Experiencing English 2, Unit 8 Computers and Security Related lnformation Personal Computer The internet Email Computer Virus a Macro Virus Melissa The Love Bug Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Related Information ◼ Personal Computer ◼ The Internet ◼ Email ◼ Computer Virus ◼ Macro Virus ◼ Melissa ◼ The Love Bug
Experiencing English 2, Unit 8 Computers and Security Personal Computer(PC) All computers, from the first room-sized mainframes, to today's powerful desktop, laptop and even hand-held PCs, perform the same general operations on information. What changes over time is the information handled, how it is handled, how much is moved around, and how quickly and efficiently it can be done. http://www.pcguide.com/intro/works/jobs.htm Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Personal Computer (PC) ◼ All computers, from the first room-sized mainframes, to today's powerful desktop, laptop and even hand-held PCs, perform the same general operations on information. What changes over time is the information handled, how it is handled, how much is moved around, and how quickly and efficiently it can be done. http://www.pcguide.com/intro/works/jobs.htm
Experiencing English 2, Unit 8 Computers and Security The Internet YAHoo! search:[ My Yahne My Mad I Dazzling in cannes 天司 国世A oBeka.o Simate puts of Pelion The most popular search engine on the Internet--Yahoo n The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to Internet. It is certain, however. that these number in the millions and are increasing at a rapid rate An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more. Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye The Internet ◼ The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions and are increasing at a rapid rate. ◼ An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more. The most popular search engine on the Internet -- Yahoo
Experiencing English 2, Unit 8 Computers and Security Email What is an email address made up of? The @(at)sign divides the username and domain name Type of Institution Junk email slows help@internet 101.org down genuine messages and Username or Domain name. The name de the privacy identification number of the users Internet of email users system or location Junk email Even with the multimedia excitement of the Web, Electronic Mail(email) is the most frequently used application of the Internet. Many people who have access to the Internet at school, home, and work, use the Internet for no other purpose than to send and receive email Email allows computer users locally and worldwide to exchange messages Each user of email has a mail box address to which messages are sent Messages sent through email can arrive within a matter of seconds http://www.internet101.org/email.html Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Email ◼ Even with the multimedia excitement of the Web, Electronic Mail (email) is the most frequently used application of the Internet. Many people who have access to the Internet at school, home, and work, use the Internet for no other purpose than to send and receive email. ◼ Email allows computer users locally and worldwide to exchange messages. Each user of email has a mailbox address to which messages are sent. Messages sent through email can arrive within a matter of seconds. http://www.internet101.org/email.html/ Junk Email What is an email address made up of? Junk email slows down genuine messages and invade the privacy of email users
Experiencing English 2, Unit 8 Computers and Security Computer Virus A computer virus! 金山反病毒资讯网 痫专题 I m gonna eat yer FAT! A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system files Al computer viruses are manmade. A simple virus that can make a copy of itself dangerous because it will quickly use all available memory and bring th a over and over again is relatively easy to produce. Even such a simple virus is e system to a halt It is highly recommended that you have Virus Protection installed in your computer before you consider downloading anything http://www.internet101.org/virus.html Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Computer Virus ◼ A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system files. ◼ All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. ◼ It is highly recommended that you have Virus Protection installed in your computer before you consider downloading anything. http://www.internet101.org/virus.html/
Experiencing English 2, Unit 8 Computers and Security Macro viruses The rise and fall of a macro virus 1. EvilMacro, a macro virus program, is macro code and recognizes the guage. Its mission: to feed false data 82 Sub Evil Macro() Sub Evilla Change data Sub GoodMacro( 3. Both of these macros are Call evilmacro added to an innocuous Excel ca11Ev⊥ Macro document, which is sent to nd Sub document and enables the nove the virus code 2. A line of code is inserted into a dl from within the macro ich changes data i urning: Evil Macro does the dirty work.) Voila, clean file! Macro viruses are computer viruses that use an application,s own macro programming language to distribute themselves. These macros have the potential to inflict damage to the document or to other computer software The infecting files can be modified or deleted and may not be recoverable http://support.microsoftcom/default.aspx?scid=kb;eN-uS;q187243 Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Macro Viruses Macro viruses are computer viruses that use an application's own macro programming language to distribute themselves. These macros have the potential to inflict damage to the document or to other computer software. The infecting files can be modified or deleted and may not be recoverable. http://support.microsoft.com/default.aspx?scid=kb;EN-US;q187243
Experiencing English 2, Unit 8 Computers and Security Melissa Melissa virus at a glance What is it? Rapidly spreading macro virus Spreads through MS Word files MS Outlook e-mail Subject: Important Message From [name] What to do? IMPORTANT MEISS Don't open e-mail attachments Melissa MESSAGE. When prompted, dont run macro Update your anti-virus software Irus Melissa affects Word documents If launched, the macro virus will attempt to start Microsoft Outlook to send copies of the infected document via email to up to 50 people in Outlook's address book as an attachment The email subject line reads "Important Message from [the name of someone], "and the message reads"Here is that document you asked for.don't show anyone else http://www.melissavirus.com/ Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Melissa ◼ Melissa affects Word documents. If launched, the macro virus will attempt to start Microsoft Outlook to send copies of the infected document via email to up to 50 people in Outlook’s address book as an attachment. ◼ The email subject line reads "Important Message from [the name of someone]," and the message reads "Here is that document you asked for...don't show anyone else ;-)". http://www.melissavirus.com/
Experiencing English 2, Unit 8 Computers and Security The Love Bug The Love Bug virus is also called the Loveletter Virus, or simply I Love You The virus is circulating through email and affecting many customers. If run. the virus could overwrite jpg, mp3, and other file types, and attempt to send a IUE copy of itself to everyone in the recipient's address book LOVE YOU The e-mail containing the virus typically carries a subject line of " ILOVEYOU". Inside the mail is a short message saying "Kindly check the attached LOVELETTER coming from me"and an attachment RESEH named LOVE-LETTER-FOR-YOU txt vbs http://www.microsoft.com/misc/data/lovelettervirus.htm Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye The Love Bug ◼ The virus is circulating through email and affecting many customers. If run, the virus could overwrite .jpg, .mp3, and other file types, and attempt to send a copy of itself to everyone in the recipient's address book. http://www.microsoft.com/misc/data/lovelettervirus.htm The e-mail containing the virus typically carries a subject line of "ILOVEYOU". Inside the mail is a short message saying "Kindly check the attached LOVELETTER coming from me" and an attachment named LOVE-LETTER-FOR-YOU.txt.vbs. The Love Bug virus is also called the Loveletter Virus, or simply I Love You