The document discusses various types of computer attacks and crimes. It describes spam, malware like viruses and trojans, denial of service attacks, phishing attempts to steal private information, click fraud in online advertising, and spoofing of IP addresses. It also mentions botnets, spyware, cyber stalking, risks of sharing information on social media, techniques like steganography, pharming, and risks of shortened web addresses. Anonymous remailers and malicious ActiveX controls are also outlined.