1 / 9

Things That Could Go Wrong On The Internet?

Things That Could Go Wrong On The Internet?. Viruses Hackers Fraud Cyber Bullying. Viruses. Viruses can kill your computer. They can cost hundreds to fix and clear the hardrive. Love Hearts Tennis Anyone? Clez The Conqueror Explorer Home. Love Hearts.

selia
Download Presentation

Things That Could Go Wrong On The Internet?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ThingsThatCouldGoWrongOnTheInternet? Viruses Hackers Fraud Cyber Bullying

  2. Viruses Viruses can kill your computer. They can cost hundreds to fix and clear the hardrive. Love Hearts Tennis Anyone? Clez The Conqueror Explorer Home

  3. LoveHearts Love Letter is the worm everyone learned to hate in spring 2000. The infection affected millions of computers and caused more damage than any other computer virus to date. Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook's address book entries. The mail included an executable file attachment with the e-mail subject line, "ILOVEYOU." The worm had the ability to overwrite several types of files, including .gif and .jpg files. Viruses

  4. ClezTheConqueror The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn't as destructive as other worms, but it is widespread, hard to exterminate--and still active. In fact, so far, no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail--regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It may corrupt files and disable antivirus products. Viruses

  5. TennisAnyone ? The Anna Kournikova (or VBS.SST@mm) worm, appearing in February 2001, didn't cause data loss, although in the process of boosting the profile of its namesake, the Russian tennis player, it did cause embarrassment and disruption for many personal and business users. The worm showed up in Microsoft Outlook users' e-mail in-boxes with an attachment (supposedly a picture of Kournikova). The attachment proved hard to resist. The result? Clicking the bogus attachment sent copies of the worm via e-mail to all addresses found in the victim's Outlook address book Viruses

  6. Explorer The Explorer.zip worm appeared in the summer of 1999, following in the footsteps of Melissa. The worm deleted Word, Excel, and PowerPoint files and randomly altered other types of files. Like Melissa (see below), Explorer traveled via e-mails that appeared to be from someone the recipient knew. The message included a file that, if activated, showed a fake error message to the user. Unlike Melissa, this virus did not use Outlook to gather e-mail addresses. Viruses

  7. Hacking Hacking is when someone steals or gets hold of your password or account details and then looks at your personal information. If it happens to you it is never nice. They may even pretend to be you and start to talk to your online contacts using your profile. Home

  8. Fraud The Internet offers a global marketplace for consumers and businesses. But crooks also recognize the potentials of cyberspace. The same scams that have been conducted by mail and phone can now be found on the World Wide Web and in email, and new cyber scams are emerging. It's sometimes hard to tell the difference between reputable online sellers and criminals who use the Internet to rob people. You can protect yourself by learning how to recognize the danger signs of fraud. If you are a victim or attempted victim of Internet fraud, it's important to report the scam quickly so that law enforcement agencies can shut the fraudulent operations down. Home

  9. CyberBullying We don’t tolerate bullying in schools or anywhere else so why would we put up with receiving messages or images that are upsetting online. It is just the same and when done continuously it is another form of bullying often called cyber bullying and may include pictures, text, phone calls and hits on your social networking profile. HOME

More Related