For security purposes, we quickly see their computer and make it easier to access
Computer hacking have collected some of the relevant terms. ^ ^
◆ backdoor (Back door) Program
Literally 'back door', meaning, snuck off to the computer in the computer information or a specific task ppaenaega program is designed for.
1998 'Back Orifice (Back Orifice)' continues to be the beginning that made many backdoor programs were born, backdoor programs are found hundreds of current and people who know nothing about hacking a few mouse clicks the user's information so easily able to obtain the danger is more serious than any other malicious code.
◆ worm (Worm)
Unlike computer viruses replicate themselves and spread through the network is a program.
Without infecting other computer programs, computer viruses and in that action differ. This is characteristic of many cases that spread through e-mail is
◆ Trojans
Worms and malicious code with the recent reports of damage, one of many. Does not have means of self-propagating malicious code, along with other radio, or pretending to be the latest version of the well-known program in a manner that is blurred. Greek soldiers are hiding in the horse during the day after the night that destroyed the Trojan horse in the lists the name was derived from Greek mythology.
◆ Macro (Macro) virus
Microsoft's Office family of virus that infected document files mainly. Originally a macro virus that infects files only behavior, but Melissa (W97M.Melissa.A) like a virus through e-mail viruses have emerged showing a strong hwaksanryeok.
◆ vaccine
Computer's hard disk, memory, etc., while diagnosis has been infected with the virus, delete virus infected files or system software is to treat.
◆ Firewall
Such as the Internet and corporate networks from external communication system hardware or software system that protects says. Unauthorized Internet users to prevent access and virus attacks incoming from the Internet can also be blocked.
No comments:
Post a Comment