90 likes | 233 Views
Things That Could Go Wrong On The Internet?. Viruses Hackers Fraud Cyber Bullying. Viruses. Viruses can kill your computer. They can cost hundreds to fix and clear the hardrive. Love Hearts Tennis Anyone? Clez The Conqueror Explorer Home. Love Hearts.
E N D
ThingsThatCouldGoWrongOnTheInternet? Viruses Hackers Fraud Cyber Bullying
Viruses Viruses can kill your computer. They can cost hundreds to fix and clear the hardrive. Love Hearts Tennis Anyone? Clez The Conqueror Explorer Home
LoveHearts Love Letter is the worm everyone learned to hate in spring 2000. The infection affected millions of computers and caused more damage than any other computer virus to date. Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook's address book entries. The mail included an executable file attachment with the e-mail subject line, "ILOVEYOU." The worm had the ability to overwrite several types of files, including .gif and .jpg files. Viruses
ClezTheConqueror The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn't as destructive as other worms, but it is widespread, hard to exterminate--and still active. In fact, so far, no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail--regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It may corrupt files and disable antivirus products. Viruses
TennisAnyone ? The Anna Kournikova (or VBS.SST@mm) worm, appearing in February 2001, didn't cause data loss, although in the process of boosting the profile of its namesake, the Russian tennis player, it did cause embarrassment and disruption for many personal and business users. The worm showed up in Microsoft Outlook users' e-mail in-boxes with an attachment (supposedly a picture of Kournikova). The attachment proved hard to resist. The result? Clicking the bogus attachment sent copies of the worm via e-mail to all addresses found in the victim's Outlook address book Viruses
Explorer The Explorer.zip worm appeared in the summer of 1999, following in the footsteps of Melissa. The worm deleted Word, Excel, and PowerPoint files and randomly altered other types of files. Like Melissa (see below), Explorer traveled via e-mails that appeared to be from someone the recipient knew. The message included a file that, if activated, showed a fake error message to the user. Unlike Melissa, this virus did not use Outlook to gather e-mail addresses. Viruses
Hacking Hacking is when someone steals or gets hold of your password or account details and then looks at your personal information. If it happens to you it is never nice. They may even pretend to be you and start to talk to your online contacts using your profile. Home
Fraud The Internet offers a global marketplace for consumers and businesses. But crooks also recognize the potentials of cyberspace. The same scams that have been conducted by mail and phone can now be found on the World Wide Web and in email, and new cyber scams are emerging. It's sometimes hard to tell the difference between reputable online sellers and criminals who use the Internet to rob people. You can protect yourself by learning how to recognize the danger signs of fraud. If you are a victim or attempted victim of Internet fraud, it's important to report the scam quickly so that law enforcement agencies can shut the fraudulent operations down. Home
CyberBullying We don’t tolerate bullying in schools or anywhere else so why would we put up with receiving messages or images that are upsetting online. It is just the same and when done continuously it is another form of bullying often called cyber bullying and may include pictures, text, phone calls and hits on your social networking profile. HOME