Professional Documents
Culture Documents
IT ACT 2000
Background for Cyberlaws
Trojan Attack
The program that act like something useful but do the things that are
quiet damping. The programs of this kind are called as Trojans.
• Authentication
• Integrity
• Protect your PC
• Use a firewall
• Install anti-virus software and prevent virus infections.
• Make regular backups
• Secure wireless networks
• Get the latest updates and browse the internet safely.
Few tips to protect you from cyber
crime
• Protect yourself