool for many of today’s cyber criminals. Readily available for sale in the cyber crime underworld. It can be used to pilfer passwords as well as files, helping to create a literal underground economy for compromised identities that can be bought and sold for as little 50 cents. In the age of Internet banking and online shopping, a compromised identity is much more than just a name and social security number: it’s your address, date of birth, mother’s maiden name, and even your secret security questions. That’s why it's important to watch what you type in or register on sites.

Barrotes/ this virus was developed in Spain in the year 1993. It infected .COM, .EXE and overlay files in time and people did not know till bars started to pop up on their screens. It becomes a resident of the computer memory each time the machine starts up. Due to a series of vertical lines that appear on the monitor, it

You May Also Find These Documents Helpful

  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Trojan horse – A type of malware that cannot self-replicate, and appears to do one action, but instead infects the computer with malicious payloads.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A piece of unwanted computer software or code introduced into another program, attached to a document or exists on its own, for malicious purposes.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Ambulance, police or emergency rescue services (as a first aider, I should always stay with the casualty and send someone else to call for help if possible)…

    • 3950 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Paediatric Emergency 1st Aid

    • 3399 Words
    • 14 Pages

    Give care with confidence- it's important for everyone to be confident when giving care especially with young children as they get scared easily.…

    • 3399 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    As said by Roger Thompson, chief research officer of AVG, rouge antivirus products are common” The Bad guys are clearly making money at it”. Who hasn’t seen those much hated pop ups stating your computer is infected and needs a scan? Who now is silly enough to actually click on those? One would be surprised. Given that this article was written in 2009, it is still very relevant, and it seems like the more and more we still can’t seem to slow down those pop ups. Although now it seems like those pop ups come out of nowhere without you…

    • 722 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    First Aid

    • 467 Words
    • 2 Pages

    1.3:Explain what a risk assessment is and how this is managed in the work setting…

    • 467 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the challenges faced in the economics of information security. Economically speaking, malicious traffic…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Virus Case Study

    • 2329 Words
    • 10 Pages

    Most computer users get alarmed when they heard about the word “virus”. Virus brings a lot of damages in human’s computer works as it brought harmful effects. Viruses affect businesses’ efficiency, productivity and money as it really takes time to get rid off the threat. Viruses do easily, quickly and quietly spreading without the user 's knowledge because of the interoperability between the system and the applications.…

    • 2329 Words
    • 10 Pages
    Better Essays
  • Good Essays

    First Aid

    • 51877 Words
    • 208 Pages

    *FIELD MANUAL NO. 4-25.11 NAVY TACTICAL REFERENCE PUBLICATION NO. 4-02.1 AIR FORCE MANUAL NO. 44-163(I)…

    • 51877 Words
    • 208 Pages
    Good Essays

Related Topics