科技英语演讲(计算机病毒)

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Take Care of Your Computer
Keep your computer up to date and get anti-virus softwares. It will help prevent problems and help you recover. And please…don't click on links, attachments and downloadable files, unless you know they're legit.
Prevention:
The best defense is keeping your computer software up to date at work and home. This helps close the doors and prevent problems.
Trojans
Trojans, our last example, are sneaky bugs. Like the real Trojan horse, they’re a trick. If you fall into it, you end up downloading a virus from the Internet. It may appear to be a game or useful software, but what hidden inside is a program that can cause problems. Prevention: These are no funny. To avoid Trojans, only download software from sites you trust. Just like washing your hands and covering your cough, you have to be aware of what causes problems to avoid them.
Page 2
The Viruses
These bugs hitch a ride when something, like a file, is shared between computers. This often happens via attachments sent in email or shared USB drives.
Through a little awareness, you and your computer will stay happy and healthy.
That's all
Company

LOGO
The Computer Virus
The Computer Virus
A computer virus is a computer program that can replicate itself and spread from one computer to another. Instead of germs, it spread via computer programs. These programs are usually designed by criminals to multiply and spread from computer-to-computer like a disease. It can erase your files, send emails without your permission or even deliver sensitive information to criminals.
Prevention:
The best defense is anti-virus software. It prevents viruses from getting to your computer and removes them when they are found.
Worms
Worms are a little scarier. They are programs that spread to computers without humans doing anything. Usually, the worms find a backdoor, a way to trick the computer’s software into letting them in. Once they're in, they look for the same backdoor in similar computers, wreaking havoc along the way.
相关文档
最新文档