Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Virus !!
& Brief explanation Different compression of software How to compress and decompress files Ethics in using the internet Discuss / plan what each member will be do
and how to approach
the design and content
Different Types of Computer Viruses
& Brief explanation
From there it can overcome and interrupt all the operations executed by the system. It can corrupt files and programs that are opened, closed, copied, renamed etc.
Examples: Randex, CMJ, Meve, and MrKlunky.
They are very similar to a virus; it has the ability to self-replicate and can lead to negative effects on your system. But they can be detected and eliminated by anti-viruses.
Examples of worms include:
PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.
Intended to perform, simultaneously, a desirable (expected) effect and a covert (unexpected) effect. Trojan horses can make copies of themselves, steal information, or harm the computer system
Trojans or Trojan Horses It encrypt or encode themselves every time they infect a system. It's impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption). The virus then goes on creating a large number of copies.
Examples: Elkern, Marburg, Satan Bug and Tuareg.
Polymorphic Virus Different compression software How to compress and decompress files
Ethics in using the internet
1. Must not use computer to harm other people.
2. Must not interfere other people.
3. Must not be a spy.
4. Do not use computers to steal information.
5. Do not use computer-generated evidence is false.
6. Must not copy other people's copyrighted software.
7. no abuse of computing resources that they have no rights.
8. must not bring the work of others as your own.
Zip (Compress) Files and Folders
Right-click a file or folder with multiple files in it, point at Send To, then select Compressed (zipped) Folder.
Windows Vista will compress (zip) the file or folder and save the new zipped file in the same place as the original file.
Unzip (Uncompress) Files and Folders
You can unzip a file a few different ways.
Double-click the Zipped File
The easiest way to unzip a file is to double-click it. A window with the zipped files contents will open. You can click Extract all files or drag the files out of the window to the desired location (example: the desktop).
If you choose to click extract all files, the files will be extracted (unzipped) in the same location as the original file unless you specify a location in the Select a Destination and Extract Files box that appears when you choose to extract them.
Right-click the Zipped File
Right-click the zipped file and select Extract all. The Select a Destination and Extract Files window will open and let you choose if you want to save the files in the same location as the original zipped file or you can choose where you want to save the unzipped files by clicking browse and choosing a new location.
Boot Virus A boot sector virus is spread via infected floppy disks. This typically occurs when users inadvertently leave a floppy disk in drive A. When the system is next started, the PC will attempt to boot from the floppy. If the disk is infected with a boot sector virus, that virus will infect the boot sector of the user's local drive (C). Spyware virus Spyware is any technology that aids in gathering information about a person or organization without their knowledge. spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software. Generally, stealth describes any approach to doing something while avoiding notice. Stealth Virus File Virus A computer virus that infects application files such as spreadsheets, computer games, or accounting software. There are many different kinds of compression softwares,
with similar purpose and results, but varying in the format.
The common element in all of the programs is that there is the capability to reduce the size of data files.
WinZip is the world's number one zip utility for file compression, file sharing, file encryption, and data backup. By default WinZip creates archives in the ZIP file format (.zip) but also has various levels of support for other archive formats.
WinZip 7-Zip is an open source file archiver with a high compression ratio. 7-Zip operates with the 7z archive format, but can read and write several other archive formats.
You can use 7-Zip on any computer including a computer in a commercial organization.
You don't need to register or pay for 7-Zip.
7Zip StuffIt is the right tool for people who need just the basics features: compression, encryption, and expansion. StuffIt lets you create both ZIP and SITX archives.
It was originally produced for the Macintosh. stufflt ALZip is a file compression program that can unzip 40 different zip file archives. ALZip can zip files into 8 different archives such as ZIP, EGG, TAR and others.
ALZip uses a little egg character as their mascot/icon, which makes a dull concept like file compression slightly more interesting and fun.
ALZip WinAce is a relatively well-known file archiver that made a name for itself when it created and specialized in the ACE archive format.
WinAce supports most of the common features we’ve come to expect from file compression software. It can integrate into Outlook, encrypt your archives, split archives and create self-extracting archives.
W I n A c e