The Internet belongs to everyone. Let’s keep it that way.

Protect Net Neutrality
Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Ryan Loves Viruses

No description

Ryan McDowell

on 17 April 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Ryan Loves Viruses

Budapest San
Francisco Viruses Why Viruses are Created Financial Gain
Proof of Skill
Making a point Types of Viruses Worms
Trojan Horses
Armoured Worm Viruses Spread through E-mail
Slow down your Computer Trojan Horses They gain access to your computer by pretending yo be something their not.

They then infect your computer and can steel information Stealth Viruses They hide the changes they make to a computer
Displays an unaffected form of a documents Polymorphic Viruses thwarts anti-virus software
Constantly replicates itself Armored Viruses They fight anti-virus software instead of hiding
Protective firewalls
Confusing code Where Viruses Attack Boot sector
Macro language programs Boot Sector Replace Code
change text
Erase Boot Sector Files Spread from file to file

You can lose all your information Macro Language Programs Viruses attach themselves to programs
Server collapses
distribution of private information Bibliography Websites
Whitty, Bryce. "Why Do People Create Computer Viruses? - Technibble." Why Do People Create Computer Viruses? - Technibble. N.p., Nov. 2007. Web. 15 Apr. 2013.

Smith, Dawn. "Where Do Computer Viruses Come From." Ezine Articles. N.p., 19 Aug. 2006. Web. 13 Apr. 2013 Books
Janice Lynn Ellerby, Laura Elizabeth Pinto, Kara L. Hiltz. Business Technology Today. NA, 2008. Print. Pictures
Brewster, Tom. "Aggressive Polymorphic Malware Doubles in July." IT PRO. N.p., 26 July 2011. Web. 16 Apr. 2013.

"Miscellaneous - Analytics Ninja." Analytics Ninja. N.p., 12 Sept. 2009. Web. 16 Apr. 2013.

Sherman, Paul. "BAsic File Folder." WPC Clipart. N.p., n.d. Web. 15 Apr. 2013.

"Virus Trouble Shooting." N.p., 2013. Web. 15 Apr. 2013.

"Worm Composting Workshop." All Things Food Bouffe 360. All Things Food, 2012. Web. 16 Apr. 2013. Bibliography Continued Pictures
"Glyph 500 GB Sata Hardrive." Sweet Water. N.p., 2013. Web. 15 June 2013.

Hurt, William. "German Gothic Armour." Age of Armour. N.p., n.d. Web. 15 Apr. 2013.

"Keywording Central." : Trojan Horse Marketing Utilises Keywording. N.p., n.d. Web. 16 Apr. 2013.

Riazanov, Oleksander. "Illustration - Virus File Vektor Illustration." 123RF Stock Photos. N.p., n.d. Web. 16 Apr. 2013. (Glyph 500 GB) (Riasanov) (Hurt) (Worm) (Virus Trouble Shooting) (Sherman) (Miscellaneous) (Brewster) (Keyword)
Full transcript