Welcome To The World Of Hacking


Learn Hacking|Teach Hacking|Learn To Secure|Learn To Code

Saturday

DEFINITIONS:VIRUS, WORMS, TROJAN HORSE, LOGIC BOMBS, BACTERIA & BLENDED THREATS

1. Viruses:
                                               

Viruses cannot spread without the help of us humans. They are like parasites because they need

a host to attach themselves to. The host is usually a legitimate looking program or file. Once this program is

launched, the virus is executed and infects other files on your computer. Viruses can be very destructive.

They can do damage to your computer hardware, software and files. Viruses are spread through the sharing

of files and are many times sent within emails via attachments.

2. Worms:


 A worm is a malicious program that can replicate itself onto other computers on a network.

Unlike a virus, worms don’t need a human to be able to spread and infect systems. Once it infects a system,

it uses that system to send out other copies of itself to other random systems attempting to infect them.

3. Trojan Horse:


 A trojan horse is a malicious program that can be used to do silly things to a system like

changing its desktop, mess with the user interface, and take control of your mouse. It can also be used for

some serious things like accessing your data, erasing your files, stealing your passwords, and capturing your

keystrokes.


4. Logic Bombs:


 Logic bombs are usually pieces of code that are programmed into a program that lie dormant until a certain

time or until a user does a certain action which causes it to be executed. When it is triggered it performs a

certain function that the program wasn’t intended to do.

5. Bacteria :

 Bacteria make many copies of themselves and eventually end up taking up all of the computers recourses

such as all of its processor power, memory and disk space. This results in the legitimate user losing access

to those resources.

6. Blended Threats :
 Blended threats combine all of the characteristics of the above and use them along with system

vulnerabilities to spread and infect machines.

19 comments:

  1. Ethical hacking is performed by a company to identify the potential threats on a computer. These information are required to improve the system security in order to eliminate the attacks.
    Ethical hacking Course in Chennai | Ethical hacking course

    ReplyDelete

  2. Thanks for sharing this information and keep updating us. This information is very useful to me.
    Ethical Hacking Course in Chennai | Hacking Course in Chennai | Ethical Hacking Course

    ReplyDelete

  3. Great and useful article. Creating content regularly is very tough. Your points are motivated me to move on.

    LG Mobile Service Center in Chennai

    ReplyDelete
  4. The information is really worth for us
    Thanks

    ReplyDelete
  5. thanks to give me the opportunity to post comment on your blog.

    ReplyDelete
  6. do you thing which antivirus best for your device. So don't worry get mcafee antivirus for your device which protect all kinds of threats and easily get Mcafee Technical Support while you faced some issues.

    ReplyDelete
  7. Thanks for sharing an information to us. If someone want to know about ethical hacking course. I think this is the right place for you! ceh Training

    ReplyDelete

  8. It’s great to come across a blog every once in a while that isn’t the same out of date rehashed material. Fantastic read.
    Machine Learning Training in Chennai |Machine Learning Training Institute in Chennai

    ReplyDelete
  9. This comment has been removed by the author.

    ReplyDelete
  10. Nice Post I like your post i have some more useful content to share with you. custom-printed-tissue-paper

    ReplyDelete
  11. Thank you for sharing with us such a useful and informative blog
    Vape cartridge packaging

    ReplyDelete
  12. Thanks for shearing such a useful content about pure thca diamond myself being a user of thca isolate for decades now, have got some useful articles and contents i will like to update you with
    buy thca isolate online...

    ReplyDelete
  13. Thanks for the wonderful article regarding ,Thca isolate powder,we have good content ,which might interest your audience , read more.

    ReplyDelete

Related Posts Plugin for WordPress, Blogger...