Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
How to protect your computer
Transcript of How to protect your computer
Read pop ups prior to accepting or downloading anything.
When getting an email from a unknown sender, some files may contain a virus.
While downloading pirated files.
When not updating the latest software for your computer is a big security risk and can be a way your computer becomes infected. How can we protect a computer? Antivirus Sofwares: How to attract viruses? Why install a hardware/software? There are many different ways to catch a virus on your computer, but there are many ways to secure your computer and keep it clean. It is important to protect every computer. You should have a hardware firewall to protect your network. You should also use a software firewall on each computer to help prevent the spread of a virus in your network if a computer becomes infected. It is a computer program that replicates itself and can spread from one computer to another.
A piece of code that is loaded onto your computer without your knowledge. McAfee Antivirus
Bitdefender Total Security
Avira Antivirus SoftwareAvast! What is a virus? How does malware differ from a virus? The majority of active malware threats are usually Trojans or worms rather than viruses which are sometimes confused with viruses. They're technically different, they mar harm a computer system's data or performance. Ad ware and spy ware are other viruses which can be caught through ads on web pages or programs. These are installed in your computer with or without your permission, but ad ware is for marketing when spy ware tracks personal data in your PC. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks. A Trojan is a program that appears harmless but hides malicious functions.