Malware

Beschreibung

GCSE Evernote notes Notiz am Malware, erstellt von Dannii Stevenson am 16/05/2013.
Dannii Stevenson
Notiz von Dannii Stevenson, aktualisiert more than 1 year ago
Dannii Stevenson
Erstellt von Dannii Stevenson vor etwa 11 Jahre
39
0

Zusammenfassung der Ressource

Seite 1

Virus - Software program capable of reproducing itself and is usually capable of causing great harm to files or other programs on the same computer; "a true virus cannot spread to another computer without the human assistance. Spyware - Computer software that obtains information from a user's computer without the user's knowledge or consent. Adware - A software application that includes adverts, which are displayed while the software is running. Developers use adware as a source of income and to keep the costs of the software down (usually making it free). Some adware program can include spyware. Trojan - A program that appears desirable but actually contains something harmfu;; "the contents of a trojan can be a virus or a worm"; "when he downloaded the free game it turned out to be a trojan horse" Keylogger - These are programs that run in the background on your computer and are capable of recording every keystroke you make on your keyboard. Keyloggers can steal which personal details and passwords that can later be retrieved by a third party. Worm - A software program capable of reproducing itself that can spread from one computer to the next over a netwrok; "worms take advantage of automatic file sending and receiving features found on manhy computers". Cookies - Cookies are small files which are stored on a user's computer. They are designed to hold a modest amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer. This allows the server to deliver a page tailored to a particular user, or the page itself can contain some script which is aware of the data in the cookie and so is able to carry information from one visit to the website (or related site) to the next.

New Page

Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Computer Security
Mr A Esch
Hacking quiz
Luigi3106 YT
security threats
jacob stenning
Chapter 5: Keeping data safe and secure, keywords
Victoria Heppinstall
System Threats
Lana-Mae Garrett
5 Advantages of LAN
Dannii Stevenson
VIRUS INFORMÁTICO
FRANKLIN ANILEMA
Riesgos en internet
Julieth del Carmen Aroca Diaz