Know about
Your Enemies
Know All about Your Enemies
Whenever your computer
starts acting weird and makes
it difficult for you to work on,
the firs...
Know All about Your Enemies
Rootkits are computer
programs that are designed
by attackers to gain root or
administrative a...
Know All about Your Enemies
(part II)
Here are more details on these
threats:
Spyware , unlike any of the
above, doesn’t h...
Pick up Your Armor and Face
Your Enemies
Through the previous issues
of Softex newsletter, you were
introduced to your ene...
For More Related Articles,
Please Visit
http://www.softexsw.com/en/articles.php
Upcoming SlideShare
Loading in...5
×

Know More about Your Enemies

452

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
452
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Know More about Your Enemies

  1. 1. Know about Your Enemies
  2. 2. Know All about Your Enemies Whenever your computer starts acting weird and makes it difficult for you to work on, the first thing that comes to your mind is whether a virus has affected your computer. This issue is dedicated to explain the most common threats that you may face. It gives you some details to help treat the root cause of any problem. Here are some definitions on these threats: Malware is any malicious program or software that’s designed to exploit a computer user. Malware is basically an umbrella term covering computer viruses, worms, Trojan, spyware, rootkit etc. Virus replicates itself in computer memory when initiated by the user. They contain some malicious codes which can affect your files, your operating system or even your master boot records thereby making your computer start slow or not boot at all.
  3. 3. Know All about Your Enemies Rootkits are computer programs that are designed by attackers to gain root or administrative access to your computer. Once an attacker gains admin privilege, it becomes a cakewalk for him to exploit your system. Trojan horse is a program that appears useful by pretending to do certain things in foreground, but in reality they are working silently in background with the only objective of harming your computer and/or stealing valuable information. It penetrates your computer through downloading malicious software like keys, cracks, free illegal music, wares etc from an unknown source. A worm is an evolved form of a virus. Like virus, worms replicate and spread themselves but it happens on a bit larger scale. They not need a human action to replicate and spread and that’s what makes it more dangerous. It always seeks for network loopholes to replicate from computer to computer. Therefore, it is not recommended to download any email attachments or to click the links friends share with you in a chat window.
  4. 4. Know All about Your Enemies (part II) Here are more details on these threats: Spyware , unlike any of the above, doesn’t harm your computer in any way. Instead, they attack you! Once installed on a system they run in background and keep on collecting user’s personal data. These data can include your credit card numbers, passwords, important files and any other personal stuff. It is always advisable to download and install software from trusted sources. A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised, one or more backdoors may be installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. It is worth-knowing that crackers use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, crackers may use Trojan horses, worms, or other methods.
  5. 5. Pick up Your Armor and Face Your Enemies Through the previous issues of Softex newsletter, you were introduced to your enemies and were given detailed description on each of them. I believe now you need your shining armor and sword to confront these vicious threats. In this case, regular scanning and an effective antivirus system are essential for the security of your system, which prevents damage and data loss. The following steps will guide you to choose the best antivirus for you: Step 1: Make a list of your requirements You have to assess your requirements and know all about your operating system in order to know which antivirus (for your PC, Business or Mobile ). For example, if you are looking for business features, however, you will want offerings of a full suite such as anti-spyware, spam filter, anti-virus and firewall.
  6. 6. For More Related Articles, Please Visit http://www.softexsw.com/en/articles.php

×