A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.

Showing posts with label virus. Show all posts
Showing posts with label virus. Show all posts

Wednesday, February 17, 2016

Cybercrime on physical site

Cybercrime resulting in property harm is generally carried out using cracking techniques and includes such common variations as:

*Flooding – a form of cyberspace vandalism. When a cracker floods a site using a technique called distributed denial-of-service or DDoS he or she plants software programs on large computers with high-speed connections to the internet. It will cause computer system overloaded and cease functioning.

*Virus and worm production and release – a form of cyberspace vandalism causing corruption possibly erasing of data. Virus is a self-replicating program. While worms is very similar to a vorus but it does not need a file to travel in a most definition agree that worms have the capacity to ravel autonomously.

*Spoofing – It is the act of assuming a fake identity, normally in order to trick another party into exchanging, submitting or accepting authentication or other confidential data. The act of web spoofing involves the redirection of a user's Internet browser to a given website when the user types in a similar URL address; this technique may be used by pornography websites to lure visitors to their sites.

*Phreaking – Phreakers use technology to obtain unauthorized access to the telephone system

*Infringing intellectual property right and copyright
Cybercrime on physical site

Friday, September 26, 2014

What is malware?

Malware is a set of instructions that run on the computer and make the computer system do something that an attacker wants it to do.

Malware is an abbreviation for Malicious Software. A great upsurge of malware began in late 2005 when producing malware change from a computer geek hobby to an activity of organized crime.

Some malware are designed to steal confidential information; some to cause damage by causing computer systems to fail; other are programmed to deny access to computer resources.

Malware has the ability to corrupt files, alter or delete data, distribute confidential data, disable hardware and cause to a hard drive to crash.

There are three characteristics associated with malware types:
*Self-replicating
*The population growth of malware describes the overall change in the number of malware instances due to self-replication. Malware that doesn’t self-replicate will always have a zero population growth, but malware with a zero population growth may self-replicate.
*Parasitic malware requires some their executable code in order to exist.

There are three types of malware that people who connect to the internet need to be concerned about:
*Infectious
*Concealer
*Profit malware

Malware can spread over all medium of modern digital communication including the internet, via e-mails, and instant messaging networks. Thus all forms of digital communication are at risk of being exploited by malware to infect users.
What is malware?

Wednesday, September 17, 2014

Definition of computer virus

One of the most destructive examples of computer crime involves the creation of computer viruses or worms.

Virus –like programs appeared on microcomputers in the 1980s. As more people learned the art of computer science, more people started to gain expertise in this specialized field. The first viruses on microcomputers were written on the Apple-II, circa 1982.

In 1984, mathematician Dr. Fredrick Cohen introduced the term computer virus, thereby becoming the father’ of computer virus with his studies of them.

Virus is the more popular term but, technically, a virus is a program code that cannot work without being inserted into another program.

It is malware that when executed, tries to replicate itself into other executable code when it succeeds, the code is aid to be infected.

The infected code, when run, can infect new code in turn. This self-replication into existing executable code is the key defining characteristics of a virus.

Antivirus programs often detect common viruses. Some hackers are able to design the pattern of a virus in such a stealthy and modernized manner that it can easily bypass the antivirus program and infect the computer system.
Definition of computer virus

Monday, January 27, 2014

What is Trojan horse in computing?

A Trojan horse is a common type of rogue software. The term ‘trojan horse’ is used to describe something that appears to be a gift, but that actually is a trap. In the computer security, the term has materialized into ‘a program that appears to be cool, but that erases all files’.

Trojan horses have been around since the first computers. One of the simplest and oldest types of Trojan horses is a password-stealing program.

These are especially common on shared computers used by many different people such as those in a school computer laboratory.

A trojan horse is a type of computer program that programs an ostensibly useful function but contains a hidden function that compromises the host system’s security. In contrast to viruses and worms, Trojans do not duplicate.

An author of a Trojan horse program might first create or gain access to the source code of a useful program that is attractive to other users, and then add code so that the program performs some harmful function in addition to its useful function.

Just like the ancient Greek ruse from which is derives its name, Trojan horse programs rely on trickery. Trojan horses usually run only once, but that is enough to wipe out files, steal passwords or cause other types of damage.

Once the user loads it on the machine, the Trojan horse will then either deliver a second program, such as a virus or worm, or simply take some malicious action itself.

Since Trojan horses are usually installed by users themselves, the security countermeasure for this attack is to prevent downloads and installation by end users.
What is Trojan horse in computing?

The Most Popular Posts

  • The evolution of business intelligence (BI) tools reflects the broader progress of computing technology and data management. In the 1970s and 1980s, early ...
  • Watermelons are quintessential summer crops, prized for their refreshing, red, juicy, and crisp flesh. Producing high-quality melons requires careful handl...
  • Selenium, an essential trace element, plays a crucial role in various bodily functions, including antioxidant defense and thyroid hormone metabolism. Plant...