{"id":63,"date":"2007-06-15T22:40:22","date_gmt":"2007-06-15T22:40:22","guid":{"rendered":"http:\/\/hakawitech.wordpress.com\/2007\/06\/15\/200000-malicious-programs-in-existence\/"},"modified":"2007-06-15T22:40:22","modified_gmt":"2007-06-15T22:40:22","slug":"200000-malicious-programs-in-existence","status":"publish","type":"post","link":"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/","title":{"rendered":"200,000 malicious programs in existence"},"content":{"rendered":"<blockquote><p>These problem programs can arrive via e-mail, instant messenger, through your internet connection or even your web browser if you visit the wrong website. The threats are so numerous and appear so fast that Windows users must feel under siege. [<a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/technology\/5414992.stm\" target=\"_blank\">link<\/a>]<\/p><\/blockquote>\n<p>The majority of the attacks are against Windows users. So how do we stay safe while surfing? The BBC offers a few suggestions:<\/p>\n<blockquote>\n<ul>\n<li>Use anti-spyware and anti-virus programs<\/li>\n<li>On at least a weekly basis update anti-virus and spyware products<\/li>\n<li>Install a firewall and make sure it is switched on<\/li>\n<li>Make sure updates to your operating system are installed<\/li>\n<li>Take time to educate yourself and family about the risks<\/li>\n<li>Monitor your computer and stay alert to threats<\/li>\n<\/ul>\n<\/blockquote>\n<p>Doesn&#8217;t exactly say much, but for starters, this is good advice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>These problem programs can arrive via e-mail, instant messenger, through your internet connection or even your web browser if you visit the wrong website. The threats are so numerous and appear so fast that Windows users must feel under siege. <a href=\"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,40],"tags":[],"class_list":["post-63","post","type-post","status-publish","format-standard","hentry","category-securityprivacy","category-windows-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>200,000 malicious programs in existence - Education and Technology Hub<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"200,000 malicious programs in existence - Education and Technology Hub\" \/>\n<meta property=\"og:description\" content=\"These problem programs can arrive via e-mail, instant messenger, through your internet connection or even your web browser if you visit the wrong website. The threats are so numerous and appear so fast that Windows users must feel under siege. Read More ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/\" \/>\n<meta property=\"og:site_name\" content=\"Education and Technology Hub\" \/>\n<meta property=\"article:published_time\" content=\"2007-06-15T22:40:22+00:00\" \/>\n<meta name=\"author\" content=\"mtadros\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"mtadros\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/\",\"url\":\"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/\",\"name\":\"200,000 malicious programs in existence - Education and Technology Hub\",\"isPartOf\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/#website\"},\"datePublished\":\"2007-06-15T22:40:22+00:00\",\"author\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b\"},\"breadcrumb\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/virtualactivism.org\/education\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"200,000 malicious programs in existence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/virtualactivism.org\/education\/#website\",\"url\":\"https:\/\/virtualactivism.org\/education\/\",\"name\":\"Education and Technology Hub\",\"description\":\"Technology and Education Resources\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/virtualactivism.org\/education\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b\",\"name\":\"mtadros\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g\",\"caption\":\"mtadros\"},\"url\":\"https:\/\/virtualactivism.org\/education\/author\/mtadros\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"200,000 malicious programs in existence - Education and Technology Hub","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/","og_locale":"en_US","og_type":"article","og_title":"200,000 malicious programs in existence - Education and Technology Hub","og_description":"These problem programs can arrive via e-mail, instant messenger, through your internet connection or even your web browser if you visit the wrong website. The threats are so numerous and appear so fast that Windows users must feel under siege. Read More ...","og_url":"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/","og_site_name":"Education and Technology Hub","article_published_time":"2007-06-15T22:40:22+00:00","author":"mtadros","twitter_card":"summary_large_image","twitter_misc":{"Written by":"mtadros","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/","url":"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/","name":"200,000 malicious programs in existence - Education and Technology Hub","isPartOf":{"@id":"https:\/\/virtualactivism.org\/education\/#website"},"datePublished":"2007-06-15T22:40:22+00:00","author":{"@id":"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b"},"breadcrumb":{"@id":"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/virtualactivism.org\/education\/200000-malicious-programs-in-existence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/virtualactivism.org\/education\/"},{"@type":"ListItem","position":2,"name":"200,000 malicious programs in existence"}]},{"@type":"WebSite","@id":"https:\/\/virtualactivism.org\/education\/#website","url":"https:\/\/virtualactivism.org\/education\/","name":"Education and Technology Hub","description":"Technology and Education Resources","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/virtualactivism.org\/education\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b","name":"mtadros","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g","caption":"mtadros"},"url":"https:\/\/virtualactivism.org\/education\/author\/mtadros\/"}]}},"_links":{"self":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/posts\/63","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/comments?post=63"}],"version-history":[{"count":0,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/posts\/63\/revisions"}],"wp:attachment":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/media?parent=63"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/categories?post=63"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/tags?post=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}