Wednesday, January 13, 2010

Security from Harmful Attacks

Some programmers can also create programs with intentions of destroying a computer's data by using tricks. Such of this are known as viruses, Trojan horses, worms and spyware:

  • Worms are software programs which are able to replicate themselves over a computer network and in turn perform malicious actions.

  • Viruses are software programs which are able to log into the personal files on a computer it has infected, resulting in removing all of them, leading to serious side effects to the computer.

  • Trojan horses are software programs which disguise to be carrying out one thing, but in reality snoop out your personal data, or damage it. These types hide their identity or true intentions and are usually not easy to detect.

  • Malware are classified as Trojans with a limited payload and are usually not detected by most antivirus software.
The positive is that there are many effective Anti-Virus software available in the market to fight the threats mentioned above. These can be purchased from vendors or bought online. Caution should be taken in the selection of anti-virus software, as some programs are not very effective in detecting and destroying viruses or Malware. Also ensure that your Anti-Virus data base is current and up to date.

1 comment:

  1. Some of this incorporate insufficient hostile to spyware virtual products introduced on their PCs and in addition against infection programs. One time Mydoom worm infection effectively penetrated three medium-sized business utilizing the web. Mydoom worm infection couldn't penetrate greater web utilizing organizations that time.internet security services

    ReplyDelete