Computer Security Threats--Backdoor Trojan

A backdoor Trojan(security threat) allows someone to take control of another user’s computer via the internet without their permission. A backdoor Trojan(security threat) may pose as legitimate software, just as other Trojan horse programs do, so that users run it. Alternatively – as is now increasingly common – users may allow Trojans onto their computer by following a link in spam mail. Once the Trojan is run, it adds itself to the computer’s startup...

Computer Security Threats

We are living in a digital world, were computers are not just an ordinary thing anymore but a “necessity” to our everyday lives. Most of us only knew a little about computer security threats, the most common were “virus” and “worm”. But did you know that there are 34 different types of Computer Security Threats? A lot huh? You’ll know more about them below, so keep reading and i hope that you’ll be more cautious and knowledgeable in using your computer. ...

Types of Computer Viruses

Computer Virus is a kind of malicious software written intentionally to enter a computer without the user’s permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system. Most common types of viruses are mentioned below: Resident Viruses This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and...

Best Antivirus Software----KBSMP CHOICE

3>>>>> Norton Antivirus 2009 Main Features: Advanced antivirus with anti-spyware Best proactive protection Rapid pulse updates every 5 to 15 minutes Rootkit detection, two way firewall Defends against Web-based attacks Automatic Virus Pattern Updates...

Hardware Security

v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 false false false false EN-US X-NONE X-NONE ...

uAndroid's Security Framework

                            uAndroid's Security FrameworkThe Google Android mobile phone platform is one of the most anticipated smartphone operating systems. Android defines a new component-based framework for developing mobile applications, where each application is comprised of different numbers and types of components. Activity components form the basis of the user interface;...

How to secure network

                      NETWORK SECURITY 1. Perform regular network security testing. 2. Don’t provide more or unwanted access to any network user. 3. Must have an updated antivirus program. 4. Operating system should be regularly updated. If you have windows based operating system you can update it from the Microsoft website. 5. Keep inventory...

Computer And Internet

Have you seen any coin without head or without tell----NO.Same situation in computer and internet.In 1940 computer came in picture and In 1969 internet came into picture and after this both them became most important part society.      NOW The question come how computer and internet are related,how they work.before describing  these two i want to define some terminology related computer and internet What is internet-----The...

CBI website hacked by 'Pakistani Cyber Army'

In a major embarrassment, the website of premier investigating agency CBI was hacked on Friday night by programmers identifying themselves as "Pakistani Cyber Army".    Intelligence agencies have been often warning the government that proper cyber security was not being ensured in government offices and that no security audit was being carried out. The Pakistani Cyber Army has also warned that it would carry out "mass defacement" of other...

Internet Security

                        Tips for browsing internet safely The concern for internet safety is a global phenomenon, mostly for those who are new-fangled to internet. While the prevalence of social networking websites, online communities and internet-enabled processes should be great news for individual, corporate and government users, the concern for safety remains a major source of concern. The 21st century is the age of computers and...