Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Computer Security

Computer Security

Ratings:

4.0

(1)
|Views: 310|Likes:
Published by zulfi24
Read to know how your computer can be made a safest place to work. How your system can get attacked by viruses, worms and Trojans over internet. Difference between virus, worm and Trojan is also mentioned in this document.
Read to know how your computer can be made a safest place to work. How your system can get attacked by viruses, worms and Trojans over internet. Difference between virus, worm and Trojan is also mentioned in this document.

More info:

Published by: zulfi24 on Nov 25, 2008
Copyright:Traditional Copyright: All rights reserved

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF or read online from Scribd
See more
See less

11/11/2010

 
Computer securityomputersecurity 
Introduction:
The Internet is full of fun places and vastamount of information, but also some dangers.Your computer can be damaged by a computervirus sent through E-mail or through aprogram downloaded from the Web. In today'scomputing world, you must prevent intentionalintrusions into your computer and network thattake the form of viruses andTrojan horses.Follow these tips to help prevent virusoutbreaks and Trojan horse attacks.
Virus:
A virus is a program that can copy itself andinfect various parts of your computer, such asdocuments, programs, and parts of youroperating system. Most viruses attachthemselves to a file or part of your hard diskand then copy themselves to other placeswithin the operating system. Some virusescontain code that inflicts extra damage bydeleting files or lowering your securitysettings, inviting further attacks.
 
 2
Worm:
A worm is a program that makes copies of itselfand can spread outside your operating system;it can copy itself from one computer to anotherby using E-mail or another transportmechanism. Worms can damage computer dataand security in much the same ways as viruses,but are different from viruses in that they copythemselves from system to system.
Trojan horse:
A Trojan horse is a harmless-looking programdesigned to trick you into thinking it issomething you want, but which performsharmful acts when it runs. It is typicallyreceived through downloads from the Internet.Trojan horses do not spread by themselves likeviruses and worms. Most of the virus protectionprograms only detect a limited number ofTrojan horses. A good way to help protect yourcomputer from Trojan horses is to visit onlyWeb sites you trust, and avoid downloadingthings unless you trust the source as well.
 
 3
Common signs of computer infection
1.
 
Appearance of unusual messages on desktop
 
Some times, a fake or wrong error messageappears on the computer desktop givingwrong information about the computer, whichappears to be true and attractive for the user.The information tricks the user intosomething, which he wants. Finally, the userfalls into the trap and it becomes verydifficult for the user to find the source oferror message and fix the problem or error.
2.
 
Decreased system performance.
A considerable negative change in theperformance of the infected computer takesplace, which leads to slow systemperformance and can be readily recognizedby the user.
3.
 
Missing data
.
The user of such an infected computer findsthat the data stored in the memory ofcomputer gets deleted or is removed from thecomputer automatically.
4.
 
Inaccessibility to hard drive
 
In a major virus attack, the hard drive of thecomputer becomes inaccessible by its legal

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
kripa dudu liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->