Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Ryan Loves Viruses
Transcript of Ryan Loves Viruses
Francisco Viruses Why Viruses are Created Financial Gain
Proof of Skill
Making a point Types of Viruses Worms
Armoured Worm Viruses Spread through E-mail
Slow down your Computer Trojan Horses They gain access to your computer by pretending yo be something their not.
They then infect your computer and can steel information Stealth Viruses They hide the changes they make to a computer
Displays an unaffected form of a documents Polymorphic Viruses thwarts anti-virus software
Constantly replicates itself Armored Viruses They fight anti-virus software instead of hiding
Confusing code Where Viruses Attack Boot sector
Macro language programs Boot Sector Replace Code
Erase Boot Sector Files Spread from file to file
You can lose all your information Macro Language Programs Viruses attach themselves to programs
distribution of private information Bibliography Websites
Whitty, Bryce. "Why Do People Create Computer Viruses? - Technibble." Why Do People Create Computer Viruses? - Technibble. N.p., Nov. 2007. Web. 15 Apr. 2013.
Smith, Dawn. "Where Do Computer Viruses Come From." Ezine Articles. N.p., 19 Aug. 2006. Web. 13 Apr. 2013 Books
Janice Lynn Ellerby, Laura Elizabeth Pinto, Kara L. Hiltz. Business Technology Today. NA, 2008. Print. Pictures
Brewster, Tom. "Aggressive Polymorphic Malware Doubles in July." IT PRO. N.p., 26 July 2011. Web. 16 Apr. 2013.
"Miscellaneous - Analytics Ninja." Analytics Ninja. N.p., 12 Sept. 2009. Web. 16 Apr. 2013.
Sherman, Paul. "BAsic File Folder." WPC Clipart. N.p., n.d. Web. 15 Apr. 2013.
"Virus Trouble Shooting." Online-pc-support.com. N.p., 2013. Web. 15 Apr. 2013.
"Worm Composting Workshop." All Things Food Bouffe 360. All Things Food, 2012. Web. 16 Apr. 2013. Bibliography Continued Pictures
"Glyph 500 GB Sata Hardrive." Sweet Water. N.p., 2013. Web. 15 June 2013.
Hurt, William. "German Gothic Armour." Age of Armour. N.p., n.d. Web. 15 Apr. 2013.
"Keywording Central." : Trojan Horse Marketing Utilises Keywording. N.p., n.d. Web. 16 Apr. 2013.
Riazanov, Oleksander. "Illustration - Virus File Vektor Illustration." 123RF Stock Photos. N.p., n.d. Web. 16 Apr. 2013. (Glyph 500 GB) (Riasanov) (Hurt) (Worm) (Virus Trouble Shooting) (Sherman) (Miscellaneous) (Brewster) (Keyword)