1. Viruses:
Viruses cannot spread without the help of us humans. They are like parasites because they need
a host to attach themselves to. The host is usually a legitimate looking program or file. Once this program is
launched, the virus is executed and infects other files on your computer. Viruses can be very destructive.
They can do damage to your computer hardware, software and files. Viruses are spread through the sharing
of files and are many times sent within emails via attachments.
2. Worms:
A worm is a malicious program that can replicate itself onto other computers on a network.
Unlike a virus, worms don’t need a human to be able to spread and infect systems. Once it infects a system,
it uses that system to send out other copies of itself to other random systems attempting to infect them.
3. Trojan Horse:
A trojan horse is a malicious program that can be used to do silly things to a system like
changing its desktop, mess with the user interface, and take control of your mouse. It can also be used for
some serious things like accessing your data, erasing your files, stealing your passwords, and capturing your
keystrokes.
4. Logic Bombs:
Logic bombs are usually pieces of code that are programmed into a program that lie dormant until a certain
time or until a user does a certain action which causes it to be executed. When it is triggered it performs a
certain function that the program wasn’t intended to do.
5. Bacteria :
Bacteria make many copies of themselves and eventually end up taking up all of the computers recourses
such as all of its processor power, memory and disk space. This results in the legitimate user losing access
to those resources.
6. Blended Threats :
Blended threats combine all of the characteristics of the above and use them along with system
vulnerabilities to spread and infect machines.
Viruses cannot spread without the help of us humans. They are like parasites because they need
a host to attach themselves to. The host is usually a legitimate looking program or file. Once this program is
launched, the virus is executed and infects other files on your computer. Viruses can be very destructive.
They can do damage to your computer hardware, software and files. Viruses are spread through the sharing
of files and are many times sent within emails via attachments.
2. Worms:
A worm is a malicious program that can replicate itself onto other computers on a network.
Unlike a virus, worms don’t need a human to be able to spread and infect systems. Once it infects a system,
it uses that system to send out other copies of itself to other random systems attempting to infect them.
3. Trojan Horse:
A trojan horse is a malicious program that can be used to do silly things to a system like
changing its desktop, mess with the user interface, and take control of your mouse. It can also be used for
some serious things like accessing your data, erasing your files, stealing your passwords, and capturing your
keystrokes.
4. Logic Bombs:
Logic bombs are usually pieces of code that are programmed into a program that lie dormant until a certain
time or until a user does a certain action which causes it to be executed. When it is triggered it performs a
certain function that the program wasn’t intended to do.
5. Bacteria :
Bacteria make many copies of themselves and eventually end up taking up all of the computers recourses
such as all of its processor power, memory and disk space. This results in the legitimate user losing access
to those resources.
6. Blended Threats :
Blended threats combine all of the characteristics of the above and use them along with system
vulnerabilities to spread and infect machines.
Ethical hacking is performed by a company to identify the potential threats on a computer. These information are required to improve the system security in order to eliminate the attacks.
ReplyDeleteEthical hacking Course in Chennai | Ethical hacking course
ReplyDeleteThanks for sharing this information and keep updating us. This information is very useful to me.
Ethical Hacking Course in Chennai | Hacking Course in Chennai | Ethical Hacking Course
ReplyDeleteGreat and useful article. Creating content regularly is very tough. Your points are motivated me to move on.
LG Mobile Service Center in Chennai
The information is really worth for us
ReplyDeleteThanks
thanks to give me the opportunity to post comment on your blog.
ReplyDeletedo you thing which antivirus best for your device. So don't worry get mcafee antivirus for your device which protect all kinds of threats and easily get Mcafee Technical Support while you faced some issues.
ReplyDeleteThanks
ReplyDeleteThanks for sharing an information to us. If someone want to know about ethical hacking course. I think this is the right place for you! ceh Training
ReplyDeleteThat was a very extensive explanation. Keep it on.
ReplyDeleteMacbook repair Mumbai
laptop repair Mumbai
Macbook screen repair Mumbai
Data recovery Mumbai
Macbook Pro & Air repair Mumbai
laptop repair chembur
ReplyDeletelaptop repair Mumbai
laptop screen repair mumbai
dell laptop repair mumbai
ReplyDeleteIt’s great to come across a blog every once in a while that isn’t the same out of date rehashed material. Fantastic read.
Machine Learning Training in Chennai |Machine Learning Training Institute in Chennai
Thank you for sharing with us such a useful and informative blog
ReplyDeletesurgical mask for sale
surgical mask supplier
surgical gowns for sale
n95 mask for sale
buy disposable face mask online
Also you can know about
ReplyDeletebulk mercury for sale
liquid mercury for sale
buy cherry red mercury online
This comment has been removed by the author.
ReplyDeleteNice Post I like your post i have some more useful content to share with you. custom-printed-tissue-paper
ReplyDeleteThank you for sharing with us such a useful and informative blog
ReplyDeleteVape cartridge packaging
Hi there,
ReplyDeleteThank you so much for the post, we have very high quality extracts products you might want to check out.
Buy Pharma Grade Live resin online online
Buy DELTA 8 THC DISTILLATE online
Buy Bulk CBC Isolate | Powder online
Buy Bulk Delta 9 THC Distillate Jars online
Buy Bulk THCA Isolate | Powder | Online online
Pure THCA Diamonds in online
buy-bulk-cbd-isolate-crystals online
buy-bulk-cbg-isolate-crystals online
buy-bulk-cbn-isolate-powder online
FOR MORE DETAILS
TEXT/CALL/WHATSAPP....
+1(424) 235 3914
EMAIL......support@420labextracts.com
Thanks for shearing such a useful content about pure thca diamond myself being a user of thca isolate for decades now, have got some useful articles and contents i will like to update you with
ReplyDeletebuy thca isolate online...
Thanks for the wonderful article regarding ,Thca isolate powder,we have good content ,which might interest your audience , read more.
ReplyDelete