SlideShare une entreprise Scribd logo
1  sur  70
Viruses, Spyware and Spam … Oh, My! A Presentation By Joel May
What We’ll Talk About ,[object Object],[object Object],[object Object]
Just What Are These Things?
Just What Are These Things? ,[object Object],Viruses
Just What Are These Things? ,[object Object],[object Object],Worms and Trojan Horses
Just What Are These Things? ,[object Object],[object Object],[object Object],Spyware
Just What Are These Things? ,[object Object],[object Object],Spam
Where Do They Come From?
Where Do They Come From? ,[object Object],[object Object],[object Object],Viruses, Worms and Trojan Horses
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],Spyware
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],[object Object],Spyware vs. Cookies
Where Do They Come From? Spam ,[object Object],[object Object],[object Object]
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spam
Where Do They Come From? ,[object Object],[object Object],[object Object],[object Object],Spam
 
 
 
What Can They Do To You?
What Can They Do To You? ,[object Object],[object Object],[object Object],[object Object],Viruses
What Can They Do To You? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spyware
What Can They Do To You? ,[object Object],[object Object],[object Object],Spam
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Can You Do About Them?
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],You Need Six Things to Defeat Them
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls
What Can You Do About Them? ,[object Object],[object Object],Firewalls
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Firewalls – The Common Sense Dimension
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Viruses
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Viruses – Use Windows Update
What Can You Do About Them? ,[object Object],[object Object],Viruses – Use Windows Update
What Can You Do About Them? ,[object Object],[object Object],[object Object],Viruses – Watch Startup Processes
What Can You Do About Them? ,[object Object],[object Object],[object Object],Viruses – Watch File Extensions
What Can You Do About Them? Viruses – Watch File Extensions You need to watch out for  .exe .com .bat .bas .chm .cm .cpl .pif .reg .scr .hlp .sct .shs .inf .mdb .vb .vbe .vbs .wsf .wsh And some other, less common ones as well
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Viruses – Watch File Extensions
What Can You Do About Them? Viruses – Watch File Extensions Step 1: Step 2:
What Can You Do About Them? Viruses – Watch File Extensions Step 3: Step 4:
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Viruses – Always Use Anti-Virus Software But  ONLY ONE ,[object Object],[object Object],[object Object]
What Can You Do About Them? ,[object Object],[object Object],Viruses – Always Use Anti-Virus Software
What Can You Do About Them? ,[object Object],[object Object],[object Object],Viruses – Always Use Anti-Virus Software
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Viruses – Up to Date Virus Definitions
What Can You Do About Them? ,[object Object],[object Object],Viruses – Never Open Questionable E-mail Attachments
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],Viruses – Don’t Automatically Preview E-mail
What Can You Do About Them? ,[object Object],Viruses – The Common Sense Dimension ,[object Object],[object Object],[object Object],. Thus you should be extremely careful and continually aware of the traffic between your  computer and the outside world (e-mail and web  browsing)
What Can You Do About Them? ,[object Object],[object Object],Viruses – The Common Sense Dimension
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Spyware
What Can You Do About Them? ,[object Object],[object Object],[object Object],Spyware – The Common Sense Dimension
What Can You Do About Them? ,[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],Spam ,[object Object],[object Object]
What Can You Do About Them? ,[object Object],Spam ,[object Object]
What Can You Do About Them? ,[object Object],Spam ,[object Object]
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spam
What Can You Do About Them? ,[object Object],[object Object],[object Object],Spam – The Common Sense Dimension
What Do I Do About Them?
What Do I Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Do I Do About Them? ,[object Object],[object Object],[object Object]
What Do I Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Do I Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Can You Do About Them? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Summary
Google and AARP to the Rescue ,[object Object],[object Object],[object Object]
While the people retain their virtue and vigilance, no agent, by any extreme of wickedness or folly, can very seriously injure. - Abraham Lincoln
The End

Contenu connexe

Tendances (20)

Spyware
SpywareSpyware
Spyware
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Spyware
SpywareSpyware
Spyware
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
Spyware
SpywareSpyware
Spyware
 
spyware
spyware spyware
spyware
 
spyware
spywarespyware
spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Spyware
SpywareSpyware
Spyware
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Malware
MalwareMalware
Malware
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 

Similaire à Viruses Spyware and Spam, Oh My!

Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptDiveshK4
 

Similaire à Viruses Spyware and Spam, Oh My! (20)

Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Virus
VirusVirus
Virus
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 

Plus de Joel May

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photosJoel May
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photosJoel May
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash driveJoel May
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creationJoel May
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use GmailJoel May
 
Free software
Free softwareFree software
Free softwareJoel May
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystifiedJoel May
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?Joel May
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable StorageJoel May
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the WebJoel May
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your ComputerJoel May
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of GoogleJoel May
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to WordJoel May
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricksJoel May
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to ExcelJoel May
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktopJoel May
 
Audio on the web
Audio on the webAudio on the web
Audio on the webJoel May
 
Your family legacy
Your family legacyYour family legacy
Your family legacyJoel May
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard driveJoel May
 

Plus de Joel May (20)

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash drive
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creation
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
 
Free software
Free softwareFree software
Free software
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystified
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable Storage
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the Web
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your Computer
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of Google
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to Word
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricks
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to Excel
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktop
 
Audio on the web
Audio on the webAudio on the web
Audio on the web
 
Your family legacy
Your family legacyYour family legacy
Your family legacy
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard drive
 

Dernier

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Dernier (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Viruses Spyware and Spam, Oh My!

  • 1. Viruses, Spyware and Spam … Oh, My! A Presentation By Joel May
  • 2.
  • 3. Just What Are These Things?
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Where Do They Come From?
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.  
  • 16.  
  • 17.  
  • 18. What Can They Do To You?
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. What Can You Do About Them?
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. What Can You Do About Them? Viruses – Watch File Extensions You need to watch out for .exe .com .bat .bas .chm .cm .cpl .pif .reg .scr .hlp .sct .shs .inf .mdb .vb .vbe .vbs .wsf .wsh And some other, less common ones as well
  • 35.
  • 36. What Can You Do About Them? Viruses – Watch File Extensions Step 1: Step 2:
  • 37. What Can You Do About Them? Viruses – Watch File Extensions Step 3: Step 4:
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. What Do I Do About Them?
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69. While the people retain their virtue and vigilance, no agent, by any extreme of wickedness or folly, can very seriously injure. - Abraham Lincoln