Information Technology & Cyber Laws 19
#1

Symptoms of a computer virus
1.Computer runs-slower than usual.
2.Computer stops responding.
3.Applications do not work properly.
4. Disks or disk drives may be inaccessible.
5.It shows universal error message.
*Examples for computer viruses - TEXAS Virus, Blaster, Nimda, I Love You, Guppy, 1 Melissa, Slammer

Antivirus
*Antivirus is a computer software which is used to prevent, delete and detect the presence of VIRUS in Computer.
*Examples of antivirus program - Avast, Avira, AV G antivirus, Kaspersky, Norton, McAfee 

Worm
*Worm is a subclass of computer virus
*Worms can replicate itself to the hundreds and thousands of its copy through network connections to any machine without any human intervention

Trojan Horses
*Trojan horses ire hot viruses
*Trojan horse is a malware which appears to be useful applications like screen savers
*But it allows hacker to take control of the system by remote login.
*It does not replicate itself instead it makes the user to trust and receive the infected files.

Logic bomb
* Logic bomb is a piece of code (program) inserted into a software
* system that will execute its malicious function when the specified conditions are met.   
*Trojans that activate on certain dates  (as set by its designer) are often called as time bombs

Ransomware
* It is a very popular way internet criminals to make money
* Ransomware make the user unable to access the system displaying some kind of screen demanding some form of payment to have the computer unlocked.

Adware
* Adware is not truly a malware. It is asoftware package that automatically  renders advertisements in order to generate revenue  for its author.
* Adware tracks our internet browsing  habits and sends popup advertisements  related to the sites and topics of our interes

Keyloggers
*Keylogger is a software that can record  every keystroke we make to login a file  
* A key logger can record instant  messages, email and any information we type at anytime using our keyboard.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Information Technology & Cyber Laws 19 - by amrutha735 - 23-12-2017, 04:31 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Information Technology & Cyber Laws 36 amrutha735 0 512 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 35 amrutha735 0 463 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 34 amrutha735 0 484 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 33 amrutha735 0 534 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 32 amrutha735 0 466 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 31 amrutha735 0 495 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 30 amrutha735 0 558 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 29 amrutha735 0 474 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 28 amrutha735 0 528 23-12-2017, 04:34 PM
Last Post: amrutha735
  Information Technology & Cyber Laws 27 amrutha735 0 530 23-12-2017, 04:33 PM
Last Post: amrutha735

Forum Jump: