-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
95 lines (69 loc) · 3.08 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
<!DOCTYPE html>
<html lang="en" dir="ltr">
<head>
<meta charset="utf-8">
<!-- title of the page -->
<title>CV/MS Project Group 1</title>
<!-- Author -->
<meta name="author" content="Fontana Nicola">
<!-- CSS Links -->
<link rel="stylesheet" href="./general/index.css">
<link rel="stylesheet" href="./main/main.css">
</head>
<body>
<!-- javascript -->
<script type="text/javascript" src="../../general/index.js"></script>
<main id="main">
<div class="hidden">
<!-- the four <a> tags to enter the website -->
<div class="links">
<a href="compvir/compvir.html" class="link1" >virus</a>
<a href="malware/malware.html" class="link2">malware</a>
<a href="security/security.html" class="link3">security</a>
<a href="history/history.html" class="link4">history</a>
<!-- Video on the background -->
<video src="./main/nt.mp4" autoplay muted loop></video>
</div>
</div>
<!-- two lines -->
<hr>
<hr>
<br>
<!-- title of the paragraph -->
<h1 class="title">CV/MS Project Group 1</h1>
<!-- table for display the text and the image -->
<table>
<tr>
<th class="th1">
<!-- paragraph -->
<p>Very much like the actual virus, the <a href="./compvir/compvir.html">“Computer Virus”</a> is designed to duplicate itself and spread around looking for a new host to infect. The existence of computer viruses are reliant on the “host”, which can be a file, document or others.<br>
According to “Norton”, a famous antivirus software company’s webpage on “What is a computer virus?” the definition of computer virus is the following: <br>
A computer <a href="./compvir/compvir.html">virus</a>, in more technical words, is a <a href="./malware/malware.html">malicious code</a> or program that is developed to change the way a computer works and is designed to spread from one computer to another. In order to execute its code, a virus inserts or attaches itself to a legitimate program or document. <br>
During this process, a virus has the potential to have unexpected or undesirable effects, such as harming system software by corrupting or destroying data.
</p>
<br>
<!-- go to links botton -->
<a href="#top"> <h1>Go to links</h1> </a>
<a href="./general/about-us.html"> <h1>About page</h1> </a>
</th>
<th class="th1">
<!-- image -->
<img src="./main/pic2.png" class="pic2" alt="virus picture">
</th>
</tr>
<!-- end table -->
</table>
<hr>
<!-- footer -->
<table width="100%;">
<th class="space" width="33%"><h1 class="chapter">Main Page</h1></th>
<th class="name" width="33%"> <h1>Nicola Fontana</h1></th>
<address hidden>
<a href="fontani@usi.ch">fontani@usi.ch</a><br>
<a href="tel:+41792204779">+41792204779</a>
</address>
</th>
</table>
</main>
</body>
</html>