how can computer viruses be prevented ; how can i protect my computer ; how can i protect my computer from hackers ; how can i protect my computer from viruses ; how can we prevent computer virus ; how can we protect your computer from virus ; how can you avoid computer viruses ; how can you prevent a computer virus ; how can you prevent computer viruses ; how can you prevent spyware from installing on your computer ; how can you prevent viruses on a computer ; how can you protect your computer ; how can you protect your computer against viruses ; how can you protect your computer from a virus ; how can you protect your computer from malware ; how can you protect your computer from spyware ; how can you protect your computer from viruses ; how can you protect yourself against viruses ; how can you protect yourself from computer viruses ; how can you protect yourself from spyware ; how can you protect yourself from viruses ; how can you stop a computer virus ; how can you stop your computer from getting a virus ; how do i know if my computer is protected ; how do i protect my computer ; how do i protect my computer from hackers ; how do i protect my computer from viruses ; how do we protect our computer ; how do you prevent a computer virus ; how do you prevent computer viruses ; how do you protect your computer ; how do you protect your computer from viruses ; how does a firewall protect a computer ; how does a firewall protect a computer from being hacked ; how does a firewall protect your computer ; how does antivirus protect your computer ; how does antivirus software protect my computer ; how does encryption protect information from hackers ; how does firewall protect your computer ; how safe is my computer ; how secure is my computer ; how secure is my pc ; how to avoid a computer virus ; how to avoid computer hacking ; how to avoid computer viruses ; how to avoid hackers and viruses ; how to avoid virus in computer ; how to avoid viruses on computer ; how to avoid viruses on your computer ; how to be safe on a computer ; how to best protect your computer ; how to block a hacker on your computer ; how to block hackers from your computer ; how to completely secure your computer ; how to fully protect your computer ; how to keep computer safe from viruses ; how to keep computer secure ; how to keep hackers out of your computer ; how to keep information secure on a computer ; how to keep my computer safe ; how to keep viruses off your computer ; how to keep your computer safe ; how to keep your computer safe from viruses ; how to keep your computer secure ; how to make my computer secure ; how to make sure your computer is secure ; how to make your computer safe ; how to make your computer secure ; how to make your pc secure ; how to password protect computer ; how to password protect my computer ; how to password protect your computer ; how to prevent a computer virus ; how to prevent a virus on a computer ; how to prevent a virus on your computer ; how to prevent computer from virus ;how to preventcomputer hacking
such events(passive) can be influenced byHacking computers
Computer programmers have designed numerous computer wallsto preventhacking intrusions in computers
a vulnerability in the Intel chipscan causehacking computer
The planhow to preventcomputer hacking
the most effective approachto preventcomputer hacking
Because they are complex , it is difficultto preventhacking into computers
private investigators hired by the campaign(passive) discovered bycomputer hack
to plug security leaks on the Internetto preventcomputer hacking
from Chinaoriginatingfrom China
to gather and disseminate information to influence the election … including [ through ] Wikileaksdesignedto gather and disseminate information to influence the election … including [ through ] Wikileaks
a significant damage since many operations are centrally controlled by computerscauseda significant damage since many operations are centrally controlled by computers
very many problemscan causevery many problems
strong impacts on society(passive) are caused bystrong impacts on society
direct damage(passive) caused bydirect damage
loss or damage(passive) caused byloss or damage
156 emergency sirens across Dallas " Reuterssets156 emergency sirens across Dallas " Reuters
a mysteryThe highly unusual flash freeze that crippled Nasdaq and blocked trading in Apple , Facebook and other popular stocks(passive) to have been caused bya mysteryThe highly unusual flash freeze that crippled Nasdaq and blocked trading in Apple , Facebook and other popular stocks
problems across the globecreatedproblems across the globe
problems for family - Telegraph Sarah Palin claims computer hacker caused problems for family Sarah Palin , the former Republican vice presidential candidate , told a court that a man accused of hacking into her email account caused problems for both her family and her campaigncausedproblems for family - Telegraph Sarah Palin claims computer hacker caused problems for family Sarah Palin , the former Republican vice presidential candidate , told a court that a man accused of hacking into her email account caused problems for both her family and her campaign
at Pin Oak MSoriginatedat Pin Oak MS
off 156 emergency sirens across Dallas Infographic IDsetsoff 156 emergency sirens across Dallas Infographic ID
off 156 emergency sirens across Dallas – Swagggirlicious Mediasetsoff 156 emergency sirens across Dallas – Swagggirlicious Media
new blocks without the owner knowing new blocksto createnew blocks without the owner knowing new blocks
real - world damagecould ... causereal - world damage
variety of damage in the systemcreatevariety of damage in the system
great financial lossescausinggreat financial losses
in financial losses and hasslesreally resultsin financial losses and hassles
to different constructive technological developmentsmay leadto different constructive technological developments
to gather and disseminate information to influence the election The Special Counsel found that Russian government actors successfully hacked into computers and obtained emails from persons affiliated with the Clinton campaign and Democratic Party organizations and publicly disseminated those materials through various intermediaries includingdesignedto gather and disseminate information to influence the election The Special Counsel found that Russian government actors successfully hacked into computers and obtained emails from persons affiliated with the Clinton campaign and Democratic Party organizations and publicly disseminated those materials through various intermediaries including
to bombing of underground hospital in Syria Hayley Dixon and Aisha Majidledto bombing of underground hospital in Syria Hayley Dixon and Aisha Majid
to gather and disseminate information to influence the [ 2016 ] electiondesignedto gather and disseminate information to influence the [ 2016 ] election
real - world physical damageto causereal - world physical damage
great damage to the society and businesscausegreat damage to the society and business
Software thingscreateSoftware things
to gather and disseminate information to influence the electionsdesignedto gather and disseminate information to influence the elections
more than $ 15,000 in losses to Excelloncausedmore than $ 15,000 in losses to Excellon
to accumulate and disseminate information to influence the electiondesignedto accumulate and disseminate information to influence the election
potential problems - kplc 7 news , lake charles , louisianacausespotential problems - kplc 7 news , lake charles , louisiana
a botnet , and using it to mine something like Monerocreatinga botnet , and using it to mine something like Monero
havoc to businesses and people worldwidehad ... been causinghavoc to businesses and people worldwide
not only to steal trade secrets , but also to disrupt our critical technologicaldesignednot only to steal trade secrets , but also to disrupt our critical technological
to bypass payment for legal softwareare designedto bypass payment for legal software
potential problems by adam hooper - bio | email lake charles , la ( kplccausespotential problems by adam hooper - bio | email lake charles , la ( kplc
the damage various tools are computers or are not aware of various computer security threatshas causedthe damage various tools are computers or are not aware of various computer security threats
sewage to flood a city ’s streets can create havoc and damage that bombs could causeto causesewage to flood a city ’s streets can create havoc and damage that bombs could cause
significant economic damage to local businesses and therefore threatens the economic vitality of our entire regioncausessignificant economic damage to local businesses and therefore threatens the economic vitality of our entire region
a serious risk to the health or safety of the publiccreatesa serious risk to the health or safety of the public