Posts

Showing posts from December, 2020

ANTI-VIRUS

Image
  Antivirus programs and computer protection software Antivirus programs and computer protection software are designed to evaluate data such as web pages, files, software and applications to help find and eradicate malware as quickly as possible. Most provide real-time protection, which can protect your devices from incoming threats; scan your entire computer regularly for known threats and provide automatic updates; and identify, block and delete malicious codes and software. How does antivirus work? Antivirus software begins operating by checking your computer programs and files against a database of known types of malware. Since new viruses are constantly created and distributed by hackers, it will also scan computers for the possibility of new or unknown type of malware threats. Typically, most programs will use three different detection devices: specific detection, which identifies known malware; generic detection, which looks for known parts or types of malware or patterns that a

Computer Spam

Image
  What is the definition of spam? Spam  is any kind of unwanted, unsolicited digital communication, often an email, that gets sent out in bulk. Spam is a huge waste of time and resources. The Internet service providers (ISP) carry and store the data. When hackers can’t steal data bandwidth from the ISPs, they steal it from individual users, hacking computers and enslaving them in a zombie  botnet . Software providers invest resources creating email applications that try to filter most of the spam out. Consumers waste time sifting through whatever makes it past the spam filters. "Spam is any kind of unwanted, unsolicited digital communication, often an email, that gets sent out in bulk." Email spam : Your garden-variety spam. It clogs up your inbox and distracts you from the emails you actually want to read. Rest assured, it’s all extremely ignorable.

Computer Malware

Image
  Definition of Computer Malware Cyber criminals designed computer programs to penetrate and harm computers without user's content. It's a “malicious software”, or popularly known as a Malware. The term malware covers all the types of threats to your computer safety such as spyware, viruses, worms, trojans, rootkits, and etc. Malware performs a wide range of tasks from stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions, and spying on someone' computer activity without their consent. How Malware Works A cyber criminal can use a vast options of spreading the malware and infect gadgets, computers, and networks. Malware can be delivered using a USB drive, downloading programs, email attachments, and etc. Phishing attacks are another popular type of malware execution. Phony emails are disguised as authentic messages from reputable companies or people. It contains malicious links or attachments that allows threat actors to communicate

Computer Virus

Image
  A computer virus , much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that flu viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data. How does a computer virus attack? Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to