Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
39 views
Computer Virus Class
Uploaded by
సాహితీరత్న. డాక్టర్ సురేంద్ర శీలం
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Computer Virus Class For Later
Download
Save
Save Computer Virus Class For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
39 views
Computer Virus Class
Uploaded by
సాహితీరత్న. డాక్టర్ సురేంద్ర శీలం
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Computer Virus Class For Later
Carousel Previous
Carousel Next
Save
Save Computer Virus Class For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 10
Search
Fullscreen
4-5 net Ahote WET tunatise sity RG Nomar en topes con viet Ono ‘Virus attack) Types of virus— Program virus)|Boot sector virus, Macro virus; Stealth Wirus, Other malware—Wormy ‘Trojan, Bomb, Spyware, Sweeper, Protection) against Wists suinatat Sosinen cue TeA Tossa Introduction Sometimes, you might have noticed that your computer starts showing strange and unusual behaviour. This can be because the computer might have been affected by some malicious program(s) The word ‘Malware’ is composed of two words Malicious ai programs that are intentionally created to cause harm to a These perfo system. These may damage, delete or corrupt files, interrupt computer working and gain authorised access to computer resources. There are various kinds of malware that infect which has caused harm to your computer system. nd software. It refers to the software user, computer system or network. rm undesirable actions on a computer computer system such as virus, worms, spyware, trojans, etc. What is a Computer Virus? A virus is a and replicate itself. It is a human-made program, destructive in nature which usually attaches itself to other programs and spreads across the computer system. It runs on a computer without the system, it st be considered as an ‘Electronic Terrorist. The full form of VIRUS is Vital Information Resources Under We will learn about them one-by-one in this chapter. malicious program which has the ability to execute user's knowledge. Once it is loaded in a computer arts damaging the system automatically. It can als iege. Why do people create and spread viruses? As discusses 'd, viruses are the programs developed by humans. But, sometimes it becomes aCasatiat NITE AE ENE Was alittle to agatestanat tte gysqnny Har eR UHH TE Ne fing Whig | a developer may croate a Vidas punghit Aly + to est his ppragtanmninng skills | # to merely canny out expeLtinnenls ty are boneless + te take contial of the computer ai mse CE GAL UnHTl Ut + to make money © to steal sensitive ttaranation. fo Kany the other dndtivitual on an organ! What a virus can and cannot dot ' There are various ways ta whet a vir care atfect computers, Howey 1 Ae SOME th vat chow sigiifies what a conupMlet SHEMET AMAL AIG that a virus cannot glo, the table y Aaa ale A viens cannot tnfect | Jo cuumparter hatstvate sth as monty Keyboart mouse, plinter, ety write protected discs sttell as CD-RONL Lo executable files such ay wont documents, spreadsheets, prescntations, ety disks and drives, aun cassettes, cle 3. files that are sent through emails or transterted 3. antivirus protected sotlwvate, using, secondary storage Sources of Virus ‘There are various sources from which a virus can enter into a computer system, TC does not raise an alarm or alert the user as it enters the system, ‘This makes it necessary for the user to the computer system, A few sources are listed below remain cautious and attentive while us media vis, Compact Disc +A virus infected storag (CD), Digital Versatile Disc (DVD), pen drive, ete, + Pirated software (application/system) + Hired computer games or audio or video CDS + Browsing and downloading unwanted websites through the internet © Unwanted email attachments in the spam folder Symptoms of a Virus Attack If your system is affected by a virus, you may notice one or more of the following symptoms & ‘the speed of the processor becomes comparatively slow. & You may get unusual messages on the screen, A the disk drive light may constantly flash «The opening, oF closing of programs/data files takes, more time A Ceomputer Studies —7tion pO mE HEN TOACS Anontatge of the user , 8 of CIYDVD pen drive, SOmTEPE oF show EnEual symbalvcharacters in place af the wctuial dat Trpes of Viruses ses can be classified into four cat se OFies Boot sevtor Vitus Program virus, Macro Vitus 6 Stealth virus. = Boot Sector Virus While loading an ‘operating system, the boot sector plays an important tule itv the system jut some types of Viruses affect the Boot Sector/Master Root Record (MBR) of the hand dish during the process of booting and are Known as the Boot Sector Virus. It means that the system is running with an infected hand disk which further starts infecting the stored lata This process continues while booting and the system may not be able ty load an operating system. Thus, the system may come to a halt, For example, Danish boot, Quox, PC stone, ete Program Virus These viruses directly attack the program files of the system with exgusions Whe ENE, SYS, COM, DLL, etc. Once these program files are infeed with the virus, they stuart show!nyt unusual behaviour. Since these dot uses t atlect the boot sector, fhe system stays unattected When a relevant task related to a program file is performed, it becomes active and starts showing its destructive behaviour. For example, Sunday, Cascade, ete, Macro Virus These types of viruses attack the data files of the system. When my TUE WANES to work on any application package (such as MS NEY! & = Word, MS Excel, MS Access), he/she finds that cither the file is destroyed or it contains some absurd data. ‘Thus, the user is unable , to perform any task on those data files. ‘These viruses can easily i spread from one computer to another through the internet, Once infected, repairing ofthese files is very much difficult. For exemple, i Bloodhound, Melissa, etc. _Bloodhaum : Stealth Virus ‘This virus affect the computer system in various ways but is designed tw remain hidden fram being detected. They do so by changing their codes within the system which makes it difficult to trace the existence of the virus through scanner programs, Sometimes, the user cannot even detect the exact cause of the infected files. It also hides the increased size of the file due to the virus infection, Thus, the infected files seem to be uninfected during, the course of scanning, ene eee For example, Frodo, Brain, ete. , eae Computer VirwsGorms do not affect the functioning of a system but interrupts ser Other Malware Worm itself by using A worm is@ computer program that copies and multipl ‘ ~ . have computer networks and security flaws. These are self-sufficient: the ability of spreading themselves without the use of another program or a usea) For example, a worm email spreads itself to other computers, These then Uses the address box of the infected computer to spread further, vice sample, Swen, Soe —\ These are the programs that are destructive in nature and manipulates the user for jg intent. At first, (hese may not look suspicious but once ed by the user can disrupy and drastically decrease the available memory of the ‘systenl) For Trojan computer system. They are designed to damage and steal sensitive and confidential dy the user. Unlike worms{these do not replicate themselves and can spread only through user interactig, ‘These enter the system when a user installs it, opens an email attachment, downloads ang afl some infected file from the internet. Once activated in the background, they start deleting ang corrupting files inside the system. For example, Backdoor, Nuker, Zeus, ete. Bomb As the name suggests, (he explosion of this virus takes place in the form of a sudden disagg) inside the system. These Viruses TENN Tactve TOF a long Tinie and Wal TOR a SpeanR, or specific event for the disaster.) For example, the virus Friday the 13" waits for this specific date. On this day, the user notice that all the files have been deleted from his system ‘ruses such as Jerusalem B, Saturday the 14"", Happy Birthday 30, Spyware There are many such tuesday the 13", Spyware steals sensitive information, and other internet activities of a person and transmis it to another person or organisation,)Data such as username, password, bank details, audio and video files, browser history while accessing internet, content of enrails and messages tt are stolen and transferred. It consumes a lot of memory and makes the computer slow and inefficient. Sweeper Sweeper is a fake antivirus progam (f enters the computer system when the user unintentionally downloads it, considering it to be an antivirus cae) Once installed, it cfeates variety of fake malware files in the computer which automatically get started when the user logs into the s an control the browsing activity of the user, change system fi without the user’s knowledge. stem. It les, etc. [HOT Comput ue? aeoy @ Whee 8 sx SRUSRATS FM TE PeEHUT ANN GRE SettT (breton Wwe eat ayy ENEMY) ate peanupt eS Acta, those ate fake alerts that Atiyptays the Hat at take mnthvare Ailow Comsagacnthy Che Wer gets LeAPPaad LO HeutavE these files thane the camaputet Protection against Viruses is always adtvisad fo take preaautionary ateastites to) potect your aystent front the vine XE SAY PLORERE YUE gy stent agattst the virtises by talloweings these mewattles! FAL CO/OVD to i ca cat enteeenein il sy Tastall antivirus sotirare in your systent, a d Keep yout antivirus software updated, Al you are using any external storage media to transter data, an the dise properly with antivirus sothwate + Avoid reading unwanted emails. + ah stall any software UY YOUE xy'ston, a pend drive to teanstic data to your aystent, that the deve is thee ftom virus, systent is connected toa LAN (Local tea Networks Keep a check ont the users to avoid the mistise of the system, ys Keep a backup copy of your program/data files Antivirus Software We take vaccines as as rastire lO protect oursell front diseases, Slmnilarly, antivicns software are the utility programs (ic. cut sathywate Us problem) whic Cand prevent viruses frome attacking the system, ‘The mala: take of an antivirus software is to cheek all the programs/data tiles available tn the system, Hea vin is detected, the antivirus removes it and gets the systent ready: for the user, Labo displayn a detected, Some of the popular antivirus software ares AL Quek Heal Se Net Protector Antivirus 6. Kaspersky Antivirus AVG GDATA SK on, ° Anti-Virus ions wah Ani TstFot ant = i Antivirus Norton y a McAee us AVS hbif PH rREw & ZONEALARM (:) Sms i Antivirus Software \ Conyputer Vir feats KL to solve a particular compe 2 PANDA —secuniry ity Senpined Jiques to accomplish jtg ;, -o different techniques i job, An antivirus software typically uses two di fa virus dicti 1, examining files i. Took for known viruses by ne Program ae 2. identifying suspicious behaviour from any comP! Migh infection. My 1 computer virus are. It s and A quality antivirus program gives you a Protection and shields your PC from other mai automatically scans the suspicious files, website emails, vebsites for It safely tests questionable programs and website : p ertain Viruses. It also restricts unauthorised access to ¢¢ computer components. However, (Ioading of antivirus software ae Shield against the ae : y protecte necessarily mean that the system is totally prot : ) ing devel from the virus attack. Everyday new types of viruses pe es ee me an any software might not be able to detect or eliminate them. S a pe i tant to eA antivirus software updated against the new viruses) It can ¥ using the interg ) Antivirus Tips 1. Don't assume you're not at risk : 1 Every computer, regardless ofits operating system, is susceptible t0 a virus anag.y. an antivirus cannot protect against all types of malware, the security of your a is enhanced substantially, When an antivirus software is installed, it updates the gag which reduces the risk of malfunctioning. 2. Download only from the trusted sources | Download the security software only from known and trusted sources. It is a coma scheme of cyber criminals to pretend to be selling antivirus programs that ares, malware. 3. Keep your sofiware updated | Make sure that you have the latest version of the antivirus installed in your conpes Check the status of the updates periodically to make sure that they are up-to-date) 4. Don't delay updates ] If your computer has been offline or powered off for a long time, your antivirus mz require an update. When you turn it on, reconnect it to the internet. Do not Postpone updates ] 5. Scan additional devices ] such as USB stidy Make sure that your antivirus automatically scans portable devic flash drives/SD cards when you plug them into your computer. 6. Track warnings and alerts Pay attention to the onscreen warnings and alerts generated by your antivirus soft Most of the alerts include the option of clicking the link to get more information recommendation about what to do next, Computer Studies—7Don't disable the software Do not disable your security software even if you feel it is slowing down your computer. Disabling your antivirus will expose your computer to unnecessary risks and could result in Install one program only aserious security voilation. If problems persist, replace your antivirus with another antivirus. Do not install multiple antivirus programs on your computer at the same time. It may leave your computer with less protection instead of providing more protection. >) What Happens When a Threat is Detected? The specific action that your antivirus program takes depends on its settings. Typicall : ; antivirus software takes one or more of these actions in a specific order. 1. Repai Jsually, the first task of an antivirus is to clean the infected file and remove the threat safely. This is important when it's your personal file and you would like to retain the data. Quarantine: If repairing fails, your antivirus could noose to quarantine or isolate the infected file into a safe location. The file in quarantine cannot be accessed but you will have a copy of the file. When a method Anti 's Software (Net Protector) of removing the threat is discovered, you can retrieve your data safely. . Delete: If the infected file can't be repaired and you don't want to retain the data, you have the choice to delete the antivirus program as well as the infected files from your computer. Working with an Antivirus Software Once an antivirus software is installed in your system, you can get rid of virus attacks for a particular time period. However, you should not forget to update your antivirus software on 2 regular basis. Let us discuss and learn about irus : Poe software with the of Net Protector Antivirus After its installation, you can easily open it by clicking on its icon on the desktop or from the start menu. er © Q Net Protector antivirus window @QONO opens. It shows various options tacos — on the left pane that help us —— perform various tasks. alee 1. Dashboard: It displays Sytem Tuer various details about the software as shown above. U C=] ===) no ao Computer Virus.1, What does the letter V signify in the word VIRUS? (a) Vigilance (b) Vibrant ital (d) Variety 2. Which of the following can be infected by a computer virus? (a) Keyboard (b) CPU {& Operating system (d) Printers 3. Which of the following has the ability to replicate itself? ‘Worm (b) Trojan (c) Macro (dy Stealth 4, Through which of the following a computer can be infected with viruses? (a) Pen drive (b) E-mail (©) Accessing internet os All of these 5. Which of the following is not an antivirus? (a) Norton (b), AVG () McAfee Je ‘Trojan Horse I], State whether the following statements are True/False: 1. A computer shows unusual behaviour due to a virus attack. 2. A computer virus is intentionally made to disturb the —< proper functioning of the computer system. seceedesseeee 3. A computer virus is destructive in nature. neue 4, Unwanted mails in the spam folder can be a source of virus. T.. 5. A system restarting own its own is a symptom of a virus attack. T 6. A system gets affected by the virus automatically. - 7. A computer virus replicates itself within the amount of available memory. 8. Antivirus software is specially designed to protect _ the entry of viruses into the system. 9, The system gives an alarm, when a virus infected storage media is connected. 10. Once an antivirus is loaded, your computer will never be = affected by viruses. f Ill. Give two examples of each: | 1. Boot Sector Virus (a) .. Vat Wash : ae Computer Virus2. Worm (2) GAR Qenenene © Stal, 3. Trojan (a) ee ad ° Kae 4. Macro @ Sq - om : 5. Bomb (a) Detue gale B i eady X 6. Stealth @ en a Br . TV. Case-Study Based Questions: Solved 1. Visi mics program which 8 estuetvim STE agy ater prog dared cos» mE SFT rus oa a the users knowledge. Once i enters into the compte it tans damage y files automaticaly. Diferent types of viruses have different behaviga Thott some of the viruses are given below: nt (a) Ie attacks the data files of the sytem when a User Wants to wer gq package. } (b) It spreads due to security flaws without the US of another prog (c) It enters into the system when a user opens an e-mail attach, Ment, runs some infected file from the internet. oly (4) It is used to steal sensitive information of a person such as Username bank details, etc. while accessing the internet. Write the name of the specific virus for each of the behaviour Metin i (©) and (a). ‘Ans. (a) Macro (b) Worm (©) Trojan (4) Spyrae Unsolved 1. Antivirus software are the utility programs that d system from attack of viruses. The main task of an antivirus software isto de the programs/data files available in the computer. If a virus is detected, the a clears it from the system. A pirated antivirus software should not be used bea will not be able to remove all the viruses, rather it m spread the virus itself & are advised to install orginal antivirus software and keep it updating pein updated antivirus software also takes care of newly created viruses, With reference to the above case, answer the following questions: (a) Which of the following statements is not true about antivirus software? (i) It locates infected files, (ii) It searches for the viruses, (iti) Once installed, it needs not be updated (iv) It removes viruses, (b) Which of the following is not an antivirus softw (i) McAfee (ii) GDATA (c) What is meant by pirated antivirus software? (i) Copied from original software (iii) Loaded from original CD etect and prevent your rare? (ii) AVG (iv) Google Chrome (ii) Reinstalled software (iv) None of the above{d) What will happen Mf antivirus software is not updated Petiodically? (i) ft wll be erased after some time. (is) twill ypread virus itself (iit) It will not be able to trace new viruses (iv) ft will force operating system to stop functioning. Re 1. Define the following: z s 4 IL Short Answer Question 1 3 4 Worm Trojan: Bomb Program Virus What is a computer virus? Mention two ways of classifying a computer virus, Pacey maS ete . Name the ditferent sources of virus from which it may entér to a computer system. Why ss if necessary to update antivirus software installed in your computer system? in Dining DoE Ihe lowing <2 L NYS RL wit pses. 3 Virus and Antmirus Worms and Viruses IN. Long Answer Questions: awe What are the various ways to get Virus attack to a computer system? How will you detect that a computer system is infected by viruses? Suate the various ways to protect your system from viruses. Why do people spread viruses? Explain. What is meant by an antivirus? Name different types of antivirus softwares. You have loaded Norton Antivirus software in your computer system. Does it make your computer system free from virus attack for a lifetime? Justify. Whit acuons can an antivirus take, if a threat is detected in your computer system? Computer Virus al
You might also like
Shadow Work Journal Free PDF
PDF
91% (164)
Shadow Work Journal Free PDF
30 pages
Hourglass Workout Program by Luisagiuliet 2
PDF
76% (21)
Hourglass Workout Program by Luisagiuliet 2
51 pages
Book of Wisdom 2
PDF
87% (166)
Book of Wisdom 2
70 pages
BLING A Novel by Erica Kennedy
PDF
100% (18)
BLING A Novel by Erica Kennedy
468 pages
Make Your CPN Instrctions
PDF
96% (200)
Make Your CPN Instrctions
21 pages
12 Week Program: Summer Body Starts Now
PDF
87% (46)
12 Week Program: Summer Body Starts Now
70 pages
Knee Ability Zero Now Complete As A Picture Book 4 PDF Free
PDF
94% (68)
Knee Ability Zero Now Complete As A Picture Book 4 PDF Free
49 pages
Aussie Fitness - Low Calorie High Protein Recipes (BOOTLEG)
PDF
100% (12)
Aussie Fitness - Low Calorie High Protein Recipes (BOOTLEG)
462 pages
The Hold Me Tight Workbook - Dr. Sue Johnson
PDF
100% (16)
The Hold Me Tight Workbook - Dr. Sue Johnson
187 pages
GB Level Up Guide 3 Elevate PDF
PDF
79% (28)
GB Level Up Guide 3 Elevate PDF
115 pages
Read People Like A Book by Patrick King-Edited
PDF
58% (78)
Read People Like A Book by Patrick King-Edited
12 pages
Livingood, Blake - Livingood Daily Your 21-Day Guide To Experience Real Health
PDF
77% (13)
Livingood, Blake - Livingood Daily Your 21-Day Guide To Experience Real Health
260 pages
Cheat Code To The Universe
PDF
94% (79)
Cheat Code To The Universe
34 pages
Facial Gains Guide (001 081)
PDF
91% (45)
Facial Gains Guide (001 081)
81 pages
No Grid Survival Projects - Sophia Hall
PDF
91% (11)
No Grid Survival Projects - Sophia Hall
126 pages
Curse of Strahd
PDF
95% (467)
Curse of Strahd
258 pages
The Psychiatric Interview - Daniel Carlat
PDF
91% (34)
The Psychiatric Interview - Daniel Carlat
473 pages
Hadestown Piano Vocal Score
PDF
95% (21)
Hadestown Piano Vocal Score
341 pages
Sisterly Lust Walkthrough
PDF
77% (96)
Sisterly Lust Walkthrough
26 pages
Can't Hurt Me
PDF
69% (29)
Can't Hurt Me
10 pages
The Borax Conspiracy
PDF
91% (57)
The Borax Conspiracy
14 pages
Carl Hart, Charles Ksir - Drugs, Society, and Human Behavior (2015)
PDF
100% (17)
Carl Hart, Charles Ksir - Drugs, Society, and Human Behavior (2015)
495 pages
Dare To Lead by Brené Brown
PDF
45% (11)
Dare To Lead by Brené Brown
2 pages
Combs Indictment
PDF
91% (11)
Combs Indictment
14 pages
D&D Player Handbook 5e
PDF
96% (336)
D&D Player Handbook 5e
293 pages
Shortcut To Shred Ebook Revised 9-9-2015 PDF
PDF
88% (8)
Shortcut To Shred Ebook Revised 9-9-2015 PDF
15 pages
Workbook For Adult Children of Emotionally Immature Parents - How To Heal From Distant, Rejecting, or Self-Involved Parents
PDF
88% (16)
Workbook For Adult Children of Emotionally Immature Parents - How To Heal From Distant, Rejecting, or Self-Involved Parents
77 pages
Five Wishes (Rev 06.2011)
PDF
57% (7)
Five Wishes (Rev 06.2011)
12 pages
34 Mystery of The Seven Keys Guide 1.0
PDF
100% (3)
34 Mystery of The Seven Keys Guide 1.0
108 pages
Trauma-Focused ACT - Russ Harris
PDF
95% (39)
Trauma-Focused ACT - Russ Harris
568 pages
Anastasia: The New Broadway Musical (LIBRETTO)
PDF
94% (175)
Anastasia: The New Broadway Musical (LIBRETTO)
117 pages
COSMIC CONSCIOUSNESS OF HUMANITY - PROBLEMS OF NEW COSMOGONY (V.P.Kaznacheev,. Л. V. Trofimov.)
PDF
94% (214)
COSMIC CONSCIOUSNESS OF HUMANITY - PROBLEMS OF NEW COSMOGONY (V.P.Kaznacheev,. Л. V. Trofimov.)
212 pages
Raisin in The Sun
PDF
97% (34)
Raisin in The Sun
92 pages
I Hate You - Don't Leave Me
PDF
80% (54)
I Hate You - Don't Leave Me
6 pages
TDA Birth Certificate Bond Instructions
PDF
97% (284)
TDA Birth Certificate Bond Instructions
4 pages
Complaint - Ventura V Combs
PDF
91% (11)
Complaint - Ventura V Combs
35 pages
The Secret Language of Attraction
PDF
86% (107)
The Secret Language of Attraction
278 pages
How To Develop and Write A Grant Proposal
PDF
83% (542)
How To Develop and Write A Grant Proposal
17 pages
The Definitive Guide To Project 2025Fnl Project 2025
PDF
90% (10)
The Definitive Guide To Project 2025Fnl Project 2025
67 pages
Supreme Mathematics
PDF
80% (25)
Supreme Mathematics
1 page
Penis Enlargement Secret
PDF
60% (124)
Penis Enlargement Secret
12 pages
Workbook For The Body Keeps The Score
PDF
89% (53)
Workbook For The Body Keeps The Score
111 pages
Blue Beam Project
PDF
70% (20)
Blue Beam Project
3 pages
CPN Tut
PDF
95% (20)
CPN Tut
23 pages
Donald Trump & Jeffrey Epstein Rape Lawsuit and Affidavits
PDF
83% (1016)
Donald Trump & Jeffrey Epstein Rape Lawsuit and Affidavits
13 pages
KamaSutra Positions
PDF
78% (69)
KamaSutra Positions
55 pages
KamaSutra Positions
PDF
68% (84)
KamaSutra Positions
55 pages
7 Hermetic Principles
PDF
93% (30)
7 Hermetic Principles
3 pages
Into The Wild Shadow Work Journal PDF n1cr4g
PDF
96% (27)
Into The Wild Shadow Work Journal PDF n1cr4g
79 pages
27 Feedback Mechanisms Pogil Key
PDF
77% (13)
27 Feedback Mechanisms Pogil Key
6 pages
Frank Hammond - List of Demons
PDF
92% (92)
Frank Hammond - List of Demons
3 pages
Phone Codes
PDF
78% (27)
Phone Codes
5 pages
36 Questions That Lead To Love
PDF
91% (35)
36 Questions That Lead To Love
3 pages
Sample Mental Health Progress Note
PDF
96% (47)
Sample Mental Health Progress Note
3 pages
How 2 Setup Trust
PDF
97% (307)
How 2 Setup Trust
3 pages
2025 MandateForLeadership FULL
PDF
70% (10)
2025 MandateForLeadership FULL
920 pages
House of Leaves - Mark Z Danielewski
PDF
80% (20)
House of Leaves - Mark Z Danielewski
750 pages
How To Kiss A Woman's Breast
PDF
60% (114)
How To Kiss A Woman's Breast
14 pages
(Psilocybin) How To Grow Magic Mushrooms A Simple Psilocybe Cubensis Growing Technique PDF
PDF
75% (8)
(Psilocybin) How To Grow Magic Mushrooms A Simple Psilocybe Cubensis Growing Technique PDF
48 pages
Singer's Anthology Master Song and Show Index 2008 PDF
PDF
37% (43)
Singer's Anthology Master Song and Show Index 2008 PDF
38 pages
Cellular Communication POGIL
PDF
80% (10)
Cellular Communication POGIL
5 pages
Lundy - Why Does He Do That PDF
PDF
79% (42)
Lundy - Why Does He Do That PDF
1,020 pages
36 Questions To Fall in Love 1
PDF
97% (32)
36 Questions To Fall in Love 1
2 pages
The 36 Questions That Lead To Love - The New York Times
PDF
94% (34)
The 36 Questions That Lead To Love - The New York Times
3 pages
100 Questions To Ask Your Partner
PDF
80% (35)
100 Questions To Ask Your Partner
2 pages
48 Laws of Power Cheat Sheet
PDF
97% (30)
48 Laws of Power Cheat Sheet
6 pages
Encyclopedia of Herbal Medicine - 3rd Edition (DK Publishing) (2016)
PDF
99% (162)
Encyclopedia of Herbal Medicine - 3rd Edition (DK Publishing) (2016)
338 pages
25 Most Valuable US Pennies
PDF
94% (16)
25 Most Valuable US Pennies
4 pages
Satanic Calendar
PDF
25% (56)
Satanic Calendar
4 pages
The Startup Guide - Create A Business Plan
PDF
88% (199)
The Startup Guide - Create A Business Plan
26 pages
Do You Like Big Girls V01
PDF
20% (25)
Do You Like Big Girls V01
161 pages
The 36 Questions That Lead To Love - The New York Times
PDF
95% (21)
The 36 Questions That Lead To Love - The New York Times
3 pages
Jeffrey Epstein39s Little Black Book Unredacted PDF
PDF
75% (12)
Jeffrey Epstein39s Little Black Book Unredacted PDF
95 pages
14 Easiest & Hardest Muscles To Build (Ranked With Solutions)
PDF
100% (7)
14 Easiest & Hardest Muscles To Build (Ranked With Solutions)
27 pages
The Self Confidence Workbook
PDF
96% (104)
The Self Confidence Workbook
139 pages
The Book of Enoch
PDF
100% (80)
The Book of Enoch
265 pages
Starbucks Underfilled Latte Lawsuit
PDF
68% (76)
Starbucks Underfilled Latte Lawsuit
24 pages
How To Come Up With Good Ideas For Startups - The Scribd Story and The Trip Method
PDF
87% (487)
How To Come Up With Good Ideas For Startups - The Scribd Story and The Trip Method
22 pages
Independent Contractor Agreements
PDF
80% (839)
Independent Contractor Agreements
3 pages
ALCHEMIST
PDF
64% (14)
ALCHEMIST
4 pages
1001 Songs
PDF
69% (72)
1001 Songs
1,798 pages
Trademark License Agreement
PDF
79% (382)
Trademark License Agreement
3 pages
The 4 Hour Workweek, Expanded and Updated by Timothy Ferriss - Excerpt
PDF
23% (954)
The 4 Hour Workweek, Expanded and Updated by Timothy Ferriss - Excerpt
38 pages
Zodiac Sign & Their Most Common Addictions
PDF
63% (30)
Zodiac Sign & Their Most Common Addictions
9 pages
Security Model Workshop Template
PDF
No ratings yet
Security Model Workshop Template
21 pages
Integration Design Workshop Template
PDF
No ratings yet
Integration Design Workshop Template
13 pages
SAP Basis Upgrade
PDF
No ratings yet
SAP Basis Upgrade
2 pages
Data Model Workshop Template
PDF
No ratings yet
Data Model Workshop Template
14 pages
For Current Work: AX Technical Pool (As On 29-Apr-2021)
PDF
No ratings yet
For Current Work: AX Technical Pool (As On 29-Apr-2021)
5 pages
Noncompete Agreement
PDF
87% (141)
Noncompete Agreement
2 pages