Productivity
Group of software whose purpose is to perform tasks.
Examples: Word doc, Spreadsheet, data base, photo editors
Entertainment
Any software that supports a hobby or provides a form of amusement.
Examples: Video games, music players, video players, digital painting
Business
Deals with business records and customer information.
Examples: Finances, accounting, customer service, project management
Education/Reference
Any software that is made for an educational purpose.
Examples: Desmos, Encyclopedia Britannica, Scratch, google classroom
Make sure data is up to date
Don’t click suspicious links or emails
Leave websites that that redirect you to another websites immediately
Get a good antivirus or ad-blocker
Back up your data just in case.
1971 - Creeper
Created by: Bob Thomas.
An experiment to see if self replicating was possible. It did nothing bad to the computers it infected.
1974 - Rabbit
Created by: Unknown
Made copies of itself at high speeds and slowed down computers.
1986 - Brain
Created by: Basit and Amjad Farooq Alvi.
The intent was to protect their medical information from being copied without their permission.
1999 - Melissa
Created by: David Lee Smith.
Had an email attachment with pornographic websites, when opened it sent itself to the first 50 people in the user’s contact list.
2000 - ILOVEYOU
Created by: Onel de Guzman.
He wanted to steal other people’s passwords to log into their accounts without paying for the service.
2004 - Mydoom
Created by: A Russian programmer.
Allowed hackers to access an infected computer’s hard drive.
2010 - Stuxnet
Created by: USA and Iran programmers.
Aimed at Iran’s nuclear facilities and destroyed Natanz uranium enrichment facility.
2017 - WANNACRY
Created by: Eternal Blue.
It encrypts data and demands a payment of $300 worth of bitcoin to get data back. Raises up to $600 if the first demand wasn’t met in a few days.
Virus
Spreads by copying itself. Can affect any type of computer functionality by changing existing programs
Trojan
Program or file that says it's one thing (like a video or game) and is really something else (like a virus or spyware)
Adware/Spyware
Collects information about the user and changes web searches or traffic to other sites
Worms
Any way around a security measure without authorization.
Backdoor
Any way around a security measure without authorization.