SlideShare a Scribd company logo
1 of 6
Download to read offline
Know about
Your Enemies
Know All about Your Enemies
Whenever your computer
starts acting weird and makes
it difficult for you to work on,
the first thing that comes to your
mind is whether a virus has
affected your computer. This
issue is dedicated to explain
the most common threats that you may face. It gives
you some details to help treat the root cause of any
problem.
Here are some definitions on these threats:
Malware is any malicious program or software that’s
designed to exploit a computer user. Malware is
basically an umbrella term covering computer viruses,
worms, Trojan, spyware, rootkit etc.
Virus replicates itself in computer memory when
initiated by the user. They contain some malicious
codes which can affect your files, your operating
system or even your master boot records thereby
making your computer start slow or not boot at all.
Know All about Your Enemies
Rootkits are computer
programs that are designed
by attackers to gain root or
administrative access to your
computer. Once an attacker
gains admin privilege, it
becomes a cakewalk for him
to exploit your system.
Trojan horse is a program that appears useful by
pretending to do certain things in foreground, but in
reality they are working silently in background with the
only objective of harming your computer and/or
stealing valuable information. It penetrates your
computer through downloading malicious software like
keys, cracks, free illegal music, wares etc from an
unknown source.
A worm is an evolved form of a virus. Like virus,
worms replicate and spread themselves but it happens
on a bit larger scale. They not need a human action to
replicate and spread and that’s what makes it more
dangerous. It always seeks for network loopholes to
replicate from computer to computer. Therefore, it is
not recommended to download any email attachments
or to click the links friends share with you in a chat
window.
Know All about Your Enemies
(part II)
Here are more details on these
threats:
Spyware , unlike any of the
above, doesn’t harm your
computer in any way. Instead,
they attack you! Once installed
on a system they run in background and keep on
collecting user’s personal data. These data can include
your credit card numbers, passwords, important files
and any other personal stuff. It is always advisable to
download and install software from trusted sources.
A backdoor is a method of bypassing normal
authentication procedures. Once a system has been
compromised, one or more backdoors may be installed
in order to allow easier access in the future. Backdoors
may also be installed prior to malicious software, to
allow attackers entry.

It is worth-knowing that crackers use backdoors to
secure remote access to a computer, while attempting
to remain hidden from casual inspection. To install
backdoors, crackers may use Trojan horses, worms, or
other methods.
Pick up Your Armor and Face
Your Enemies
Through the previous issues
of Softex newsletter, you were
introduced to your enemies and
were given detailed description
on each of them. I believe now
you need your shining armor and
sword to confront these vicious
threats.

In this case, regular scanning
and an effective antivirus system are essential for the
security of your system, which prevents damage and
data loss.
The following steps will guide you to choose the best
antivirus for you:
Step 1: Make a list of your requirements
You have to assess your requirements and know all
about your operating system in order to know which
antivirus (for your PC, Business or Mobile ). For
example, if you are looking for business features,
however, you will want offerings of a full suite such as
anti-spyware, spam filter, anti-virus and firewall.
For More Related Articles,
Please Visit
http://www.softexsw.com/en/articles.php

More Related Content

What's hot

Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
ainmz
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
ikmal91
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
Angel Sophie
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 

What's hot (20)

Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Malware
MalwareMalware
Malware
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Ppt123
Ppt123Ppt123
Ppt123
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
Malware
MalwareMalware
Malware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 

Viewers also liked

alimentacion complementaria en el lactante
alimentacion complementaria en el lactantealimentacion complementaria en el lactante
alimentacion complementaria en el lactante
Elvirarrr
 
Assessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & gradingAssessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & grading
fusonline
 
Learning outcomes
Learning outcomesLearning outcomes
Learning outcomes
fusonline
 
Engaged learning and collaboration
Engaged learning and collaborationEngaged learning and collaboration
Engaged learning and collaboration
fusonline
 
Ease of communication
Ease of communicationEase of communication
Ease of communication
fusonline
 
OVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - MarchOVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - March
Zaire Overton
 

Viewers also liked (20)

Juan salvador gaviota
Juan salvador gaviotaJuan salvador gaviota
Juan salvador gaviota
 
50th Annual Report of The European Free Trade Association 2010
50th Annual Report of The European Free Trade Association 201050th Annual Report of The European Free Trade Association 2010
50th Annual Report of The European Free Trade Association 2010
 
BLOQUE II-MICROCRISTIANDADES - GRUPO 2
BLOQUE II-MICROCRISTIANDADES - GRUPO 2BLOQUE II-MICROCRISTIANDADES - GRUPO 2
BLOQUE II-MICROCRISTIANDADES - GRUPO 2
 
Confined Space Acces
Confined Space AccesConfined Space Acces
Confined Space Acces
 
alimentacion complementaria en el lactante
alimentacion complementaria en el lactantealimentacion complementaria en el lactante
alimentacion complementaria en el lactante
 
Girugamesh!
Girugamesh!Girugamesh!
Girugamesh!
 
Higiene postural
Higiene posturalHigiene postural
Higiene postural
 
Class.bluemix.overall.chapter.1.intro
Class.bluemix.overall.chapter.1.introClass.bluemix.overall.chapter.1.intro
Class.bluemix.overall.chapter.1.intro
 
vva stand down
vva stand downvva stand down
vva stand down
 
El colera
El coleraEl colera
El colera
 
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
 
Presentación1
Presentación1Presentación1
Presentación1
 
1 coleccion deejerciciosen word
1 coleccion deejerciciosen word1 coleccion deejerciciosen word
1 coleccion deejerciciosen word
 
Assessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & gradingAssessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & grading
 
Learning outcomes
Learning outcomesLearning outcomes
Learning outcomes
 
Engaged learning and collaboration
Engaged learning and collaborationEngaged learning and collaboration
Engaged learning and collaboration
 
Ease of communication
Ease of communicationEase of communication
Ease of communication
 
Short quiz consists
Short quiz consistsShort quiz consists
Short quiz consists
 
OVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - MarchOVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - March
 
Opc tema 1 - unidad I
Opc  tema 1 - unidad IOpc  tema 1 - unidad I
Opc tema 1 - unidad I
 

Similar to Know More about Your Enemies

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
krunal gandhi
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 

Similar to Know More about Your Enemies (20)

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
MALWARE
MALWAREMALWARE
MALWARE
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Presentation2
Presentation2Presentation2
Presentation2
 

More from Softex Software House

شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...
شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
Softex Software House
 
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكترونيتأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
Softex Software House
 

More from Softex Software House (20)

Mc updates june 2015
Mc updates june 2015Mc updates june 2015
Mc updates june 2015
 
شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...
شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
 
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاءالتعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
 
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترولشرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
 
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجياتتعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
 
تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟
 
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهىنظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
 
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshareكيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
 
كتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقيةكتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقية
 
نظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكسنظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكس
 
Softex_ Clinic Manager
Softex_ Clinic ManagerSoftex_ Clinic Manager
Softex_ Clinic Manager
 
نظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجياتنظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجيات
 
Softex Travel Control
Softex Travel Control Softex Travel Control
Softex Travel Control
 
Social media in Business
Social media in BusinessSocial media in Business
Social media in Business
 
Email Spam vs. Email Marketing
Email Spam vs. Email MarketingEmail Spam vs. Email Marketing
Email Spam vs. Email Marketing
 
How Strong is Your Password?
How Strong is Your Password?How Strong is Your Password?
How Strong is Your Password?
 
Build Everlasting Relationship
Build Everlasting Relationship Build Everlasting Relationship
Build Everlasting Relationship
 
most used colors in Web Design
most used colors in Web Designmost used colors in Web Design
most used colors in Web Design
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكترونيتأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Know More about Your Enemies

  • 2. Know All about Your Enemies Whenever your computer starts acting weird and makes it difficult for you to work on, the first thing that comes to your mind is whether a virus has affected your computer. This issue is dedicated to explain the most common threats that you may face. It gives you some details to help treat the root cause of any problem. Here are some definitions on these threats: Malware is any malicious program or software that’s designed to exploit a computer user. Malware is basically an umbrella term covering computer viruses, worms, Trojan, spyware, rootkit etc. Virus replicates itself in computer memory when initiated by the user. They contain some malicious codes which can affect your files, your operating system or even your master boot records thereby making your computer start slow or not boot at all.
  • 3. Know All about Your Enemies Rootkits are computer programs that are designed by attackers to gain root or administrative access to your computer. Once an attacker gains admin privilege, it becomes a cakewalk for him to exploit your system. Trojan horse is a program that appears useful by pretending to do certain things in foreground, but in reality they are working silently in background with the only objective of harming your computer and/or stealing valuable information. It penetrates your computer through downloading malicious software like keys, cracks, free illegal music, wares etc from an unknown source. A worm is an evolved form of a virus. Like virus, worms replicate and spread themselves but it happens on a bit larger scale. They not need a human action to replicate and spread and that’s what makes it more dangerous. It always seeks for network loopholes to replicate from computer to computer. Therefore, it is not recommended to download any email attachments or to click the links friends share with you in a chat window.
  • 4. Know All about Your Enemies (part II) Here are more details on these threats: Spyware , unlike any of the above, doesn’t harm your computer in any way. Instead, they attack you! Once installed on a system they run in background and keep on collecting user’s personal data. These data can include your credit card numbers, passwords, important files and any other personal stuff. It is always advisable to download and install software from trusted sources. A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised, one or more backdoors may be installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. It is worth-knowing that crackers use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, crackers may use Trojan horses, worms, or other methods.
  • 5. Pick up Your Armor and Face Your Enemies Through the previous issues of Softex newsletter, you were introduced to your enemies and were given detailed description on each of them. I believe now you need your shining armor and sword to confront these vicious threats. In this case, regular scanning and an effective antivirus system are essential for the security of your system, which prevents damage and data loss. The following steps will guide you to choose the best antivirus for you: Step 1: Make a list of your requirements You have to assess your requirements and know all about your operating system in order to know which antivirus (for your PC, Business or Mobile ). For example, if you are looking for business features, however, you will want offerings of a full suite such as anti-spyware, spam filter, anti-virus and firewall.
  • 6. For More Related Articles, Please Visit http://www.softexsw.com/en/articles.php