Computer Virus A computer virus is a small software program that spreads from one computer to another computer and

that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an -mail e program to spread the virus to other computers, or even delete everything on the hard disk. Computer viruses are most easily spread by attachments in e -mail messages or by instant messaging messages. Therefore, you must never open an e -mail attachment unless you know who sentthe message or unless you are expecting the e -mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.

Internet Browser A web browser or Internet browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by aUniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content. Hyperlinks present in resources enable users to easily navigate their browsers to related resources. Although browsers are primarily intended to access the World Wide Web, they can also be used to access information provided by Web servers in private networks or files in file systems. Some browsers can also be used to save information resources to file systems.
[1]

Mozilla Firefox is a free and open source web browser descended from the Mozilla Application Suiteand managed by Mozilla Corporation. As of October 2010, Firefox is the second most widely used browser with 30% of worldwide usage share of web browsers. In Germany, Firefox is the most popular browser with 60% usage. To display web pages, Firefox uses theGecko layout engine, which implements most current web standards in addition to several features which are intended to anticipate likely additions to the standards.

the number of times the modem changes its signal state per second. though.in making individual forwarding decisions. the ITU V. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Bridges reduce the amount of traffic on a LAN by dividing it into two segments. Bridges operate at the data link layer (Layer 2) of the OSI model. is a . and included in the OEM service releases of Windows 95 and later versions of Windows. An Ethernet bridge. They can also be classified by the symbol rate measured in baud. from driven diodes to radio. to carry 300 bit/s using 300 baud. or in service pac s. the appropriate new protocol data is added to the packet. Modems are generally classified by the amount of data they can send in a given time unit. for e ample.200 bit/s with 600 baud using phase shift keying. support one network boundary. Modems can be used over any means of transmitting analog signals. it routes it to that destination address. aka tones. Traditional bridges. Bridges serve a similar function as switches. Later versions were available as free downloads. whereas the original ITU V. ¢ ¢ ¦ ¥ ¨ ¨ ¤ £¤ © © £ ¤£ ¢ ¤ § ¤ £¤ £ © £ ¤£ ¢ ¡ £ ¤ £ ¤£   indo s nt n t Explo (formerly Mic osoft nt n t Explo . whereas switches usually offer four or more hardware ports. The most familiar e ample is a voice band modem that turns the digital data of a personal computer into modulated electrical signals in thevoice frequency range of a telephone channel. that also operate at La yer 2. Switches are sometimes called "multi-port bridges" for this reason. and also demodulates such a carrier signal to decode the transmitted information. inspects each incoming Ethernet frame including the source and destination MAC addresses. normally measured in bits per second (bit/s. These signals can be transmitted over telephone lines and demodulated by another modem at the receiver side to recover the digital data. Rout s forward data packets across computer networks. A mod m (modulator-d modulator) is a device that modulates an analog carrier signal to encode digital information. Bridges inspect incoming traffic and decide whether to forward or discard it. If the router microprocessor finds a match in its address tables.series of graphical web browsers developed by Microsoft and included as part of the Microsoft Windows line of operating systems starting in 1995 It was first released as part of the add-on pac a ge Plus! for Windows 95 that year. If the destination address is on a network type that uses a different transmission protocol. commonly abbrev ate to E or MS E). A Router checks the data packet for its destination [1] address and protocol format details. or bps). A b idg device filters data traffic at a network boundary. For e ample. and sometimes the frame size .21 standard used audio frequency-shift keying.22 standard allowed 1.

Operations that could be performed by a hacker on a target computer system include: Use of the machine as part of a botnet (e. which the hacker can then use to control the target computer. The e pression is a general term used by computer professionals to mean a variety of forms of hostile. including third-party malware Downloading or uploading of files on the user's computer Modification or deletion of files Keystroke logging Watching the user's screen Crashing the computer Trojan horses in this way require interaction with a hacker to fulfill their purpose. though the hacker need not be the individual responsible for distributing the Trojan horse. trojan horses. short for mal ou        o wa . [2] As mentioned earlier on. [2] Software is considered to be malware based on the perceived intent of the creator rather than any particular features. It is possible for individual hackers to scan computers on a network using a port scanner in the hope of finding one with a malicious Trojan horse installed. scareware. spyware. the term "Trojan horse" was taken from a clever Greek plan described by Homer in the Iliad. is software that appears to perform a desirable function for the user prior to run or install. retrieving passwords or credit card information) Installation of software. (sometimes referred to as p st [1] ) is a softwaredesigned to $ ! .secretly access a computer system without the owner's informed consent. conquering the city % !$#" ! % & # $ !$   # $ m l . worms. After seemingly abandoning the siege of Troy. Once a Trojan horse has been installed on a target computer system. crimeware. The horse was welcomed into the city by the Trojans. intrusive. or annoying software or program code. S cu ity Trojan horses may allow a hacker remote access to a target computer system. Malware includes computer viruses. the Greeks placed armed men inside a huge wooden horse.g. and other malicious and unwanted software or program. a hacker may have access to the computer remotely and perform various operations. or T oj n. who believed it was a symbol of peace.g. A T oj n ho s . they slept while the Greeks e ited the horse and opened the gates allowing the Greek army into Troy. limited by user privileges on the target computer system and the design of the Trojan horse. but (perhaps in addition to the e pected function) steals information or harms the system. dishonestadware. most rootkits. to perform automated spamming or to distribute Denial-ofservice attacks)         Data theft (e.

Sign up to vote on this title
UsefulNot useful