SlideShare a Scribd company logo
1 of 1
Download to read offline
Dangers of the Internet Essay
Dangers of the Internet
There are many pitfalls and perils on the Internet. Some of them are easy to avoid while other are not so obvious. Some of the Pitfalls and perils
are annoying, while others are deadly to your computer. Still others are humorous and entertaining. There are many dangers on the Internet. This
paper will try to cover some of them.
The biggest dangers of the Internet are virus. Viruses are small programs that "infect" computers. Most viruses are made to "steal" and or
"destroy" data stored on the infected computer. Viruses, that destroy data, write their code into afile and when that file is accessed it rewrites itself
in to more files until the virus corrupters or "infects" a file that the computer needs to run...show more content...
Eā€“mailed Viruses are harder to avoid. Opening an attached file can trigger them or by touching the message that contains the attached file and
then the file menu bar of the Eā€“mail program. (Email Hole Exposes Computers) The seconded way to start a virus is because of a hole in
Netscape's mail program and also MS's Outlook. A new way for Viruses to be spread by E
ā€“mail is to put the whole code for the virus in the
subject line that way when the computer read the subject line it unwittingly activated the virus. The newest way for people to get viruses is
through the web pages. This is done by putting the virus code into a script on the web page, now when the page is accessed the viruses executes
the viruses code. (Virus Thrives on HTML) This can make a virus very prolific if a lot of people visit the web page.
Crackers use viruses for their destructive ways. Crackers are people who go out of their way to cause damage to other peoples systems
through the use of viruses and direct hacking. Crackers are not hackers. Calling a Cracker a hacker is like comparing a red delicious apple to a
golden delicious apple. Hackers are computer enthuses that hack, break in to, systems in order to learn about the system. Hackers as a rule do
not do any damage to the system. Crackers are the ones to give hackers bad repartitions. Crackers use virus
Get more content on HelpWriting.net

More Related Content

Similar to Dangers Of The Internet Essay

Internet security issues
Internet security issuesInternet security issues
Internet security issuesirfan shaikh
Ā 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
Ā 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
Ā 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Virusesadni_shadah
Ā 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesadni_shadah
Ā 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
Ā 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
Ā 
Computer virus
Computer virusComputer virus
Computer viruskarniksingh
Ā 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesactanimation
Ā 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESHARSORA_SEJAL
Ā 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
Ā 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?AariyaRathi
Ā 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
Ā 

Similar to Dangers Of The Internet Essay (20)

Internet security issues
Internet security issuesInternet security issues
Internet security issues
Ā 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Ā 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
Ā 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
Ā 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Ā 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
Ā 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
Ā 
Computervirus
Computervirus Computervirus
Computervirus
Ā 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
Ā 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Ā 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Ā 
Computer virus
Computer virusComputer virus
Computer virus
Ā 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Ā 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
Ā 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Ā 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
Ā 
Information security
Information securityInformation security
Information security
Ā 
Computer virus
Computer virusComputer virus
Computer virus
Ā 
Computer virus
Computer virusComputer virus
Computer virus
Ā 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
Ā 

More from Dltk Custom Writing Paper Montreat (15)

Social Acceptance Today
Social Acceptance TodaySocial Acceptance Today
Social Acceptance Today
Ā 
Psychoanalytic Theory Research Paper
Psychoanalytic Theory Research PaperPsychoanalytic Theory Research Paper
Psychoanalytic Theory Research Paper
Ā 
In The Skin Of A Lion Anaylsis Essay
In The Skin Of A Lion Anaylsis EssayIn The Skin Of A Lion Anaylsis Essay
In The Skin Of A Lion Anaylsis Essay
Ā 
Persuasive Essay Outline For Euthanasia
Persuasive Essay Outline For EuthanasiaPersuasive Essay Outline For Euthanasia
Persuasive Essay Outline For Euthanasia
Ā 
Brazil Essay
Brazil EssayBrazil Essay
Brazil Essay
Ā 
American History X Thesis
American History X ThesisAmerican History X Thesis
American History X Thesis
Ā 
Encountering Conflict
Encountering ConflictEncountering Conflict
Encountering Conflict
Ā 
Peloponnesian War Research Paper
Peloponnesian War Research PaperPeloponnesian War Research Paper
Peloponnesian War Research Paper
Ā 
Essay About Gender Identity
Essay About Gender IdentityEssay About Gender Identity
Essay About Gender Identity
Ā 
How To Write A Year Round School Essay
How To Write A Year Round School EssayHow To Write A Year Round School Essay
How To Write A Year Round School Essay
Ā 
Thesis About Homelessness
Thesis About HomelessnessThesis About Homelessness
Thesis About Homelessness
Ā 
Learning Theory Behaviorism Essay Example
Learning Theory Behaviorism Essay ExampleLearning Theory Behaviorism Essay Example
Learning Theory Behaviorism Essay Example
Ā 
Coke Vs. Pepsi
Coke Vs. PepsiCoke Vs. Pepsi
Coke Vs. Pepsi
Ā 
Electronic Media
Electronic MediaElectronic Media
Electronic Media
Ā 
Justice Is The End Of Government Essay
Justice Is The End Of Government EssayJustice Is The End Of Government Essay
Justice Is The End Of Government Essay
Ā 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
Ā 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
Ā 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
Ā 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
Ā 
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
Ā 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
Ā 
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,Virag Sontakke
Ā 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
Ā 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
Ā 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
Ā 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
Ā 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
Ā 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
Ā 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
Ā 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
Ā 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
Ā 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Ā 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Ā 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
Ā 
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Ā 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
Ā 
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,
Ā 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Ā 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
Ā 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Ā 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
Ā 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
Ā 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Ā 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Ā 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
Ā 

Dangers Of The Internet Essay

  • 1. Dangers of the Internet Essay Dangers of the Internet There are many pitfalls and perils on the Internet. Some of them are easy to avoid while other are not so obvious. Some of the Pitfalls and perils are annoying, while others are deadly to your computer. Still others are humorous and entertaining. There are many dangers on the Internet. This paper will try to cover some of them. The biggest dangers of the Internet are virus. Viruses are small programs that "infect" computers. Most viruses are made to "steal" and or "destroy" data stored on the infected computer. Viruses, that destroy data, write their code into afile and when that file is accessed it rewrites itself in to more files until the virus corrupters or "infects" a file that the computer needs to run...show more content... Eā€“mailed Viruses are harder to avoid. Opening an attached file can trigger them or by touching the message that contains the attached file and then the file menu bar of the Eā€“mail program. (Email Hole Exposes Computers) The seconded way to start a virus is because of a hole in Netscape's mail program and also MS's Outlook. A new way for Viruses to be spread by E ā€“mail is to put the whole code for the virus in the subject line that way when the computer read the subject line it unwittingly activated the virus. The newest way for people to get viruses is through the web pages. This is done by putting the virus code into a script on the web page, now when the page is accessed the viruses executes the viruses code. (Virus Thrives on HTML) This can make a virus very prolific if a lot of people visit the web page. Crackers use viruses for their destructive ways. Crackers are people who go out of their way to cause damage to other peoples systems through the use of viruses and direct hacking. Crackers are not hackers. Calling a Cracker a hacker is like comparing a red delicious apple to a golden delicious apple. Hackers are computer enthuses that hack, break in to, systems in order to learn about the system. Hackers as a rule do not do any damage to the system. Crackers are the ones to give hackers bad repartitions. Crackers use virus Get more content on HelpWriting.net