You are on page 1of 52

SAINIK SCHOOL

AMARAVATHINAG
AR

PROJECT REPORT
HTML/CSS
Name: S.Tamizharasan

Roll No.: 6937


Class: X
Section: B

2022-2023

COMPUTER APPLICATIONS Page 1


TAMIZHARASAN S [6937]
CONTENTS

Page Number

A Blog on Plagiarism
3-8

Forms
9-12

Website with Graphical Elements


13-21

Blog on Cybersecurity Basics


22-25

Several webpages on Cybersecurity


Basics
1. Spam
26-31
2. Virus
32-37
3. Malware
38-44

COMPUTER APPLICATIONS Page 2


TAMIZHARASAN S [6937]
4. Anti-Virus
45-50

PROJECT NO.1 A Blog on Plagiarism


DATE: 27 OCT 2022

<!DOCTYPE html>
<html>
<head>
<meta name="viewport" content="width=device-width, initial-scale=1">
<style>
*{
box-sizing: border-box;
border-radius: 10px;
}
/* Add a gray background color with some padding */
body {
font-family: Arial;
padding: 2vmin;
background: #e7e6e6;
}
/* Header/Blog Title */
.header {
padding:1vh;
font-size: 125%;
text-align: center;
background: #faaeae79;
border-radius: 40px;
}
/* Create two unequal columns that floats next to each other */
/* Left column */
.leftcolumn {
float: left;
max-width: 75%;
}
/* Right column */
.rightcolumn {
float: left;

COMPUTER APPLICATIONS Page 3


TAMIZHARASAN S [6937]
max-width: 25%;
padding-left: 20px;
}
.fakeimg {
background-color: rgba(0, 0, 0, 0.336);
max-width: 100%;
padding: 20px;
text-align: center;
color: aqua;
margin-top: -35px;
border-radius: 5px;
}
.spam{
background-image: url("./Spam.jpg");
max-width: 100%;
background-size: cover;
padding:40px;
max-height: 210px;
}
.Malware{
background-image: url("./Malware.webp");
max-width: 100%;
background-size: cover;
padding:40px;
max-height: 210px;

}
.Virus{
background-image: url("./Virus.jpg");
max-width: 100%;
background-size: cover;
padding:40px;
max-height: 210px;

}
.Anti-Virus{
background-image: url("./AntiVirus.webp");
max-width: 100%;
background-size: cover;
padding:40px;
max-height: 180px;

}
.computer{
background-image: url("./Computer.jpg");
max-width: 100%;
background-size: contain;
padding:40px;

}
/* Add a card effect for articles */
COMPUTER APPLICATIONS Page 4
TAMIZHARASAN S [6937]
.card {
background-color: #dfafaf79;
padding: 20px;
margin-top: 20px;
}

/* Clear floats after the columns */


.row:after {
content: "";
display: table;
clear: both;
}

/* Footer */
.footer {
padding: 2vh;
text-align: center;
background: #dfafaf79;
margin-top: 20px;
}
/* Responsive layout - when the screen is less than 800px wide, make the two columns stack on top
of each other instead of next to each other */
@media screen and (max-width: 800px) {
.leftcolumn, .rightcolumn {
width: 100%;
padding: 0;
}
}
</style>
</head>
<body>

<div class="header" >


<h2 style="margin-bottom: -20px;"><b><u>Plagiarism</b></u></h2>
<h4>Intellectual Theft</h4>
</div>

<div class="row">
<div class="leftcolumn">
<div class="card">
<h3 style="text-align:center;font-weight:bolder;">Types of Plagiarism</h3>

<h4><b>Verbatim (word for word) quotation without clear acknowledgement</b></h4>


<p>Quotations must always be identified as such by the use of either quotation marks or<br>
indentation, and with full referencing of the sources cited. It must always be apparent to the reader
which parts are your own independent work and where you have drawn on someone else’s ideas
and language.</p>
<h4>Cutting and pasting from the Internet without clear acknowledgement</h4>

COMPUTER APPLICATIONS Page 5


TAMIZHARASAN S [6937]
<p>Information derived from the Internet must be adequately referenced and included in the
bibliography. It is important to evaluate carefully all material found on the Internet, as it is less likely
to have been through the same process of scholarly peer review as published sources.</p>
<h4>Paraphrasing</h4>
<p>Paraphrasing the work of others by altering a few words and changing their order, or by
closely following the structure of their argument, is plagiarism if you do not give due
acknowledgement to the author whose work you are using.</p><p>A passing reference to the
original author in your own text may not be enough; you must ensure that you do not create the
misleading impression that the paraphrased wording or the sequence of ideas are entirely your own.
It is better to write a brief summary of the author’s overall argument in your own words, indicating
that you are doing so, than to paraphrase particular sections of his or her writing. This will ensure
you have a genuine grasp of the argument and will avoid the difficulty of paraphrasing without
plagiarising. You must also properly attribute all material you derive from lectures.</p>
<h4>Collusion</h4>
<p>This can involve unauthorised collaboration between students, failure to attribute assistance
received, or failure to follow precisely regulations on group work projects. It is your responsibility to
ensure that you are entirely clear about the extent of collaboration permitted, and which parts of
the work must be your own.</p>
<h4>Failure to acknowledge assistance</h4>
<p>You must clearly acknowledge all assistance which has contributed to the production of your
work, such as advice from fellow students, laboratory technicians, and other external sources. This
need not apply to the assistance provided by your tutor or supervisor, or to ordinary proofreading,
but it is necessary to acknowledge other guidance which leads to substantive changes of content or
approach.</p>
<h4>Auto-plagiarism</h4>
<p>You must not submit work for assessment that you have already submitted (partially or in
full), either for your current course or for another qualification of this, or any other, university,
unless this is specifically provided for in the special regulations for your course. Where earlier work
by you is citable, ie. it has already been published, you must reference it clearly.<b> Identical pieces
of work submitted concurrently will also be considered to be auto-plagiarism.</b></p>
</div>
<div class="card">
<h3>Why should you avoid plagiarism?</h3>
<p>There are many reasons to avoid plagiarism. You have come to university to learn to know
and speak your own mind, not merely to reproduce the opinions of others - at least not without
attribution. At first it may seem very difficult to develop your own views, and you will probably find
yourself paraphrasing the writings of others as you attempt to understand and assimilate their
arguments. However it is important that you learn to develop your own voice. You are not
necessarily expected to become an original thinker, but you are expected to be an independent one
- by learning to assess critically the work of others, weigh up differing arguments and draw your own
conclusions. Students who plagiarise undermine the ethos of academic scholarship while avoiding an
essential part of the learning process.</p>
<p>You should avoid plagiarism because you aspire to produce work of the highest quality.
Once you have grasped the principles of source use and citation, you should find it relatively
straightforward to steer clear of plagiarism. Moreover, you will reap the additional benefits of
improvements to both the lucidity and quality of your writing. It is important to appreciate that
mastery of the techniques of academic writing is not merely a practical skill, but one that lends both
credibility and authority to your work, and demonstrates your commitment to the principle of
intellectual honesty in scholarship.</p>
</div>
<div class="card">
COMPUTER APPLICATIONS Page 6
TAMIZHARASAN S [6937]
<h3>Unintentional plagiarism</h3>
<p>Not all cases of plagiarism arise from a deliberate intention to cheat. Sometimes students
may omit to take down citation details when taking notes, or they may be genuinely ignorant of
referencing conventions. However, these excuses offer no sure protection against a charge of
plagiarism. Even in cases where the plagiarism is found to have been neither intentional nor reckless,
there may still be an academic penalty for poor practice.</p>
<p>It is your responsibility to find out the prevailing referencing conventions in your discipline,
to take adequate notes, and to avoid close paraphrasing. If you are offered induction sessions on
plagiarism and study skills, you should attend. Together with the advice contained in your subject
handbook, these will help you learn how to avoid common errors. If you are undertaking a project or
dissertation you should ensure that you have information on plagiarism and collusion. If ever in
doubt about referencing, paraphrasing or plagiarism, you have only to ask your tutor.</p>
</div>
<div class="card">
<h3>Why does plagiarism matter?</h3>
<p>Plagiarism is presenting someone else's work or ideas as your own, with or without their
consent, by incorporating it into your work without full acknowledgement. All published and
unpublished material, whether in manuscript, printed or electronic form, is covered under this
definition.</p>
</div>
</div>
<div class="rightcolumn">
<div class="card">
<h2>About this blog</h2>
<div class="computer" style="height:100px;width: 165px;"></div>
<p>This is one of the blogs which is made for Computer application Project</p>
</div>
<div class="card">
<h3>Popular Post</h3><a href="Spam.html">
<div class="spam"></div><br>
<div class="fakeimg">Spam</div><br></a><a href="Anti-Virus.html">
<div class="Anti-Virus" ></div><br>
<div class="fakeimg">Anti-Virus</div><br></a><a href="Malware.html">
<div class="Malware"></div>
<div class="fakeimg" style="margin-top: -18px;">Malware</div><br></a><a href="Virus.html">
<div class="Virus" ></div><br>
<div class="fakeimg">Virus</div><br></a>
</div>
</div>
</div>

<div class="footer">
<h2>You can avoid allegations plagiarism through awarness and honest effort...</h2>
</div>

</body>
</html>

COMPUTER APPLICATIONS Page 7


TAMIZHARASAN S [6937]
PROJECT NO.2 Forms
DATE: 29 OCT 2022

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8/">
<title>Forms</title>
<style>
body{background-color: #ffc2d1 }
th, td {
border: 1px solid black;
border-radius: 40px;
}
p{ font-family:monotype Corsiva;}
input,textarea,select{ font-family: 'Franklin Gothic Medium', 'Arial Narrow', Arial, sans-
serif;}
textarea{float:right;}
</style>
</head>
<body><center><form>
<table ><table cellpadding="20px">
<tr>
<td><h3 align="center" style="font-family:'algerian' ;margin-bottom: -20px" >Sainik
School Amaravathinagar</h3>
<h4 align="center" style="font-family:'Trebuchet MS', 'Lucida Sans Unicode', 'Lucida
Grande', 'Lucida Sans', Arial, sans-serif ;margin-bottom: -10px" > Dress Order Form</h4><br>
<p>Name of the Cadet:&ensp;
<input type="text" maxlength="25" placeholder="Cdt.(Your name)" required></p>
<p> Date of Birth:&emsp;
<input type="date" required>
<p>Roll Number:&emsp;<input type="textbox" type="number" maxlength="4"
placeholder="Enter Roll number" required></p>
<p>ID number of the Cadet:&ensp;
<input type="password" placeholder="Enter Id number" maxlength="9" aria-required="true"></p>
<p>Date of Admission:&ensp;
<input type="date" min="2017-04-01" aria-required="false"></p>
<p>Current Address:<textarea width="50px" placeholder="Your address is used for
delivery purposes" required></textarea></p>
<p>Nationality:&ensp;<select required>
<option disabled selected>--None--</option><option>Indian</option></select> </p>
<p>State:&ensp;<select><option disabled selected>--Select your state--</option>
COMPUTER APPLICATIONS Page 9
TAMIZHARASAN S [6937]
<option>Andhra Pradesh</option>
<option>Arunachal Pradesh</option>
<option>Assam</option>
<option>Bihar</option>
<option>Chhattisgarh</option>
<option>Goa</option>
<option>Gujarat</option>
<option>Haryana </option>
<option>Himachal Pradesh </option>
<option>Jharkhand </option>
<option>Karnataka </option>
<option>Kerala </option>
<option>Madhya Pradesh </option>
<option>Maharashtra </option>
<option>Manipur </option>
<option>Meghalaya </option>
<option>Mizoram </option>
<option>Nagaland </option>
<option>Odisha </option>
<option>Punjab </option>
<option>Rajasthan </option>
<option>Sikkim </option>
<option>Tamil Nadu </option>
<option>Telangana </option>
<option>Tripura </option>
<option>Uttar Pradesh </option>
<option>Uttarakhand </option>
<option>West Bengal </option>
<option>Puducherry </option>
<option>Ladakh </option>
<option>Jammu and Kashmir </option>
<option>Delhi </option>
<option>Dadra and Nagar Haveli and Daman and Diu </option>
<option>Chandigarh </option>
<option>Andaman and Nicobar Islands </option>
</select></p>
<p>Class:&ensp;<input type="radio" name="class" required><label>X</label>
<input type="radio" name="class"><label>XI</label>
<input type="radio" name="class"><label>XII</label></form>
</p>
<p> Clothes required:<br>
<input type="checkbox" name="Clothes" ><label>Prep. dress</label>
<input type="number" step="1" max="10" min="0"/><br>
<input type="checkbox" name="Clothes"><label>PT dress</label>

COMPUTER APPLICATIONS Page 10


TAMIZHARASAN S [6937]
&nbsp;&nbsp;&nbsp;&nbsp;
<input type="number" step="1" max="10" min="0"/><br>
<input type="checkbox" name="Clothes"><label>Khaki</label>
&ensp;&emsp;&nbsp;<input type="number" step="1" max="10" min="0"/><br>
<input type="checkbox" name="Clothes"><label>Informal</label>
&ensp;&nbsp;<input type="number" step="1" max="10" min="0"/>&ensp;
<input type="color">
</p>
<p>Contact Number:&ensp;<input type="number" placeholder="12345-67890"
maxlength="10" required></p>
<p>Email Address:&ensp;<input type="email" placeholder="Enter your email here"
maxlength="50" required></p>
<hr color="black"><br>
<p>In case of queries contact us through <a
href="mailto:ssa@gmail.com">Mail</a></p>
<input type="submit">&emsp;<input type="reset">
</td>
</tr>
</table>
</table>
</form></center>
</body>

</html>

COMPUTER APPLICATIONS Page 11


TAMIZHARASAN S [6937]
PROJECT NO.3 Website using Graphical Elements
DATE: 26 OCT 2022

<DOCTYPE html>
<html>
<head>
<meta name="viewport" content="width=device-width">
<title>
Computer Project
</title>
<style>
div.heading{position:static;
font-weight: bold;font-family: Arial, Helvetica, sans-serif;font-style: normal;font-size:
200%;object-fit: contain;}
h2{position:static;
font-weight: bold;font-family: 'monotype Corsiva';font-style: normal;font-size: 170%;object-
fit: contain;}
h3{position:static;
font-weight: bold;font-family: Arial, Helvetica, sans-serif;font-style: normal;font-size:
120%;object-fit: contain;}
img{position:static; float:left; width: 20%; height:19%; object-fit:contain;}
.table{position:static; object-fit:contain;}
div.paragraph{text-align:center;position:static;font-family: Arial, Helvetica, sans-serif;font-
style: normal;font-size: 100%;}
.paragraph1{position:static;font-family: Arial, Helvetica, sans-serif;font-style: normal;font-
size: 100%;}
</style>
</head>
<body background="Background.jpg"> <img src="logo.png" alt="logo">
<div class="heading" align="center" style="font-family:'Trebuchet MS', 'Lucida Sans
Unicode', 'Lucida Grande', 'Lucida Sans', Arial, sans-serif"> SAINIK SCHOOL
AMARAVATHINAGAR</div>
<div class="paragraph"><p>&ldquo;The safety, honour and welfare of your country comes
first, always and every time.<br> The honour, welfare and comfort of the men you command come
next. Your own ease, comfort and safety comes last, always and every time.&rdquo;<br></p>
<b>- Field Marshal Philip Chetwood</b></p></div>
<h2 calss="h2" align="center"><b><u>Mark List</b> of Class
<strong>X</strong>students</u></h2>
<br>
<h3 class="h3" align="center" ></b><u>Class-X Midterm examiation results</h3>
</u><center><div class="table"><table border="1px" cellpadding="4" bgcolor=#EAEAEA >
<thead>
<tr>

COMPUTER APPLICATIONS Page 13


TAMIZHARASAN S [6937]
<td>S.No</td>
<td>Name</td>
<td>Roll.no</td>
<td>Mathematics</td>

<td>English</td>
<td>Civics</td>
<td>Economics</td>
<td>History</td>
<td>Geography</td>
<td>Physics</td>
<td>Chemistry</td>
<td>Botany</td>
<td>Zoology</td>
<td>Computer Applications</td>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>Liam</td>
<td>6396</td>
<td>70</td>
<td>72</td>
<td>34</td>
<td>28</td>
<td>36</td>
<td>27</td>
<td>25</td>
<td>34</td>
<td>40</td>
<td>36</td>
<td>38</td>
</tr>
<tr>
<td>2</td>
<td>James</td>
<td>6375</td>
<td>78</td>
<td>66</td>
<td>34</td>
<td>40</td>
<td>32</td>
<td>28</td>

COMPUTER APPLICATIONS Page 14


TAMIZHARASAN S [6937]
<td>27</td>
<td>31</td>
<td>34</td>
<td>38</td>
<td>42</td>

</tr>
<tr>
<td>3</td>
<td>Daniel</td>
<td>6391</td>
<td>75</td>
<td>68</td>
<td>25</td>
<td>85</td>
<td>15</td>
<td>35</td>
<td>25</td>
<td>35</td>
<td>27</td>
<td>24</td>
<td>40</td>
</tr>
<tr>
<td>4</td>
<td>Asher</td>
<td>6591</td>
<td>76</td>
<td>60</td>
<td>26</td>
<td>14</td>
<td>29</td>
<td>35</td>
<td>16</td>
<td>19</td>
<td>20</td>
<td>40</td>
<td>49</td>
</tr>
<tr>
<td>5</td>
<td>Julian</td>
<td>6593</td>
<td>68</td>

COMPUTER APPLICATIONS Page 15


TAMIZHARASAN S [6937]
<td>75</td>
<td>34</td>
<td>26</td>
<td>37</td>
<td>AB</td>
<td>AB</td>
<td>33</td>
<td>35</td>
<td>27</td>
<td>45</td>
</tr>
<tr>
<td>6</td>
<td>Luca</td>
<td>6387</td>
<td>63</td>
<td>76</td>
<td>31</td>
<td>38</td>
<td>39</td>
<td>34</td>
<td>36</td>
<td>32</td>
<td>40</td>
<td>37</td>
<td>46</td>
</tr>
<tr>
<td>7</td>
<td>Maverick</td>
<td>6394</td>
<td>78</td>
<td>51</td>
<td>34</td>
<td>21</td>
<td>24</td>
<td>22</td>
<td>35</td>
<td>31</td>
<td>25</td>
<td>37</td>
<td>26</td>
</tr>
<tr>

COMPUTER APPLICATIONS Page 16


TAMIZHARASAN S [6937]
<td>8</td>
<td>Nathan</td>
<td>6128</td>
<td>54</td>
<td>68</td>
<td>34</td>
<td>24</td>
<td>31</td>
<td>30</td>
<td>12</td>
<td>10</td>
<td>14</td>
<td>37</td>
<td>36</td>
</tr>
<tr>
<td>9</td>
<td>Dylan</td>
<td>6645</td>
<td>50</td>
<td>68</td>
<td>26</td>
<td>16</td>
<td>35</td>
<td>30</td>
<td>38</td>
<td>32</td>
<td>20</td>
<td>24</td>
<td>38</td>
</tr>
<tr>
<td>10</td>
<td>Hudson</td>
<td>6544</td>
<td>64</td>
<td>55</td>
<td>34</td>
<td>36</td>
<td>26</td>
<td>28</td>
<td>AB</td>
<td>24</td>
<td>38</td>

COMPUTER APPLICATIONS Page 17


TAMIZHARASAN S [6937]
<td>16</td>
<td>40</td>
</tr>
<tr>
<td>11</td>
<td>Brooks</td>
<td>5413</td>
<td>67</td>
<td>58</td>
<td>32</td>
<td>35</td>
<td>16</td>
<td>17</td>
<td>40</td>
<td>AB</td>
<td>36</td>
<td>28</td>
<td>39</td>
</tr>
<tr>
<td>12</td>
<td>Austin</td>
<td>5432</td>
<td>74</td>
<td>44</td>
<td>35</td>
<td>26</td>
<td>34</td>
<td>24</td>
<td>16</td>
<td>29</td>
<td>37</td>
<td>26</td>
<td>34</td>
</tr>
<tr>
<td>13</td>
<td>Vincent</td>
<td>6218</td>
<td>48</td>
<td>67</td>
<td>19</td>
<td>34</td>
<td>25</td>

COMPUTER APPLICATIONS Page 18


TAMIZHARASAN S [6937]
<td>28</td>
<td>37</td>
<td>19</td>
<td>34</td>
<td>26</td>
<td>48</td>
</tr>
<tr>
<td>14</td>
<td>Jude</td>
<td>6218</td>
<td>55</td>
<td>32</td>
<td>36</td>
<td>14</td>
<td>24</td>
<td>39</td>
<td>24</td>
<td>35</td>
<td>06</td>
<td>35</td>
<td>49</td>
</tr>
<tr>
<td>15</td>
<td>Tristan</td>
<td>6218</td>
<td>70</td>
<td>59</td>
<td>35</td>
<td>16</td>
<td>37</td>
<td>28</td>
<td>24</td>
<td>19</td>
<td>40</td>
<td>28</td>
<td>45</td>
</tr>
</tbody>
</table></div></center>
<p class="paragraph1"> <b>NOTE:</b> <ul type="square"><li > These marks are finally calculated
after all corrections and this is the final mark </li>
<li>Failed studets are not in this List</head></li>

COMPUTER APPLICATIONS Page 19


TAMIZHARASAN S [6937]
<li>Roll number of failed students are:<ol>
<li>5548</li>
<li>5246</li>
<li>5784</li>
<li>6222</li>
<li>6324</li></ol>
</li></p>
<li>Results are subject to correction depending on any amendment in answer scripts or tabulation
error</li>
<li>Please bring any discrepancy to the notice of class teacher/Sub teacher immediately</li>
<li>Corrections by teachers are frequently updated through audio file</li>
<li><dl compact>
<dt>AB<dd>means <strong>Absent</strong>
</dl></li>
</ul>
</div>
<h3>CORRECTIONS:</h3><ol >
<center> <audio controls>
<source src="Audio.mpeg">
</audio></center>
<br><center>
<video controls>
<source src="Video.mp4">
</video></center>
</body>
</head>
</html>

COMPUTER APPLICATIONS Page 20


TAMIZHARASAN S [6937]
PROJECT NO.4 Blog on Cybersecurity Basics
DATE: 20 OCT 2022

<!DOCTYPE html>
<html>
<head>
<title>Sainik Blog</title>
<meta charset="utf-8" content="width=device-width" >
<style>
*{
box-sizing: border-box;
border-radius: 5px;
}
body {
font-family: Arial;
padding: 20px;
background: #f8d5d5;
}
.header {
padding: 1px;
font-size: 40px;
text-align: center;
background: white;
}
.leftcolumn {
float: left;
width: 50%;
}
.rightcolumn {
float: left;
width: 50%;
padding-left: 20px;
}
.fakeimg {
background-color: #aaa;
width: 100%;
padding: 20px;
}
.Spam{
background-image: url("./Spam.jpg");
width: 100%;
background-size: cover;
height: 230px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}
.Virus{
background-image: url("./Virus.jpg");

COMPUTER APPLICATIONS Page 22


TAMIZHARASAN S [6937]
width: 100%;
background-size: cover;
height: 230px;
padding:40px;
text-align: center;
color: rgb(0, 204, 255);
}
.Anti-Virus{
background-image: url("./Antivirus.webp");
width: 100%;
background-size: cover;
height: 230px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}
.Malware{
background-image: url("./Malware.webp");
width: 100%;
background-size: cover;
height: 230px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}
.card {
background-color: white;
padding: 20px;
margin-top: 20px;
}
.center-align {
background-color: white;
padding: 8px;
margin-top: 10px;
width: 100%;
}
.row:after {
content: "";
display: table;
clear: both;
}
.footer {
padding: 20px;
text-align: center;
background: #ddd;
margin-top: 20px;
}
@media screen and (max-width: 800px) {
.leftcolumn, .rightcolumn {
width: 100%;
padding: 0;
COMPUTER APPLICATIONS Page 23
TAMIZHARASAN S [6937]
}
}
</style>
</head>
<body>
<div class="header">
<h2><u>Cybersecurity Basics</u></h2>
</div>
<div class="row">
<div class="center-align">
<div class="card">
<h3 style="text-align: center;">Everything you need to know about cybercrime</h3>
<p>The world of cybercrime is always changing. When viruses first appeared, most of them
were pranks. To stay safe online, one of the best things you can do is stay educated on the litany of
threats that lurk on the web. Use this information hub to learn everything you need to know about
cyberthreats, and how to stop them.</p>
</div>
<div class="leftcolumn">
<div class="card">
<h2>Virus</h2>
<a href="Virus.html"><div class="Virus"></div></a><br><p>A computer virus is a type of
computer program that, when executed, replicates itself by modifying other computer programs and
inserting its own code. If this replication succeeds, the affected areas are then said to be "infected"
with a computer virus, a metaphor derived from biological viruses. </p>
</div>
<div class="card">
<h2 >Spam</h2>
<a href="Spam.html"><div class="Spam"></div></a><br><p>Spamming is the use of
messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients</p>
</div>
</div>
<div class="rightcolumn">
<div class="card">
<h2 >Anti-Virus</h2>
<a href="Anti-Virus.html"><div class="Anti-Virus"></div></a><br><p>Antivirus software was
originally developed to detect and remove computer viruses,with the proliferation of other
malware, antivirus software started to protect from other computer threats.</p>
</div>
<div class="card">
<h2 >Malware</h2>
<a href="Malware.html"><div class="Malware"></div></a><br><p>Malware (a portmanteau
for malicious software) is any software intentionally designed to cause disruption to a computer,
server, client, or computer network, leak private information, gain unauthorized access to
information or systems, deprive access to information, or which unknowingly interferes with the
user's computer security and privacy</p>
</div>
</div>
</div>
</div>
<div class="footer">
<h2>Cybersecurity basics & protection</h2>
COMPUTER APPLICATIONS Page 24
TAMIZHARASAN S [6937]
</div>
</body></html>

COMPUTER APPLICATIONS Page 25


TAMIZHARASAN S [6937]
PROJECT NO.5 Several webpages on Cybersecurity Basics
DATE: 22 OCT 2022
5.1 SPAM
<!DOCTYPE html>
<html>
<head>
<meta name="viewport" content="width=device-width, initial-scale=1">
<style>
*{
box-sizing: border-box;
border-radius: 5px;
}
/* Add a gray background color with some padding */
body {
font-family: Arial;
padding: 20px;
background: #f8d5d5;
}
/* Header/Blog Title */
.header {
padding: 1px;
font-size: 35px;
text-align: center;
background: white;
}
.Spam{
background-image: url("./Spam.jpg");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}
.Virus{
background-image: url("./Virus.jpg");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
text-align: center;
color: rgb(0, 204, 255);
}
.Malware{
background-image: url("./Malware.webp");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;

COMPUTER APPLICATIONS Page 27


TAMIZHARASAN S [6937]
color: rgb(0, 204, 255);
text-align: center;
}
.Anti-Virus{
background-image: url("./AntiVirus.webp");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}
/* Create two unequal columns that floats next to each other */
/* Left column */
.leftcolumn {
float: left;
width: 75%;
}
/* Right column */
.rightcolumn {
float: left;
width: 25%;
padding-left: 20px;
}
/* Fake image */
.fakeimg {
background-color: rgba(0, 0, 0, 0.637);
width: 100%;
padding: 20px;
margin-top: -15px;
color:aqua;
text-align: center;
}
/* Add a card effect for articles */
.card {
background-color: white;
padding: 20px;
margin-top: 20px;
}
/* Clear floats after the columns */
.row:after {
content: "";
display: table;
clear: both;
}
/* Footer */
.footer {
padding: 20px;
text-align: center;
background: #ddd;
margin-top: 20px;
COMPUTER APPLICATIONS Page 28
TAMIZHARASAN S [6937]
}
/* Responsive layout - when the screen is less than 800px wide, make the two columns stack on top
of each other instead of next to each other */
@media screen and (max-width: 800px) {
.leftcolumn, .rightcolumn { width: 100%;
padding: 0;
}
}
</style>
</head>
<body>
<div class="header">
<h2>Spam</h2>
</div>
<div class="row">
<div class="leftcolumn">
<div class="card">
<h2 style="margin-bottom: -20px;">What is Spam?</h2>
<p>Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
Often spam is sent via email, but it can also be distributed via text messages, phone calls, or social
media.</p>
<h3>What does spam stand for?</h3>
<p>Spam is not an acronym for a computer threat, although some have been proposed (stupid
pointless annoying malware, for instance). The inspiration for using the term “spam” to describe
mass unwanted messages is a Monty Python skit in which the actors declare that everyone must eat
the food Spam, whether they want it or not. Similarly, everyone with an email address must
unfortunately be bothered by spam messages, whether we like it or not.</p>
<h3>Types of Spam:</h3><p>Spammers use many forms of communication to bulk-send their
unwanted messages. Some of these are marketing messages peddling unsolicited goods. Other types
of spam messages can spread malware, trick you into divulging personal information, or scare you
into thinking you need to pay to get out of trouble.</p>
<p>Email spam filters catch many of these types of messages, and phone carriers often warn you
of a “spam risk” from unknown callers. Whether via email, text, phone, or social media, some spam
messages do get through, and you want to be able to recognize them and avoid these threats. Below
are several types of spam to look out for.</p>
<h4>Phishing emails</h4><p>Phishing emails are a type of spam cybercriminals send to many
people, hoping to “hook” a few people. Phishing emails trick victims into giving up sensitive
information like website logins or credit card information.</p>
<h4>Email spoofing</h4><p>Spoofed emails mimic, or spoof, an email from a legitimate sender,
and ask you to take some sort of action. Well-executed spoofs will contain familiar branding and
content, often from a large well-known company such as PayPal or Apple. Common email spoofing
spam messages include:<br><ul>
<li>A request for payment of an outstanding invoice</li>
<li>A request to reset your password or verify your account</li>
<li>Verification of purchases you didn’t make</li>
<li>Request for updated billing information</li>
</ul> </p>
<h4>Tech support scams</h4><p>In a tech support scam, the spam message indicates that you
have a technical problem and you should contact tech support by calling the phone number or
clicking a link in the message. Like email spoofing, these types of spam often say they are from a
large technology company like Microsoft or a cybersecurity company like Malwarebytes.</p>
COMPUTER APPLICATIONS Page 29
TAMIZHARASAN S [6937]
<p>If you think you have a technical issue or malware on your computer, tablet, or smartphone,
you should always go to the official website of the company you want to call for tech support to find
the legitimate contact information. Remote tech support often involves remote access to your
computer to help you, and you don’t want to accidentally give that access to a tech support
scammer.</p>
<h4>Advance-fee scams</h4><p>This type of spam is likely familiar to anyone who has been using
email since the 90s or 2000s. Sometimes called “Nigerian prince” emails as that was the purported
message sender for many years, this type of spam promises a financial reward if you first provide a
cash advance. The sender typically indicates that this cash advance is some sort of processing fee or
earnest money to unlock the larger sum, but once you pay, they disappear. To make it more
personal, a similar type of scam involves the sender pretending to be a family member that is in
trouble and needs money, but if you pay, unfortunately the outcome is the same.</p>
<h4>Malspam</h4><p>Short for “malware spam” or “malicious spam,” malspam is a spam
message that delivers malware to your device. Unsuspecting readers who click on a link or open an
email attachment end up with some type of malware including ransomware, Trojans, bots, info-
stealers, cryptominers, spyware, and keyloggers. A common delivery method is to include malicious
scripts in an attachment of a familiar type like a Word document, PDF file, or PowerPoint
presentation. Once the attachment is opened, the scripts run and retrieve the malware payload.</p>
<h4>Spam calls and spam texts</h4><p>Have you ever received a robocall? That’s call spam. A
text message from an unknown sender urging you to click an unknown link? That’s referred to as
text message spam or “smishing,” a combination of SMS and phishing.If you’re receiving spam calls
and texts on your Android or iPhone, most major carriers give you an option to report spam.
Blocking numbers is another way to combat mobile spam. In the US, you can add your phone
number to the National Do Not Call Registry to try to cut down on the amount of unwanted sales
calls you receive, but you should still be alert to scammers who ignore the list.</p>
<h3>How can I stop spam?</h3><p>While it may not be possible to avoid spam altogether, there
are steps you can take to help protect yourself against falling for a scam or getting phished from a
spam message:</p>
<h4>Learn to spot phishing</h4><p>All of us can fall victim to phishing attacks. We may be in a
rush and click a malicious link without realizing. If a new type of phishing attack comes out, we may
not readily recognize it. To protect yourself, learn to check for some key signs that a spam message
isn’t just annoying—it’s a phishing attempt:<br>
<ol>
<li>Sender’s email address: If an email from a company is legitimate, the sender’s email address
should match the domain for the company they claim to represent. Sometimes these are obvious,
like example@abkljzr09348.biz, but other times the changes are less noticeable, like
example@paypa1.com instead of paypal.com.</li>
<li>Missing personal information: If you are a customer, the company should have your
information and will likely address you by your first name. A missing personal greeting alone isn’t
enough to spot a phishing email, but it’s one thing to look for, especially in messages that say they
are from a company with whom you do business. Receiving an email that says your account has
been locked or you owe money is cause to worry, and sometimes we rush to click a link in order to
fix the problem. If it’s phishing, that’s exactly what the sender wants, so be careful and check if the
email is generic or addressed specifically to you.</li>
<li>Links: Beware of all links, including buttons in an email. If you get a message from a company
with whom you have an account, it’s wise to log in to your account to see if there is a message there
rather than just clicking the link in the message without verifying first. You can contact the company
to ask if a suspicious message is legitimate or not. If you have any doubts about a message, don’t
click any links.</li> <li>Grammatical errors: We all make them, but a company sending out
legitimate messages probably won’t have a lot of punctuation errors, poor grammar, and spelling
mistakes. These can be another red flag to indicate that the email could be suspect.</li>
COMPUTER APPLICATIONS Page 30
TAMIZHARASAN S [6937]
<li>Too-good-to-be-true offers: Many phishing messages pretend to be from large, well-known
companies, hoping to ensnare readers who happen to do business with the company. Other phishing
attempts offer something for free like cash or a desirable prize. The saying is often true that if
something sounds too good to be true it probably is, and this can be a warning that a spam message
is trying to get something from you, rather than give you something.</li>
<li>Attachments: Unless you are expecting an email with attachments, always be wary before
opening or downloading them. Using anti-malware software can help by scanning files that you
download for malware.</li>
</ol></p>
<h3>Report spam</h3><p>Email providers have gotten pretty good at filtering out spam, but
when messages make it through to your inbox, you can report them. This is true for spam calls and
text messages, as many carriers give you the ability to report spam as well. You can also choose to
block the sender, often in the same step as reporting the message.</p><br>
<p>Reporting spam can help your email provider or phone service carrier get better at detecting
spam. If legitimate emails get sent to your spam filter, you can report that they should not be
marked as spam, and that also provides useful information on what should not be filtered. Another
helpful step is to add senders you want to hear from to your contacts list proactively.</p>
<h3>Use two factor-authentication (2FA)</h3><p>With two-factor or multi-factor
authentication, even if your username and password are compromised via a phishing attack,
cybercriminals won’t be able to get around the additional authentication requirements tied to your
account. Additional authentication factors include secret questions or verification codes sent to your
phone via text message.</p>
<h3>Install cybersecurity</h3><p>In the event that you click a bad link or download malware
sent to you via spam, good cybersecurity software will recognize the malware and shut it down
before it can do any damage to your system or network With products for home and business, Anti-
Virus softwares has got you covered wherever technology takes you. </p>
</div> </div>
<div class="rightcolumn">
<div class="card">
<h2>About this Webpage</h2>
<p>This Project is made for Computer Application Project</p>
<div class="card">
<h3>Other Popular Posts:</h3><a href="Virus.html">
<div class="Virus"></div>
<div class="fakeimg">Virus</div><br></a><a href="Malware.html">
<div class="Malware"></div>
<div class="fakeimg">Malware</div><br></a><a href="Anti-Virus.html">
<div class="Anti-Virus"></div>
<div class="fakeimg">Anti-Virus</div></div></a>
</div> <div class="card">
<h3>Created and designed by:</h3><h4><b>Tamizharasan S<br>6937</b></h4>
</div>
</div></div>
<div class="footer">
<h4>Virus kind'a works through this quote...</h4>
<p>&ldquo;Computers are incredibly fast, accurate and stupid;
humans are incredibly slow, inaccurate and brilliant
together they are powerful beyond imagination&rdquo;&nbsp;<b>-Albert Einstein</b></p>
</div>
</body>
</html>
COMPUTER APPLICATIONS Page 31
TAMIZHARASAN S [6937]
5.2 Virus
<!DOCTYPE html>
<html>
<head>
<meta name="viewport" content="width=device-width, initial-scale=1">
<style>
*{
box-sizing: border-box;
border-radius: 5px;
}
/* Add a gray background color with some padding */
body {
font-family: Arial;
padding: 20px;
background: #f8d5d5;
}
/* Header/Blog Title */
.header {
padding: 1px;
font-size: 35px;
text-align: center;
background: white;
}
.Spam{
background-image: url("./Spam.jpg");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}
.Virus{
background-image: url("./Virus.jpg");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
text-align: center;
color: rgb(0, 204, 255);
}
.Malware{
background-image: url("./Malware.webp");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;

COMPUTER APPLICATIONS Page 33


TAMIZHARASAN S [6937]
}
.Anti-Virus{
background-image: url("./AntiVirus.webp");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}
/* Create two unequal columns that floats next to each other */
/* Left column */
.leftcolumn {
float: left;
width: 75%;
}
/* Right column */
.rightcolumn {
float: left;
width: 25%;
padding-left: 20px;
}
/* Fake image */
.fakeimg {
background-color: rgba(0, 0, 0, 0.637);
width: 100%;
padding: 20px;
margin-top: -15px;
color:aqua;
text-align: center;
}
/* Add a card effect for articles */
.card {
background-color: white;
padding: 20px;
margin-top: 20px;
}
/* Clear floats after the columns */
.row:after {
content: "";
display: table;
clear: both;
}
/* Footer */
.footer {
padding: 20px;
text-align: center;
background: #ddd;
margin-top: 20px;
}

COMPUTER APPLICATIONS Page 34


TAMIZHARASAN S [6937]
/* Responsive layout - when the screen is less than 800px wide, make the two columns stack on top
of each other instead of next to each other */
@media screen and (max-width: 800px) {
.leftcolumn, .rightcolumn {
width: 100%;
padding: 0;
}
}
</style>
</head>
<body>
<div class="header">
<h2>Virus</h2>
</div>
<div class="row">
<div class="leftcolumn">
<div class="card">
<h2 style="margin-bottom: -20px;">What is Virus?</h2>
<h5>Toxic program</h5>
<p>A type of computer program that, when executed, replicates itself by modifying other
computer programs and inserting its own code. If this replication succeeds, the affected areas are
then said to be "infected" with a computer virus, a metaphor derived from biological viruses. </p>
<p> A computer virus is a type of malicious software, or malware, that spreads between
computers and causes damage to data and software. </p>
Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss
and leakage. A key thing to know about computer viruses is that they are designed to spread across
programs and systems. Computer viruses typically attach to an executable host file, which results in
their viral codes executing when a file is opened. The code then spreads from the document or
software it is attached to via networks, drives, file-sharing programs, or infected email
attachments</p>
<p>Motives for creating viruses can include seeking profit, desire to send a political message,
personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial
of service, or simply because they wish to explore cybersecurity issues, artificial life and evolutionary
algorithms.</p><h4>Speed of System</h4>
<p>A computer system running slower than usual is one of the most common signs that the device
has a virus. This includes the system itself running slowly, as well as applications and internet speed
suffering. If a computer does not have powerful applications or programs installed and is running
slowly, then it may be a sign it is infected with a virus.</p>
<h4>Programs Self-executing</h4><p>If computer programs unexpectedly close by themselves,
then it is highly likely that the software has been infected with some form of virus or malware.
Another indicator of a virus is when applications fail to load when selected from the Start menu or
their desktop icon.</p>
<h4>Accounts Being Logged Out and Crashing of the Device</h4><p>Some viruses are designed to
affect specific applications, which will either cause them to crash or force the user to automatically
log out of the service.System crashes and the computer itself unexpectedly closing down are
common indicators of a virus. Computer viruses cause computers to act in a variety of strange ways,
which may include opening files by themselves, displaying unusual error messages, or clicking keys at
random.</p>
<h4>Mass Emails Being Sent from Your Email Account</h4><p>Computer viruses are commonly
spread via email. Hackers can use other people's email accounts to spread malware and carry out

COMPUTER APPLICATIONS Page 35


TAMIZHARASAN S [6937]
wider cyberattacks. Therefore, if an email account has sent emails in the outbox that a user did not
send, then this could be a sign of a computer virus.</p>
<h3>How Do Computer Viruses Attack and Spread?</h3><p>In the early days of computers,
viruses were spread between devices using floppy disks. Nowadays, viruses can still be spread via
hard disks and Universal Serial Bus (USB) devices, but they are more likely to be passed between
devices through the internet. </p><p>Computer viruses can be spread via email, with some even
capable of hijacking email software to spread themselves. Others may attach to legitimate software,
within software packs, or infect code, and other viruses can be downloaded from compromised
application stores and infected code repositories. A key feature of any computer virus is it requires a
victim to execute its code or payload, which means the host application should be running.</p>
<h3>Types of Computer Viruses</h3><p>There are several types of computer viruses that can
infect devices. This section will cover computer virus protections and how to get rid of computer
viruses.</p>
<h4>Resident Virus</h4><p>Viruses propagate themselves by infecting applications on a host
computer. A resident virus achieves this by infecting applications as they are opened by a user. A
non-resident virus is capable of infecting executable files when programs are not running.</p>
<h4>Multipartite Virus</h4><p>A multipartite virus uses multiple methods to infect and spread
across computers. It will typically remain in the computer’s memory to infect the hard disk, then
spread through and infect more drives by altering the content of applications. This results in
performance lag and application memory running low. </p><p>Multipartite viruses can be avoided
by not opening attachments from untrusted sources and by installing trusted antivirus software. It
can also be prevented by cleaning the boot sector and the computers entire disk.</p>
<h4>Direct Action</h4><p>A direct action virus accesses a computer’s main memory and infects
all programs, files, and folders located in the autoexec.bat path, before deleting itself. This virus
typically alters the performance of a system but is capable of destroying all data on the computer’s
hard disk and any USB device attached to it. Direct action viruses can be avoided through the use of
antivirus scanners. They are easy to detect, as is restoring infected files.</p>
<h4>Browser Hijacker</h4><p>A browser hijacker manually changes the settings of web browsers,
such as replacing the homepage, editing the new tab page, and changing the default search engine.
Technically, it is not a virus because it cannot infect files but can be hugely damaging to computer
users, who often will not be able to restore their homepage or search engine. It can also contain
adware that causes unwanted pop-ups and advertisements.</p><p>Browser hijackers typically
attach to free software and malicious applications from unverified websites or app stores, so only
use trusted software and reliable antivirus software.</p>
<h4>Overwrite Virus</h4><p>Overwrite viruses are extremely dangerous. They can delete data
and replace it with their own file content or code. Once files get infected, they cannot be replaced,
and the virus can affect Windows, DOS, Linux, and Apple systems. The only way this virus can be
removed is by deleting all of the files it has infected, which could be devastating. The best way to
protect against the overwrite virus is to use a trusted antivirus solution and keep it updated.</p>
<h4>Web Scripting Virus</h4><p>A web scripting virus attacks web browser security, enabling a
hacker to inject web-pages with malicious code, or client-side scripting. This allows cyber criminals to
attack major websites, such as social networking sites, email providers, and any site that enables
user input or reviews. Attackers can use the virus to send spam, commit fraudulent activity, and
damage server files.</p><p>Protecting against web scripting is reliant on deploying real-time web
browser protection software, using cookie security, disabling scripts, and using malicious software
removal tools.</p>
<h4>File Infector</h4><p>A file infector is one of the most common computer viruses. It
overwrites files when they are opened and can quickly spread across systems and networks. It
largely affects files with .exe or .com extensions. The best way to avoid file infector viruses is to only
download official software and deploy an antivirus solution.</p>

COMPUTER APPLICATIONS Page 36


TAMIZHARASAN S [6937]
<h4>Network Virus</h4><p>Network viruses are extremely dangerous because they can
completely cripple entire computer networks. They are often difficult to discover, as the virus could
be hidden within any computer on an infected network. These viruses can easily replicate and
spread by using the internet to transfer to devices connected to the network. Trusted, robust
antivirus solutions and advanced firewalls are crucial to protecting against network viruses.</p>
<h4>Boot Sector Virus</h4><p>A boot sector virus targets a computer’s master boot record
(MBR). The virus injects its code into a hard disk’s partition table, then moves into the main memory
when a computer restarts. The presence of the virus is signified by boot-up problems, poor system
performance, and the hard disk becoming unable to locate. Most modern computers come with
boot sector safeguards that restrict the potential of this type of virus. </p><p>Steps to protecting
against a boot sector virus include ensuring disks are write-protected and not starting up a computer
with untrusted external drives connected.</p>
</p>
</div>
</div>
<div class="rightcolumn">
<div class="card">
<h2>About this Webpage</h2>
<p>This Project is made for Computer Application Project</p>
<div class="card">
<h3>Other Popular Posts:</h3><a href="Spam.html">
<div class="Spam"></div>
<div class="fakeimg">Spam</div><br></a><a href="Malware.html">
<div class="Malware"></div>
<div class="fakeimg">Malware</div><br></a><a href="Anti-Virus.html">
<div class="Anti-Virus"></div>
<div class="fakeimg">Anti-Virus</div></div></a>
</div>
<div class="card">
<h3>Created and designed by:</h3><h4><b>Tamizharasan S<br>6937</b></h4>
</div>
</div>
</div>
<div class="footer">
<h4>Virus kind'a works through this quote...</h4>
<p>&ldquo;Computers are incredibly fast, accurate and stupid;
humans are incredibly slow, inaccurate and brilliant
together they are powerful beyond imagination&rdquo;&nbsp;<b>-Albert Einstein</b></p>
</div>
</body>
</html>

COMPUTER APPLICATIONS Page 37


TAMIZHARASAN S [6937]
5.3 Malware

<!DOCTYPE html>
<html>
<head>
<meta name="viewport" content="width=device-width, initial-scale=1">
<style>
*{
box-sizing: border-box;
border-radius: 5px;
}
/* Add a gray background color with some padding */
body {
font-family: Arial;
padding: 20px;
background: #f8d5d5;
}
/* Header/Blog Title */
.header {
padding: 1px;
font-size: 35px;
text-align: center;
background: white;
}
.Spam{
background-image: url("./Spam.jpg");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}
.Virus{
background-image: url("./Virus.jpg");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
text-align: center;
color: rgb(0, 204, 255);
}
.Anti-Virus{

COMPUTER APPLICATIONS Page 39


TAMIZHARASAN S [6937]
background-image: url("./AntiVirus.webp");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}
.Malware{
background-image: url("./Malware.webp");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}
/* Create two unequal columns that floats next to each other */
/* Left column */
.leftcolumn {
float: left;
width: 75%;
}
/* Right column */
.rightcolumn {
float: left;
width: 25%;
padding-left: 20px;
}
/* Fake image */
.fakeimg {
background-color: rgba(0, 0, 0, 0.637);
width: 100%;
padding: 20px;
margin-top: -15px;
color:aqua;
text-align: center;
}
/* Add a card effect for articles */
.card {
background-color: white;
padding: 20px;
margin-top: 20px;
}

COMPUTER APPLICATIONS Page 40


TAMIZHARASAN S [6937]
/* Clear floats after the columns */
.row:after {
content: "";
display: table;
clear: both;
}
/* Footer */
.footer {
padding: 20px;
text-align: center;
background: #ddd;
margin-top: 20px;
}
/* Responsive layout - when the screen is less than 800px wide, make the two columns stack on top
of each other instead of next to each other */
@media screen and (max-width: 800px) {
.leftcolumn, .rightcolumn {
width: 100%;
padding: 0;
}
}
</style>
</head>
<body>
<div class="header">
<h2>Malware</h2>
</div>
<div class="row">
<div class="leftcolumn">
<div class="card">
<h2 style="margin-bottom: -20px;">What is Malware?</h2>
<p>Malware, or “malicious software,” is an umbrella term that describes any malicious program
or code that is harmful to systems.Hostile, intrusive, and intentionally nasty, malware seeks to
invade, damage, or disable computers, computer systems, networks, tablets, and mobile devices,
often by taking partial control over a device’s operations. Like the human flu, it interferes with
normal functioning.The motives behind malware vary. Malware can be about making money off you,
sabotaging your ability to get work done, making a political statement, or just bragging rights.
Although malware cannot damage the physical hardware of systems or network equipment (with
one known exception—see the Google Android section below), it can steal, encrypt, or delete your
data, alter or hijack core computer functions, and spy on your computer activity without your
knowledge or permission.</p>
<h2>How can I tell if I have a malware infection?</h2><p>Malware can reveal itself with many
different aberrant behaviors. Here are a few telltale signs that you have malware on your
system:</p> <ul>

COMPUTER APPLICATIONS Page 41


TAMIZHARASAN S [6937]
<li>Your computer slows down. One of malware’s side effects is to reduce the speed of your
operating system (OS), whether you’re navigating the Internet or just using your local applications,
usage of your system’s resources appears abnormally high. You might even notice your computer’s
fan whirring away at full speed—a good indicator that something is taking up system resources in
the background. This tends to happen when your computer has been roped into a botnet; i.e. a
network of enslaved computers used to perform DDoS attacks, blast out spam, or mine
cryptocurrency.</li><li>Your screen is inundated with annoying ads. Unexpected pop-up ads are a
typical sign of a malware infection. They’re especially associated with a form of malware known as
adware. What’s more, pop-ups usually come packaged with other hidden malware threats. So if you
see something akin to “CONGRATULATIONS, YOU’VE WON A FREE PSYCHIC READING!” in a pop-up,
don’t click on it. Whatever free prize the ad promises, it will cost you plenty.</li>
<li>Your system crashes. This can come as a freeze or a BSOD (Blue Screen of Death), the latter
occurs on Windows systems after encountering a fatal error.</li>
<li>You notice a mysterious loss of disk space. This could be due to a bloated malware squatter,
hiding in your hard drive aka bundleware</li>
<li>There’s a weird increase in your system’s Internet activity. Take Trojans for example. Once a
Trojan lands on a target computer, the next thing it does is reach out to the attacker’s command and
control server (C&C) to download a secondary infection, often ransomware. This could explain the
spike in Internet activity. The same goes for botnets, spyware, and any other threat that requires
back and forth communication with the C&C servers.</li>
<li>Your browser settings change. If you notice your homepage changed or you have new
toolbars, extensions, or plugins installed, then you might have some sort of malware infection.
Causes vary, but this usually means you clicked on that “congratulations” pop-up, which downloaded
some unwanted software.</li>
<li>Your antivirus product stops working and you cannot turn it back on, leaving you
unprotected against the sneaky malware that disabled it.</li>
<li>You lose access to your files or your entire computer. This is symptomatic of a ransomware
infection. The hackers announce themselves by leaving a ransom note on your desktop or changing
your desktop wallpaper itself in to a ransom note (see GandCrab). In the note, the perpetrators
typically inform you that your data has been encrypted and demand a ransom payment in exchange
for decrypting your files.</li>
</ul><p>Even if everything seems to be working just fine on your system, don’t get complacent,
because no news isn’t necessarily good news. Powerful malware can hide deep in your computer,
evading detection, and going about its dirty business without raising any red flags. While we’ve
provided a quick malware spotter’s guide, it really takes the unfaltering eye of a good cybersecurity
program to detect malware on your system (more on that later).</p>
<h2>Types of Malware</h2><p>Here are the most common offenders in the rogues’ gallery of
malware:</p><h3>Adware:</h3><p>Adware is unwanted software designed to throw
advertisements up on your screen, often within a web browser, but sometimes within mobile apps
as well. Typically, adware disguises itself as legitimate or piggybacks on another program to trick you
into installing it on your PC, tablet, or mobile device.</p>
<h3>Spyware:</h3><p>Spyware is malware that secretly observes the computer user's activities,
including browsing activity, downloads, payment information, and login credentials, and then

COMPUTER APPLICATIONS Page 42


TAMIZHARASAN S [6937]
reports this information to the software's author. Spyware isn't just for cybercriminals. Legitimate
companies sometimes use spyware to track employees.</p>
<h3>Keylogger:</h3><p>A keylogger, spyware's less sophisticated cousin, is malware that
records all the user's keystrokes on the keyboard. This malware typically stores the gathered
information and sends it to the attacker seeking sensitive information like usernames, passwords, or
credit card details</p>
<h3>Computer Virus:</h3><p>A computer virus is malware that attaches to another program
and, when triggered, replicates itself by modifying other computer programs and infecting them
with its own bits of code.</p>
<h3>Exploits:</h3><p>Exploits are a type of threat that takes advantage of bugs and
vulnerabilities in a system in order to allow the exploit's creator to deliver malware. One of the most
common exploits is the SQL injection.</p>
<h3>Worms:</h3><p>Worms are a type of malware similar to viruses in that they spread, but
they don't require user interaction to be triggered.</p>
<h3>Trojan:</h3><p>A Trojan, or Trojan Horse, is more of a delivery method for infections than
an infection. The Trojan presents itself as something useful to trick users into opening it. Trojan
attacks can carry just about any form of malware, including viruses, spyware, and ransomware.
Famously, the Emotet banking Trojan started as an information stealer, targeting banks and large
corporations.</p><p>Later, Emotet operated purely as an infection vector for other forms of
malware, usually ransomware.</p>
<h3>Ransomware:</h3><p>Ransomware is a form of malware that locks you out of your device
and/or encrypts your files, then forces you to pay a ransom to get them back. Ransomware has been
called the cybercriminal's weapon of choice, because it demands a profitable quick payment in hard-
to-trace cryptocurrency.</p><p>The cybercriminals behind the GandCrab ransomware claimed to
have brought in over $2 billion in ransom payments over the course of a year and a half.</p>
<h3>Rootkit:</h3><p>A rootkit is malware that provides the attacker with administrator
privileges on the infected system and actively hides from the normal computer user. Rootkits also
hide from other software on the system—even from the operating system itself.</p>
<h3>Malicious Cryptomining:</h3><p>Malicious cryptomining, also sometimes called drive-by
mining or cryptojacking, is an increasingly prevalent form of malware or browser-based attack that is
delivered through multiple attack methods, including malspam, drive-by downloads, and rogue apps
and extensions.</p><p>It allows someone else to use your computer's CPU or GPU to mine
cryptocurrency like Bitcoin or Monero. So instead of letting you cash in on your computer's
horsepower, the cryptominers send the collected coins into their own account—not yours. So,
essentially, a malicious cryptominer is stealing your device's resources to make money.</p>
<h2>How to remove malware</h2><p>Follow these three easy steps to remove malware from
your device.</p> <ol>
<li> Download and install a good cybersecurity program.</li>
<li>Change all your passwords. Now that you know you’re not being snooped on by some form
of malware, you need to reset your passwords—not only for your PC or mobile device, but also your
email, your social media accounts, your favorite shopping sites, and your online banking and billing
centers. This may sound paranoid, but with spyware, banking Trojans and the like, you just don’t
know for sure what data was captured before you stopped the infection. As always, use some form

COMPUTER APPLICATIONS Page 43


TAMIZHARASAN S [6937]
of multi-factor authentication (at least two-factor) and don’t think you need to memorize all your
passwords. Use a password manager instead.
<ul>
<li>If your iPhone or iPad is infected with malware (as improbable as that may be). Things are
a little trickier. Apple does not permit scans of either the device’s system or other files, though
Malwarebytes for iOS, for example, will screen and block scam calls and texts. Your only option is to
wipe your phone with a factory reset, then restore it from your backup in iCloud or iTunes. If you
didn’t backup your phone, then you’re starting over from scratch.</li>
</ul> </li> </ol>
<h2>How to protect against malware</h2><p>In no particular order, here’s our tips on
protecting against malware.</p><ol>
<li>Pay attention to the domain and be wary if the site isn’t a top-level domain, i.e., com, mil,
net, org, edu, or biz, to name a few.</li>
<li>Use strong passwords with multi-factor authentication. A password manager can be a big
help here.</li>
<li>Avoid clicking on pop-up ads while browsing the Internet.</li>
<li>Avoid opening email attachments from unknown senders.</li>
<li>Do not click on strange, unverified links in emails, texts, and social media messages.</li>
<li> Don’t download software from untrustworthy websites or peer-to-peer file transfer
networks.</li>
<li>Stick to official apps from Google Play and Apple’s App Store on Android, OSX, and iOS (and
don’t jailbreak your phone). PC users should check the ratings and reviews before installing any
software.</li>
<li>Make sure your operating system, browsers, and plugins are patched and up to date.</li>
<li>Delete any programs you don’t use anymore.</li>
<li>Back up your data regularly. If your files become damaged, encrypted, or otherwise
inaccessible, you’ll be covered.</li>
<li>Download and install a cybersecurity program that actively scans and blocks threats from
getting on your device.</li>
</ol> </div> </div>
<div class="rightcolumn">
<div class="card">
<h2>About this Webpage</h2>
<p>This Project is made for Computer Application Project</p>
<div class="card">
<h3>Other Popular Posts:</h3><a href="Spam.html">
<div class="Spam"></div>
<div class="fakeimg">Spam</div><br></a><a href="Virus.html">
<div class="Virus"></div>
<div class="fakeimg">Virus</div><br></a><a href="Anti-Virus.html">
<div class="Anti-Virus"></div>
<div class="fakeimg">Anti-Virus</div></div></a>
</div> <div class="card">
<h3>Created and designed by:</h3><h4><b>Tamizharasan S<br>6937</b></h4>

COMPUTER APPLICATIONS Page 44


TAMIZHARASAN S [6937]
</div> </div></div><div class="footer">
<p>&ldquo;<b>Our Brain is a Hardware
Our thoughts are Software
lt's time for Update to be Aware
Otherwise people treat you like Malware</b>&rdquo;<br>Update is so important to prevent
Malware.</p></div></body>
</html>

COMPUTER APPLICATIONS Page 45


TAMIZHARASAN S [6937]
5.4 Anti-Virus
<!DOCTYPE html>
<html>
<head>
<meta name="viewport" content="width=device-width, initial-scale=1">
<style>
*{
box-sizing: border-box;
border-radius: 5px;
}
/* Add a gray background color with some padding */
body {
font-family: Arial;
padding: 20px;
background: #f8d5d5;
}
/* Header/Blog Title */
.header {
padding: 1px;
font-size: 35px;
text-align: center;
background: white;
}
.Spam{
background-image: url("./Spam.jpg");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}
.Virus{
background-image: url("./Virus.jpg");
width: 100%;
background-size: cover;
height: 30px;
padding:40px;
text-align: center;
color: rgb(0, 204, 255);
}
.Malware{
background-image: url("./Malware.webp");
width: 100%;
COMPUTER APPLICATIONS Page 47
TAMIZHARASAN S [6937]
background-size: cover;
height: 30px;
padding:40px;
color: rgb(0, 204, 255);
text-align: center;
}

/* Create two unequal columns that floats next to each other */


/* Left column */
.leftcolumn {
float: left;
width: 75%;
}
/* Right column */
.rightcolumn {
float: left;
width: 25%;
padding-left: 20px;
}
/* Fake image */
.fakeimg {
background-color: rgba(0, 0, 0, 0.637);
width: 100%;
padding: 20px;
margin-top: -15px;
color:aqua;
text-align: center;
}
/* Add a card effect for articles */
.card {
background-color: white;
padding: 20px;
margin-top: 20px;
}
/* Clear floats after the columns */
.row:after {
content: "";
display: table;
clear: both;
}
/* Footer */
.footer {
padding: 20px;
text-align: center;

COMPUTER APPLICATIONS Page 48


TAMIZHARASAN S [6937]
background: #ddd;
margin-top: 20px;
}
/* Responsive layout - when the screen is less than 800px wide, make the two columns stack on top
of each other instead of next to each other */
@media screen and (max-width: 800px) {
.leftcolumn, .rightcolumn {
width: 100%;
padding: 0;
}
}
</style>
</head>
<body>
<div class="header">
<h2>Anti-Virus</h2>
</div>
<div class="row">
<div class="leftcolumn">
<div class="card">
<h2 style="margin-bottom: -20px;">What is Anti-Virus softwares?</h2><p>Antivirus is software
that is designed to detect, protect against, and remove malware on a computer or mobile device.
Originally, it was created to protect against computer viruses, but now it's more of a general term to
describe software that uses a combination of advanced technologies to protect against a variety of
threats, including ransomware, spyware, and even never-before-seen zero day attacks. Early
antivirus programs would compare software file signatures against a list of known viruses to see if
they matched, and if so, block them. Today, cybersecurity companies employ several different
methods to detect, block, or remove malware from a device.</p>
<h2>What is a computer virus?</h2><p>A computer virus requires a host program, and it needs
to be initiated by an unsuspecting user. Triggering a virus can be as simple as opening a malicious
email attachment (malspam), launching an infected program, or viewing an ad on a malicious site
(adware). Once that happens, the virus tries to spread to other systems on the computer's network
or in the user's list of contacts.</p><p>Computer viruses self-replicate. This process of self-
replication can happen by modifying or completely replacing other files on the user's system. Either
way, the resulting file must show the same behavior as the original virus. Notably, computer worms
also self-replicate, but the difference between a virus and a worm is that viruses rely on human
action for activation and need a host system to replicate. </p>
<h3>Antivirus software programs:</h3><p>Early online antiviruses were reactive. They could
only detect infections after they took place. Moreover, the first antivirus programs identified viruses
by the relatively primitive technique of looking for their signature characteristics.</p><p>Early
antiviruses using signature-based strategies could easily detect known viruses, but they were unable
to detect new attacks. Instead, a new virus had to be isolated and analyzed to determine its
signature, and subsequently added to the list of known viruses.</p><p>Those using antiviruses
online had to regularly download an ever-growing database file consisting of hundreds of thousands

COMPUTER APPLICATIONS Page 49


TAMIZHARASAN S [6937]
of signatures. Even so, new viruses that got out ahead of database updates left a significant
percentage of devices unprotected. The result was a constant race to keep up with the evolving
landscape of threats as new viruses were created and released into the wild.</p>
<h2>Why do I need antivirus for my computer?</h2><p>Viruses are just one kind of malware.
There are other forms of malware that are more common these days, and antivirus software is
designed to defend against these. Here are just a few of today's online threats:</p>
<h3>Adware:</h3><p>Adware is unwanted software designed to throw advertisements up on
your screen, often within a web browser, but sometimes within mobile apps as well. Typically,
adware disguises itself as legitimate or piggybacks on another program to trick you into installing it
on your PC, tablet, or mobile device.</p>
<h3>Spyware:</h3><p>Spyware is malware that secretly observes the computer user's activities,
including browsing activity, downloads, payment information, and login credentials, and then
reports this information to the software's author. Spyware isn't just for cybercriminals. Legitimate
companies sometimes use spyware to track employees.</p>
<h3>Keylogger:</h3><p>A keylogger, spyware's less sophisticated cousin, is malware that
records all the user's keystrokes on the keyboard. This malware typically stores the gathered
information and sends it to the attacker seeking sensitive information like usernames, passwords, or
credit card details</p>
<h3>Computer Virus:</h3><p>A computer virus is malware that attaches to another program
and, when triggered, replicates itself by modifying other computer programs and infecting them
with its own bits of code.</p>
<h3>Phishing:</h3><p>Phishing is a type of attack aimed at getting your login credentials, credit
card numbers, and any other information the attackers find valuable. Phishing attacks often involve
some form of spoofing, usually an email designed to look like it's coming from an individual or
organization you trust. Many data breaches start with a phishing attack.</p>
<h3>Spoofing:</h3><p>Spoofing occurs when a threat pretends to be something it's not in order
to deceive victims to take some sort of action like opening an infected email attachment or entering
their username and password on a malicious site spoofed or faked to look like a legitimate site.</p>
<h3>Malvertising:</h3><p>Malvertising is an attack that uses malicious ads on mostly legitimate
websites to deliver malware. You needn't even click on the ad to be affected—the accompanying
malware can install itself simply by loading and viewing the page in your browser. All you have to do
is visit a good site on the wrong day.</p>
<h3>Exploits:</h3><p>Exploits are a type of threat that takes advantage of bugs and
vulnerabilities in a system in order to allow the exploit's creator to deliver malware. One of the most
common exploits is the SQL injection.</p>
<h3>Worms:</h3><p>Worms are a type of malware similar to viruses in that they spread, but
they don't require user interaction to be triggered.</p>
<h3>Trojan:</h3><p>A Trojan, or Trojan Horse, is more of a delivery method for infections than
an infection. The Trojan presents itself as something useful to trick users into opening it. Trojan
attacks can carry just about any form of malware, including viruses, spyware, and ransomware.
Famously, the Emotet banking Trojan started as an information stealer, targeting banks and large
corporations.</p><p>Later, Emotet operated purely as an infection vector for other forms of
malware, usually ransomware.</p><h3>Ransomware:</h3>

COMPUTER APPLICATIONS Page 50


TAMIZHARASAN S [6937]
<p>Ransomware is a form of malware that locks you out of your device and/or encrypts your files,
then forces you to pay a ransom to get them back. Ransomware has been called the cybercriminal's
weapon of choice, because it demands a profitable quick payment in hard-to-trace
cryptocurrency.</p><p>The cybercriminals behind the GandCrab ransomware claimed to have
brought in over $2 billion in ransom payments over the course of a year and a half.</p>
<h3>Rootkit:</h3><p>A rootkit is malware that provides the attacker with administrator
privileges on the infected system and actively hides from the normal computer user. Rootkits also
hide from other software on the system—even from the operating system itself.</p>
<h3>Malicious Cryptomining:</h3><p>Malicious cryptomining, also sometimes called drive-by
mining or cryptojacking, is an increasingly prevalent form of malware or browser-based attack that is
delivered through multiple attack methods, including malspam, drive-by downloads, and rogue apps
and extensions.</p><p>It allows someone else to use your computer's CPU or GPU to mine
cryptocurrency like Bitcoin or Monero. So instead of letting you cash in on your computer's
horsepower, the cryptominers send the collected coins into their own account—not yours. So,
essentially, a malicious cryptominer is stealing your device's resources to make money.</p>
<h2>The future of antiviruses and security programs</h2><p>Artificial intelligence (AI) and
machine learning (ML) are the latest stars in the top antivirus and anti-malware technology. AI
allows machines to perform tasks for which they are not specifically pre-programmed. AI does not
blindly execute a limited set of commands. Rather, AI uses “intelligence” to analyze a situation, and
take action for a given goal such as identifying signs of ransomware activity. ML is programming
that's capable of recognizing patterns in new data, then classifying the data in ways that teach the
machine how to learn.</p><br><p>Put another way, AI focuses on building smart machines, while
ML uses algorithms that allow the machines to learn from experience. Both these technologies are a
perfect fit for cybersecurity, especially since the number and variety of threats coming in every day
are too overwhelming for signature-based methods or other manual measures. </p>
</div> </div>
<div class="rightcolumn">
<div class="card">
<h2>About this Webpage</h2>
<p>This Project is made for Computer Application Project</p>
<div class="card">
<h3>Other Popular Posts</h3><a href="Spam.html">
<div class="Spam"></div>
<div class="fakeimg">Spam</div><br></a><a href="Malware.html">
<div class="Malware"></div>
<div class="fakeimg">Malware</div><br></a><a href="Virus.html">
<div class="Virus"></div>
<div class="fakeimg">Virus</div></div></a>
</div> <div class="card">
<h3>Created and designed by:</h3><h4><b>Tamizharasan S<br>6937</b></h4>
</div> </div></div><div class="footer">
<p>&ldquo;Behind every virus there is an Anti-Virus&rdquo;&nbsp;</p>
</div>
</body></html>

COMPUTER APPLICATIONS Page 51


TAMIZHARASAN S [6937]

You might also like